access control for a distributed calculus. Journal of
Computer Security, 14(2):113–155.
Bugliesi, M., Colazzo, D., Crafa, S., and Macedonio, D.
(2009). A type system for discretionary access con-
trol. Mathematical Structures in Computer Science,
19(4):839–875.
Cardelli, L., Ghelli, G., and Gordon, A. D. (2000). Secrecy
and group creation. In International Conference on
Concurrency Theory, pages 365–379. Springer.
Cavoukian, A. (2008). Privacy by design. Information
Commissioner’s Office.
Compagnoni, A. B., Gunter, E. L., and Bidinger, P. (2008).
Role-based access control for boxed ambients. Theo-
retical Computer Science, 398(1-3):203–216.
Data Protection and Privacy Commissioners (2010). Res-
olution on privacy by design. In Proceedings of
ICDPPC’10.
Dezani-Ciancaglini, M., Ghilezan, S., Jaksic, S., and Pan-
tovic, J. (2010). Types for role-based access control
of dynamic web data. In Proceedings of WFLP’10,
LNCS 6559, pages 1–29. Springer.
European Parliament and Council of the European Union
(2015). General data protection regulation. Official
Journal of the European Union.
Fournet, C., Gordon, A., and Maffeis, S. (2007). A type
discipline for authorization in distributed systems. In
20th IEEE Computer Security Foundations Sympo-
sium, CSF 2007, 6-8 July 2007, Venice, Italy, pages
31–48.
Fowler, M. (2004). UML distilled: a brief guide to the stan-
dard object modeling language. Addison-Wesley Pro-
fessional.
Gjermundrød, H., Dionysiou, I., and Costa, K. (2016).
privacytracker: A privacy-by-design gdpr-compliant
framework with verifiable data traceability controls.
In Proceedings of the International Conference on
Web Engineering, pages 3–15. Springer.
Havey, M. (2005). Essential business process modeling. ”
O’Reilly Media, Inc.”.
Hennessy, M. (2007). A distributed Pi-calculus. Cambridge
University Press.
Hennessy, M., Rathke, J., and Yoshida, N. (2005). safedpi:
a language for controlling mobile code. Acta Infor-
matica, 42(4-5):227–290.
Hennessy, M. and Riely, J. (2002). Resource access control
in systems of mobile agents. Information and Compu-
tation, 173(1):82–120.
Hes, R. and Borking, J. (1998). Privacy enhancing tech-
nologies: the path to anonymity. ISBN, 90(74087):12.
Hintze, M. and LaFever, G. (2017). Meeting upcoming gdpr
requirements while maximizing the full value of data
analytics.
Hustinx, P. (2010). Privacy by design: delivering
the promises. Identity in the Information Society,
3(2):253–255.
J
¨
urjens, J. (2002). Umlsec: Extending uml for secure
systems development. In Proceedings of the Inter-
national Conference on The Unified Modeling Lan-
guage, pages 412–425. Springer.
Kalloniatis, C., Kavakli, E., and Gritzalis, S. (2008). Ad-
dressing privacy requirements in system design: the
pris method. Requirements Engineering, 13(3):241–
255.
Kapitsaki, G., Ioannou, J., Cardoso, J., and Pedrinaci, C.
(2018). Linked usdl privacy: Describing privacy poli-
cies for services. In 2018 IEEE International Confer-
ence on Web Services (ICWS), pages 50–57. IEEE.
Kapitsaki, G. M., Kateros, D. A., Pappas, C. A., Tselikas,
N. D., and Venieris, I. S. (2008). Model-driven devel-
opment of composite web applications. In Proceed-
ings of the 10th International Conference on Informa-
tion Integration and Web-based Applications & Ser-
vices, pages 399–402. ACM.
Kapitsaki, G. M. and Venieris, I. S. (2008). Pcp: privacy-
aware context profile towards context-aware applica-
tion development. In Proceedings of the 10th Inter-
national Conference on Information Integration and
Web-based Applications & Services, pages 104–110.
ACM.
Kouzapas, D. and Philippou, A. (2017). Privacy by typing in
the π-calculus. Logical Methods in Computer Science,
13(4).
Lam, V. S. (2008). On π-calculus semantics as a formal
basis for uml activity diagrams. Prooceedings of the
International Journal of Software Engineering and
Knowledge Engineering, 18(04):541–567.
Milner, R., Parrow, J., and Walker, D. (1992). A calculus
of mobile processes, parts I and II. Information and
Computation, 100(1):1–77.
Ng, N., de Figueiredo Coutinho, J. G., and Yoshida, N.
(2015). Protocols by default - safe MPI code gener-
ation based on session types. In Proceedings of Inter-
national Conference on Compiler Construction, CC
2015, pages 212–232.
Perera, C., McCormick, C., Bandara, A. K., Price, B. A.,
and Nuseibeh, B. (2016). Privacy-by-design frame-
work for assessing internet of things applications and
platforms. In Proceedings of the 6th International
Conference on the Internet of Things, pages 83–92.
ACM.
Rubinstein, I. S. (2011). Regulating privacy by design.
Berkeley Technology Law Journal, 26:1409.
Sangiorgi, D. and Walker, D. (2003). The pi-calculus: a
Theory of Mobile Processes. Cambridge University
Press.
Schmidt, D. C. (2006). Model-driven engineer-
ing. COMPUTER-IEEE COMPUTER SOCIETY-,
39(2):25.
Thatte, S. (2001). Xlang: Web services for business process
design. Microsoft Corporation, 2001.
Yoshida, N., Hu, R., Neykova, R., and Ng, N. (2013). The
Scribble protocol language. In Proceedings of TGC
2013, Revised Selected Papers, pages 22–41.
A Formal Modeling Scheme for Analyzing a Software System Design against the GDPR
79