by the hospital to face emergency situations. Pre-
venting such actions may be critical for the life of
the patient. To address this problem, we need to de-
fine acceptable infringements and metrics for assess-
ing privacy risks by performing real-time risk analy-
sis. This make it possible to narrow down the number
of situations where rightful data usage is under inves-
tigation by considering only situations whose privacy
risks cannot be tolerated by the data subject.
Outsourcing is becoming a common business
practice of many organizations. This business strat-
egy is adopted to reduce costs, but it involves trans-
fer of business activities and data to an external sup-
plier. Suppose that the hospital outsources some ther-
apeutic activities to a subcontractor together with the
data needed for its execution. The hospital is no
more in control of such data. Therefore, it needs ev-
idence that the subcontractor has used the informa-
tion only for providing therapeutic treatments. To
address those requirements for data protection policy
compliance in distributed systems, we need an infras-
tructure that supports different security mechanisms
as well as infringement management. The infrastruc-
ture should allow seamless interoperability of differ-
ent enforcement mechanism, such as DRM, and on
the other hand deterring security mechanism such as
audit logic. This also requires real-time risk analy-
sis models that make it possible to define at run-time
flexible boundaries between preventive and deterring
mechanisms (i.e., dynamically select the most proper
mechanism for a certain situation based on the risks it
involves).
4 CONCLUSIONS
This paper has defined the basis for the development
of more trustworthy and privacy-awareIT systems. In
particular, this work intends
• support organizations in ensuring compliance
with data protection policies as the ability of iden-
tifying policy infringements will provide a con-
crete way to ensure organizations that they are
meeting their privacy promises;
• make users more accountable for their actions as
user behavior will be analyzed and possible mis-
conducts detected;
• be more flexible to deal with exceptions as the a-
posteriori policy compliance would make it pos-
sible to continue operations and account users for
eventual misconduct afterwards;
• provide more usable and scalable tools which will
automate many operations that are currently per-
formed by humans.
REFERENCES
Backes, M., Karjoth, G., Bagga, W., and Schunter, M.
(2004). Efficient comparison of enterprise privacy
policies. In Proc. of SAC’04, pages 375–382. ACM.
Byun, J.-W. and Li, N. (2008). Purpose based access control
for privacy protection in relational database systems.
VLDBJ, 17(4):603–619.
Cederquist, J. G., Corin, R. J., Dekker, M. A. C., Etalle,
S., den Hartog, J. I., and Lenzini, G. (2007). Audit-
based compliance control. International Journal of
Information Security, 6(2-3):133–151.
Chapin, P. C., Skalka, C., and Wang, X. S. (2008). Au-
thorization in trust management: Features and foun-
dations. ACM Comput. Surv., 40(3):1–48.
Dijkman, R. M., Dumas, M., and Ouyang, C. (2008).
Semantics and analysis of business process models
in BPMN. Information and Software Technology,
50(12):1281–1294.
Guarda, P. and Zannone, N. (2009). Towards the Devel-
opment of Privacy-Aware Systems. Information and
Software Technology, 51(2):337–350.
Hamlen, K. W., Morrisett, G., and Schneider, F. B. (2006).
Computability classes for enforcement mechanisms.
ACM Trans. Program. Lang. Syst., 28(1):175–205.
Hilty, M., Basin, D. A., and Pretschner, A. (2005). On Obli-
gations. In Proc. of ESORICS’05, LNCS 3679, pages
98–117. Springer.
Karjoth, G., Schunter, M., and Waidner, M. (2002).
Platform for Enterprise Privacy Practices: Privacy-
enabled Management of Customer Data. In Proc. of
PET’02, LNCS 2482, pages 69–84. Springer.
Ligatti, J., Bauer, L., and Walker, D. (2009). Run-time en-
forcement of nonsafety policies. TISSEC, 12(3):1–41.
Park, J. and Sandhu, R. (2004). The UCON
ABC
usage con-
trol model. TISSEC, 7(1):128–174.
Prandi, D., Quaglia, P., and Zannone, N. (2008). Formal
analysis of BPMN via a translation into COWS. In
Proc. of COORDINATION 2008, LNCS 5052, pages
249–263. Springer.
Rosenblatt, W., Mooney, S., and Trippe, W. (2001). Digital
Rights Management: Business and Technology. John
Wiley & Sons, Inc., New York, NY, USA.
Samarati, P. and di Vimercati, S. D. C. (2001). Access Con-
trol: Policies, Models, and Mechanisms. In FOSAD
2001/2002, LNCS 2946, pages 137–196. Springer.
SECRYPT 2010 - International Conference on Security and Cryptography
216