TY - GEN
T1 - Legal patterns implement trust in IT requirements
T2 - 2009 2nd International Workshop on Requirements Engineering and Law, RELAW 2009
AU - Krausova, A.
AU - Massacci, F.
AU - Saidane, A.
PY - 2009
Y1 - 2009
N2 - The traditional approach of computer scientists to Law is that laws (statutes, regulations, etc.) set the requirements, logicians and requirements analysts model them, and finally IT technical solutions or organizational patterns are used to implement them. In this paper we try to answer a radically different question: Can a technical solution (e.g. a requirement in a security and dependability pattern) be implemented by legal means? We show how Legal Patterns, that represent the legal analogy of Software Patterns, can be formally used to implement trust relations required by security and dependability patterns.
AB - The traditional approach of computer scientists to Law is that laws (statutes, regulations, etc.) set the requirements, logicians and requirements analysts model them, and finally IT technical solutions or organizational patterns are used to implement them. In this paper we try to answer a radically different question: Can a technical solution (e.g. a requirement in a security and dependability pattern) be implemented by legal means? We show how Legal Patterns, that represent the legal analogy of Software Patterns, can be formally used to implement trust relations required by security and dependability patterns.
U2 - 10.1109/RELAW.2009.7
DO - 10.1109/RELAW.2009.7
M3 - Conference contribution
SN - 9781424476961
T3 - 2009 2nd International Workshop on Requirements Engineering and Law, RELAW 2009
SP - 33
EP - 38
BT - 2009 2nd International Workshop on Requirements Engineering and Law, RELAW 2009
Y2 - 1 September 2009 through 1 September 2009
ER -