نتایج جستجو برای: legal requirements
تعداد نتایج: 296533 فیلتر نتایج به سال:
This paper outlines the technology of the formalization and verification of legal text documents. A formal model of a legal document is presented as an ordered set of rules. Every rule is presented as a triple containing preand post-conditions, as well as process parts. All rules are ordered in Use Case Maps (UCM) diagrams. Such a formal model can be verified for inconsistency and incompletenes...
Software Requirements Engineering addresses specific challenges which exist in the effort to gain an understanding of the nature of the engineering problem arising from user’s real-world needs and desires. This research is aimed at helping software analysts meet these challenges. The proposed methodology forms the basis of the automated process designed to capture the high-level system services...
Identity-management systems play a key role in various areas for applications and e-Government processes where access to sensitive data needs to be protected and regulated. To protect this sensitive date, the identity-management system provides all necessary functionality to service providers to manage digital identities and handle the identification and authentication process. This identificat...
We start from the Klaus Julisch’s (2008) IT compliance problem definition and make an attempt to formulate the enterprise architecture compliance problem (EACP). The challenging issues comprise the complexity of the law phenomenon, compliance frameworks and methodologies to check EA for noncompliance with laws and regulations. We hold that a compliance methodology should take into account “shar...
In criminal law principle is that during the final stages of the trial and verdict enforcement, the criminal indictment against the sentence be carried out. However, the abstract state of criminal law today and subjectivism are spent outside and in light of the offense and cognitive science, especially medical science, the objectivity and realism has been the tendency of Criminal Enforcement. C...
investment in oil and gas upstream activities is very important for the exploration and development of oil and gas fields. different and various laws and regulations deal with the investment in upstream operations. by reviewing these various laws and regulations, this research paper tries to discuss to what extent these laws and regulations have created legal confident for foreign investment up...
This paper analyses the requirements that need to be met in order to provide a modelling methodology suitable for the modelling of legal workflows. It subsequently provides a methodology for the legal environment which meets the stated requirements.
New laws are increasingly constraining informations systems.To prevent misuses of the law, requirements engineers are faced with the problem of incorporating legal prescriptions into requirements analysis. Nòmos is an extension of i*, which allows to build models of legal prescriptions alongside intentional elements, and derive this way requirements that at the same time fulfill stakeholder nee...
This article discusses the authors' views on the security requirements of a central, unique electronic health record. The requirements are based on the well-known principles of confidentiality and integrity and the less discussed principles of control and legal value. The article does not discuss any technical or legal solutions to the requirements proposed herein.
Electronic mailing systems are the dominant communication systems in private and business matters. Public administrations deliver documents to citizens and businesses—subpoenas, legal verdicts, notifications, administrative penalties, and so forth. However, official activities are more strongly bound to legal regulations than in civil law. Delivery of crucial and personal documents raises the d...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید