How to capture and use legal patterns in IT

A. Krausova, F. Massacci, A. Saidane

Research output: Chapter in Book / Report / Conference proceedingConference contributionAcademicpeer-review

Abstract

In our own previous work [1], we looked at the problem of designing IT solutions ( Security Patterns) accounting for legal and organizational issues. The proposed pattern de- sign and validation process require legal experts to describe patterns in natural language. Such a description is parsed by a natural language processor on the basis of a semantic template [2]. The annotated description is then used to automatically generate graphical models of SI* patterns, which are revised by security engineers using a CASE Tool 1. The intriguing question that we address in this paper is the opposite of the mainstream one: Challenge 1. You have a technical solution (e.g. a se- curity and dependability pattern). Can some of your system requirements be implemented by legal means? This challenge might seem at odd with intuition but only because we don't bring the usage of patterns to their logi- cal end: if an answer to a legal, organizational or technical security requirement can be an organizational or technicalsolution, why cannot it also be a. . . legal solution?. Copyright 2009 ACM.
Original languageEnglish
Title of host publicationProceedings of the 12th International Conference on Artificial Intelligence and Law, ICAIL '09
Pages228-229
DOIs
Publication statusPublished - 2009
Externally publishedYes
Event12th International Conference on Artificial Intelligence and Law, ICAIL '09 - , Spain
Duration: 8 Jun 200912 Jun 2009

Publication series

NameProceedings of the International Conference on Artificial Intelligence and Law

Conference

Conference12th International Conference on Artificial Intelligence and Law, ICAIL '09
Country/TerritorySpain
Period8/06/0912/06/09

Fingerprint

Dive into the research topics of 'How to capture and use legal patterns in IT'. Together they form a unique fingerprint.

Cite this