GDPR requirements referring access control mech-
anisms, i.e., from the architectural point of view.
The analysis will investigate functional and non-
functional requirements so to assess the adequacy of
the current reference architecture (e.g., XACML) and
to provide possible extensions to align the access con-
trol mechanisms to the GDPR principles.
We also intend to investigate thoroughly on the ex-
pressiveness and adequacy of policy languages of cur-
rent access control models, such as ABAC and RBAC,
to eventually make legally sufficient access control
systems. This research may either bring evidence that
current model are adequate for the task or lead to for-
mal extensions of the ABAC and RBAC core models.
REFERENCES
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., and
Schilders, L. (2013). Automated testing of extensible
access control markup language-based access control
systems. IET Software, 7(4):203–212.
Brossard, D., Gebel, G., and Berg, M. (2017). A systematic
approach to implementing abac. In Proceedings of the
2Nd ACM Workshop on Attribute-Based Access Con-
trol, ABAC ’17, pages 53–59, New York, NY, USA.
ACM.
Cerbo, F. D., Martinelli, F., Matteucci, I., and Mori, P.
(2018). Towards a declarative approach to stateful and
stateless usage control for data protection. In WEBIST,
pages 308–315. SciTePress.
Chowdhury, O., Chen, H., Niu, J., Li, N., and Bertino, E.
(2012). On xacml’s adequacy to specify and to enforce
hipaa. In Proceedings of the 3rd USENIX Conference
on Health Security and Privacy, HealthSec’12, pages
11–11, Berkeley, CA, USA. USENIX Association.
Fatema, K., Debruyne, C., Lewis, D., OSullivan, D., Mor-
rison, J. P., and Mazed, A. (2016). A semi-automated
methodology for extracting access control rules from
the european data protection directive. In 2016 IEEE
Security and Privacy Workshops (SPW), pages 25–32.
Hu, C. T., Ferraiolo, D. F., Kuhn, D. R., Schnitzer, A., San-
dlin, K., Miller, R., and Scarfone, K. (2019). Guide
to attribute based access control (abac) definition and
considerations [includes updates as of 02-25-2019].
Technical report.
Jin, X., Krishnan, R., and Sandhu, R. (2012). A unified
attribute-based access control model covering dac,
mac and rbac. In Data and Applications Security
and Privacy XXVI, pages 41–55, Berlin, Heidelberg.
Springer Berlin Heidelberg.
OASIS (2013). eXtensible Access Control Markup
Language (XACML) Version 3.0. http:docs.oasis-
open.orgxacml3.0xacml-3.0-core-spec-os-en.html.
OASIS (2015). XACML v3.0 Privacy Pol-
icy Profile Version 1.0. http:docs.oasis-
open.orgxacml3.0privacyv1.0xacml-3.0-privacy-
v1.0.html.
Palmirani, M., Martoni, M., Rossi, A., Bartolini, C., and
Robaldo, L. (2018). Legal ontology for modelling
GDPR concepts and norms. In Legal Knowledge and
Information Systems - JURIX 2018: The Thirty-first
Annual Conference, Groningen, The Netherlands, 12-
14 December 2018., pages 91–100.
Sandhu, R. S. and Samarati, P. (1994). Access control: prin-
ciple and practice. IEEE Communications Magazine,
32(9):40–48.
Ulbricht, M. and Pallas, F. Yappl - A lightweight privacy
preference language for legally sufficient and auto-
mated consent provision in iot scenarios. In DPM
2018 and CBT 2018 - ESORICS 2018 International
Workshops, Barcelona, Spain, September 6-7, 2018.
Xiao, X., Paradkar, A., Thummalapenta, S., and Xie, T.
(2012). Automated extraction of security policies
from natural-language software documents. In Pro-
ceedings of the ACM SIGSOFT FSE ’12, FSE ’12,
pages 12:1–12:11, New York, NY, USA. ACM.
Xu, D., Kent, M., Thomas, L., Mouelhi, T., and Le Traon, Y.
(2015). Automated model-based testing of role-based
access control using predicate/transition nets. IEEE
Transactions on Computers, 64(9):2490–2505.
ICSOFT 2019 - 14th International Conference on Software Technologies
338