too vague to be directly transformed into law identifi-
cation pattern instances. But they contain additional,
relevant information about the functionality and con-
text of a system. It seems to be promising to inte-
grate this information to improve the precision of our
method.
In general, our law identification process was used
in the field of cloud computing, health-care and for
this paper in the domain of voting systems. The trans-
formation cards were only used for the latter. From
our experience, our method is usable regarding the
German law for different domains without adaption.
We also found evidence that this observation is also
true for laws from other countries as long as the law
system of the country is a statue law. For example,
Biagioli. et al (Biagioli et al., 1987) describe the very
same structure for Italian laws like we use for German
laws. For case law systems like the one of the US, our
method needs to be adapted. The use of our method
on more domains, for other countries with statue law,
and even for case law countries is under research.
We also plan to formulate rules for the reduction
of core structure candidates. At the moment, we get a
large set of core structures for some problem frames.
This makes the modeling of law identification pattern
instances tedious. Hence, we will improve the sit-
uation by giving guidance to identify irrelevant core
structures or core structures which can be merged.
Finally, we plan to speed up the method execu-
tion by providing tool support for identifying prob-
lem frames for problem diagrams, wizards and rec-
ommenders, which are based on the questionnaires,
for collection the domain knowledge, and automatic
transformation based on this information.
REFERENCES
´
Alvarez, J. A. T., Olmos, A., and Piattini, M. (2002). Le-
gal requirements reuse: A critical success factor for
requirements quality and personal data protection. In
Proceedings of the International Conference on Re-
quirements Engineering (RE), pages 95–103. IEEE.
Beckers, K., Faßbender, S., K
¨
uster, J.-C., and Schmidt, H.
(2012a). A pattern-based method for identifying and
analyzing laws. In REFSQ, pages 256–262.
Beckers, K., Faßbender, S., and Schmidt, H. (2012b). An
integrated method for pattern-based elicitation of legal
requirements applied to a cloud computing example.
In ARES, pages 463–472.
Bench-Capon, T. J. M., Robinson, G. O., Routen, T. W., and
Sergot, M. J. (1987). Logic programming for large
scale applications in law: A formalization of supple-
mentary benefit legislation. In Proceedings of the In-
ternational Conference on Artificial Intelligence and
Law (ICAIL). ACM.
Biagioli, C., Mariani, P., and Tiscornia, D. (1987). Esplex:
A rule and conceptual model for representing statutes.
In ICAIL, pages 240–251. ACM.
Breaux, T. D. and Ant
´
on, A. I. (2008). Analyzing regula-
tory rules for privacy and security requirements. IEEE
Transactions on Software Engineering, 34(1):5–20.
Breaux, T. D., Vail, M. W., and Ant
´
on, A. I. (2006). To-
wards regulatory compliance: Extracting rights and
obligations to align requirements with regulations. In
Proceedings of the International Conference on Re-
quirements Engineering (RE), pages 46–55. IEEE.
Brehm, R. (2012). Kryptographische Verfahren in Internet-
wahlsystemen. Technical report, Technical University
of Darmstadt.
C
ˆ
ot
´
e, I., Hatebur, D., Heisel, M., Schmidt, H., and Went-
zlaff, I. (2008). A systematic account of problem
frames. In Proceedings of the European Confer-
ence on Pattern Languages of Programs (EuroPLoP),
pages 749–767. Universit
¨
atsverlag Konstanz.
Federal Constitutional Court of Germany (2009). Verwen-
dung von Wahlcomputern bei der Bundestagswahl
2005 verfassungswidrig.
Hatebur, D. and Heisel, M. (2010). Making pattern- and
model-based software development more rigorous. In
Proceedings of 12th International Conference on For-
mal Engineering Methods, ICFEM 2010, Shanghai,
China, LNCS 6447, pages 253–269. Springer.
Hohfeld, W. N. (1917). Fundamental legal conceptions as
applied in judicial reasoning. The Yale Law Journal,
26(8):710–770.
Jackson, M. (2001). Problem Frames. Analyzing and
structuring software development problems. Addison-
Wesley.
Maxwell, J. C. and Ant
´
on, A. I. (2009). Developing pro-
duction rule models to aid in acquiring requirements
from legal texts. In Proceedings of the 2009 17th IEEE
International Requirements Engineering Conference,
RE, RE ’09, Washington, DC, USA. IEEE Computer
Society.
Otto, P. N. and Ant
´
on, A. I. (2007). Addressing legal re-
quirements in requirements engineering. In Proceed-
ings of the International Conference on Requirements
Engineering. IEEE.
Siena, A., Perini, A., and Susi, A. (2008). From laws
to requirements. In Proceedings of the Interna-
tional Workshop on Requirements Engineering and
Law (RELAW), pages 6–10. IEEE.
Siena, A., Perini, A., Susi, A., and Mylopoulos, J. (2009).
A meta-model for modelling law-compliant require-
ments. In Proceedings of the International Workshop
on Requirements Engineering and Law (RELAW),
pages 45–51. IEEE.
Volkamer, M. (2009). Evaluation of Electronic Voting: Re-
quirements and Evaluation Procedures to Support Re-
sponsible Election Authorities. Springer Publishing
Company, 1st edition.
Volkamer, M. and Vogt, R. (2008). Common Criteria Pro-
tection Profile for Basic set of security requirements
for Online Voting Products. Bundesamt f”ur Sicher-
heit in der Informationstechnik.
ICSOFT2013-8thInternationalJointConferenceonSoftwareTechnologies
458