Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies 2017
DOI: 10.1145/3078861.3078879
|View full text |Cite
|
Sign up to set email alerts
|

Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…Ranise and Siswantoro [34] devise an SMT-based tool for checking compliance of security policies at design time. Guarda et al [35] propose a logic-based framework to support the specification of information system designs, purpose-aware access control policies, and legal requirements.…”
Section: Related Workmentioning
confidence: 99%
“…Ranise and Siswantoro [34] devise an SMT-based tool for checking compliance of security policies at design time. Guarda et al [35] propose a logic-based framework to support the specification of information system designs, purpose-aware access control policies, and legal requirements.…”
Section: Related Workmentioning
confidence: 99%
“…Guarda et al [47] presented a set of categories that organized the information to be protected in the followed categories: 1) Classes: Personal Data refers to the data that allow identifying a personal; Sensitive Data (SD) which refers to Personal Data that includes information on ethnicity, gender, religion and political opinion; and Non-Persoal Data (NPD) that was information that could not be associated with a person; 2) Legal Roles: refers to actions that could be performed by agents within the Personal Data life cycle such as:…”
Section: Work Related To Personal Data Transparencymentioning
confidence: 99%
“…The paper presented by Guarda et al [47] proposed a methodology and a set of techniques for integrating Personal Data security with compliance with Personal Data usage regulations. The methodology aimed to support the abstraction of complex security actions and deliver friendly information to be analyzed and support the decision about the security of their data.…”
Section: Work Related To Personal Data Transparencymentioning
confidence: 99%
“…We handle variability in OCL constraints using partially specified operations that need to be later updated or redefined based on the context at hand. For example, the second constraint (L. [15][16][17][18][19] states that the age of data subjects should be greater than a certain dynamic threshold. However, when the context is known, the operation V getMinimumAgeForDS should dynamically identify the value of the threshold based on the country of residence of the data subject and the locations of the involved data processing, controllers, and processors.…”
Section: Gdpr Concepts (In Grey)mentioning
confidence: 99%
“…Ayala-Rivera and Pasquale [3] 2018 Partial × Burmeister et al [6] 2019 Complete × × Diamantopoulou et al [11] 2017 Partial × × × Sing [32] 2018 Complete × Caramujo et al [8] 2019 Partial × × Pullonen and Matulevicius [27] 2019 Complete × × Tom et al [38] 2018 Complete × × Chung et al [9] 2008 NA × Panesar-Walawege et al [26] 2013 NA Ranise and Siswantoro [28] 2020 Partial × × Guarda et al [18] 2017 NA This article 2021 Complete ships in their Information Systems, whilst complying with laws and regulations. Sing [32] proposes a method based on a metamodel for analysing business processes of information systems and aligning them with the GDPR.…”
Section: Compliance Available Expertmentioning
confidence: 99%