skip to main content
10.1145/3190619.3191685acmotherconferencesArticle/Chapter ViewAbstractPublication PageshotsosConference Proceedingsconference-collections
poster

Toward extraction of security requirements from text: poster

Published: 10 April 2018 Publication History

Abstract

We propose and evaluate an information extraction and analysis framework that combines human intelligent (crowdsourcing) with automated methods to produce improved security and privacy requirements incorporating knowledge from post-deployment artifacts such as breach reports.

References

[1]
HHS. 2003. Summary of the HIPAA privacy rule. (2003). HHS. http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/.
[2]
HHS Breach Portal. 2016. Notice to the Secretary of HHS Breach of Unsecured Protected Health Information Affecting 500 or More Individuals. (2016). HHS. https://ocrportal.hhs.gov/ocr/breach/.

Cited By

View all
  • (2018)Extraction of Natural Language Requirements from Breach Reports Using Event Inference2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE)10.1109/AIRE.2018.00009(22-28)Online publication date: Aug-2018
  • (2018)A Method of Accurately Accepting Tasks for New Workers Incorporating with Capacities and Competition IntensitiesBio-inspired Computing: Theories and Applications10.1007/978-981-13-2829-9_18(188-200)Online publication date: 6-Oct-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
HoTSoS '18: Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security
April 2018
163 pages
ISBN:9781450364553
DOI:10.1145/3190619
  • General Chairs:
  • Munindar Singh,
  • Laurie Williams,
  • Program Chairs:
  • Rick Kuhn,
  • Tao Xie
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

  • National Security Agency: National Security Agency

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2018

Check for updates

Author Tags

  1. HIPAA
  2. crowdsourcing
  3. natural language processing
  4. regulatory norms
  5. sociotechnical systems

Qualifiers

  • Poster

Conference

HoTSoS '18
Sponsor:
  • National Security Agency
HoTSoS '18: Symposium and Bootcamp
April 10 - 11, 2018
North Carolina, Raleigh

Acceptance Rates

Overall Acceptance Rate 34 of 60 submissions, 57%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2018)Extraction of Natural Language Requirements from Breach Reports Using Event Inference2018 5th International Workshop on Artificial Intelligence for Requirements Engineering (AIRE)10.1109/AIRE.2018.00009(22-28)Online publication date: Aug-2018
  • (2018)A Method of Accurately Accepting Tasks for New Workers Incorporating with Capacities and Competition IntensitiesBio-inspired Computing: Theories and Applications10.1007/978-981-13-2829-9_18(188-200)Online publication date: 6-Oct-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media