@article{he_anton_2009, title={Requirements-based Access Control Analysis and Policy Specification (ReCAPS)}, volume={51}, ISSN={["1873-6025"]}, DOI={10.1016/j.infsof.2008.11.005}, abstractNote={Access control (AC) is a mechanism for achieving confidentiality and integrity in software systems. Access control policies (ACPs) express rules concerning who can access what information, and under what conditions. ACP specification is not an explicit part of the software development process and is often isolated from requirements analysis activities, leaving systems vulnerable to security breaches because policies are specified without ensuring compliance with system requirements. In this paper, we present the Requirements-based Access Control Analysis and Policy Specification (ReCAPS) method for deriving and specifying ACPs, and discuss three validation efforts. The method integrates policy specification into the software development process, ensures consistency across software artifacts, and provides prescriptive guidance for how to specify ACPs. It also improves the quality of requirements specifications and system designs by clarifying ambiguities and resolving conflicts across these artifacts during the analysis, making a significant step towards ensuring that policies are enforced in a manner consistent with a system’s requirements specifications. To date, the method has been applied within the context of four operational systems. Additionally, we have conducted an empirical study to evaluate its usefulness and effectiveness. A software tool, the Security and Privacy Requirements Analysis Tool (SPRAT), was developed to support ReCAPS analysis activities.}, number={6}, journal={INFORMATION AND SOFTWARE TECHNOLOGY}, author={He, Qingfeng and Anton, Annie I.}, year={2009}, month={Jun}, pages={993–1009} } @article{anton_earp_he_stufflebeam_bolchini_jensen_2004, title={Financial privacy policies and the need for standardization}, volume={2}, ISSN={["1558-4046"]}, DOI={10.1109/MSECP.2004.1281243}, abstractNote={The authors analyze 40 online privacy policy documents from nine financial institutions to examine their clarity and readability. Their findings show that compliance with the existing legislation and standards is, at best, questionable.}, number={2}, journal={IEEE SECURITY & PRIVACY}, author={Anton, AI and Earp, JB and He, QF and Stufflebeam, W and Bolchini, D and Jensen, C}, year={2004}, pages={36–45} } @article{anton_he_baumer_2004, title={Inside JetBlue's privacy policy violations}, volume={2}, number={6}, journal={IEEE Security & Privacy}, author={Anton, A. I. and He, Q. F. and Baumer, D. L.}, year={2004}, pages={18-} }