DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS

Motoshi Saeki, Haruhiko Kaiya, Satoshi Hattori

2009

Abstract

This paper proposes a technique to apply model checking in order to show the regulatory compliance of requirements specifications written in use case models. We define three levels of regulatory vulnerability of a requirements specification by the situation of its non-compliance with regulations. For automatic compliance checking, the behavior of business processes and information systems are specified with use cases and they are translated into finite state transition machines. By using model checker SMV, we formally verify if the regulations that are represented with computational tree logic can be satisfied with the state machines.

Download


Paper Citation


in Harvard Style

Saeki M., Kaiya H. and Hattori S. (2009). DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS . In Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT, ISBN 978-989-674-009-2, pages 105-114. DOI: 10.5220/0002240001050114

in Bibtex Style

@conference{icsoft09,
author={Motoshi Saeki and Haruhiko Kaiya and Satoshi Hattori},
title={DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS},
booktitle={Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT,},
year={2009},
pages={105-114},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002240001050114},
isbn={978-989-674-009-2},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 4th International Conference on Software and Data Technologies - Volume 1: ICSOFT,
TI - DETECTING REGULATORY VULNERABILITY IN FUNCTIONAL REQUIREMENTS SPECIFICATIONS
SN - 978-989-674-009-2
AU - Saeki M.
AU - Kaiya H.
AU - Hattori S.
PY - 2009
SP - 105
EP - 114
DO - 10.5220/0002240001050114