Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Qingfeng He is active.

Publication


Featured researches published by Qingfeng He.


ieee symposium on security and privacy | 2004

Financial privacy policies and the need for standardization

Annie I. Antón; Julia Brande Earp; Qingfeng He; William H. Stufflebeam; Davide Bolchini; Carlos Jensen

The authors analyze 40 online privacy policy documents from nine financial institutions to examine their clarity and readability. Their findings show that compliance with the existing legislation and standards is, at best, questionable.


workshop on privacy in the electronic society | 2004

Specifying privacy policies with P3P and EPAL: lessons learned

William H. Stufflebeam; Annie I. Antón; Qingfeng He; Neha Jain

As computing becomes more ubiquitous and Internet use continues to rise, it is increasingly important for organizations to construct accurate and effective privacy policies that document their information handling and usage practices. Most privacy policies are derived and specified in a somewhat ad-hoc manner, leading to policies that are of limited use to the consumers they are intended to serve. To make privacy policies more readable and enforceable, two privacy policy specification languages have emerged, P3P and EPAL. This paper discusses a case study in which the authors systematically formalized two real and complex, healthcare website privacy statements, and measured the results against well-known requirements engineering criteria.


Information & Software Technology | 2009

Requirements-based Access Control Analysis and Policy Specification (ReCAPS)

Qingfeng He; Annie I. Antón

Access control (AC) is a mechanism for achieving confidentiality and integrity in software systems. Access control policies (ACPs) express rules concerning who can access what information, and under what conditions. ACP specification is not an explicit part of the software development process and is often isolated from requirements analysis activities, leaving systems vulnerable to security breaches because policies are specified without ensuring compliance with system requirements. In this paper, we present the Requirements-based Access Control Analysis and Policy Specification (ReCAPS) method for deriving and specifying ACPs, and discuss three validation efforts. The method integrates policy specification into the software development process, ensures consistency across software artifacts, and provides prescriptive guidance for how to specify ACPs. It also improves the quality of requirements specifications and system designs by clarifying ambiguities and resolving conflicts across these artifacts during the analysis, making a significant step towards ensuring that policies are enforced in a manner consistent with a systems requirements specifications. To date, the method has been applied within the context of four operational systems. Additionally, we have conducted an empirical study to evaluate its usefulness and effectiveness. A software tool, the Security and Privacy Requirements Analysis Tool (SPRAT), was developed to support ReCAPS analysis activities.


electronic government | 2005

Transnational Information Sharing, Event Notification, Rule Enforcement and Process Coordination

Stanley Y. W. Su; José A. B. Fortes; T. R. Kasad; M. Patil; Andréa M. Matsunaga; Maurício O. Tsugawa; Violetta Cavalli-Sforza; Jaime G. Carbonell; Peter J. Jansen; Wayne H. Ward; Ronald A. Cole; Donald F. Towsley; Weifeng Chen; Qingfeng He; C. McSweeney; L. de Brens; J. Ventura; P. Taveras; R. Connolly; C. Ortega; B. Piñeres; O. Brooks; G.A. Murillo; M. Herrera

Solutions to global problems such as disease detection and control, terrorism, immigration and border control, and illicit drug trafficking require sharing and coordinating information and collaboration among government agencies within a country and across national boundaries. This paper presents an approach to achieve information sharing, event notification, enforcement of policies, constraints, regulations, security and privacy rules, and process coordination. The proposed system, designed in collaboration with stakeholders and end users in two Latin American countries, achieves the desired capabilities by integrating a distributed query processor (DQP) that provides form-based and conversational user interfaces, a language translation system, an event server for event filtering and notification, and an event-trigger-rule server. The Web-services infrastructure is used to achieve the interoperation of these heterogeneous component systems. A prototype of the integrated transnational information system is described.


Fourth IEEE International Workshop on Information Assurance (IWIA'06) | 2006

Ensuring compliance between policies, requirements and software design: a case study

Qingfeng He; Paul N. Otto; Annie I. Antón; Laurie A. Jones

Specifying correct and complete access control policies is essential to secure data and ensure privacy in information systems. Traditionally, policy specification has not been an explicit part of the software development process. This isolation of policy specification from software development often results in policies that are not in compliance with system requirements and/or organizational security and privacy policies, leaving the system vulnerable to data breaches. This paper presents the results and lessons learned from a case study that employs the Requirements-based Access Control Analysis and Policy Specification (ReCAPS) method to specify access control policies for a Web-based event registration system. The ReCAPS method aids software and security engineers in specifying access control policies derived from requirements specifications and other available sources. Our case study revealed that the ReCAPS method helps identify inconsistencies across various software artifacts, such as requirements specification, database design, and organizational security and privacy policies. Had these problems not been identified and resolved, they would have crippled later phases of software development, resulted in missing or incomplete system functionality, and compromised the systems security and privacy. This case study reinforces, validates, and extends our previous recommendations that access control policy specification should be an integral part of the software development process for information systems to achieve information assurance and improve the quality of the information system


international conference on web engineering | 2004

I Need It Now: Improving Website Usability by Contextualizing Privacy Policies

Davide Bolchini; Qingfeng He; Annie I. Antón; William H. Stufflebeam

Internet privacy policies are complex and difficult to use. In the eyes of end-users, website policies appear to be monolithic blocks of poorly structured texts that are difficult to parse when attempting to retrieve specific information. In an increasingly privacy-aware society, end-users must be able to easily access privacy policies while navigating a website’s pages and readily understand the relevant parts of the policy. We propose a structured methodology to improve web design and increase user’s privacy awareness. This systematic approach allows policy makers to effectively and efficiently reshape their current policies by structuring policies according to the subject that is relevant to specific user interaction contexts, making them more user-centered and user-friendly. The methodology is built upon prior work in privacy policy analysis and navigation context design.


Archive | 2003

The Lack of Clarity in Financial Privacy Policies and the Need for Standardization

Annie I. Antón; Julia Brande Earp; Davide Bolchini; Qingfeng He; Carlos Jensen; William H. Stufflebeam


ieee symposium on security and privacy | 2004

Inside JetBlue's privacy policy violations

Annie I. Antón; Qingfeng He; David L. Baumer


Archive | 2003

The Use of Goals to Extract Privacy and Security Requirements from Policy Statements

Annie I. Antón; Davide Bolchini; Qingfeng He


international conference on digital government research | 2004

A Prototype System for Transnational Information Sharing and Process Coordination

S. Su; José A. B. Fortes; T. R. Kasad; M. Patil; Andréa M. Matsunaga; Maurício O. Tsugawa; Violetta Cavalli-Sforza; Jaime G. Carbonell; Peter J. Jansen; Wayne H. Ward; Ronald A. Cole; Donald F. Towsley; Weifeng Chen; Annie I. Antón; Qingfeng He; C. McSweeney; L. deBrens; J. Ventura; P. Taveras; R. Connolly; C. Ortega; B. Piñeres; O. Brooks; M. Herrera

Collaboration


Dive into the Qingfeng He's collaboration.

Top Co-Authors

Avatar

Annie I. Antón

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

William H. Stufflebeam

North Carolina State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

C. Ortega

Organization of American States

View shared research outputs
Top Co-Authors

Avatar

Donald F. Towsley

University of Massachusetts Amherst

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M. Patil

University of Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peter J. Jansen

Carnegie Mellon University

View shared research outputs
Researchain Logo
Decentralizing Knowledge