mon criteria. In Wang, G., Feng, J., Bhuiyan, M. Z. A.,
and Lu, R., editors, Security, Privacy, and Anonymity
in Computation, Communication, and Storage, pages
78–88, Cham. Springer International Publishing.
Bartolini, C., Lenzini, G., and Santos, C. (2018a). A Legal
Validation of a Formal Representation of GDPR Arti-
cles. In Proceedings of the 2nd JURIX Workshop on
Technologies for Regulatory Compliance (Terecom).
Bartolini, C., Lenzini, G., and Santos, C. (2018b). An inter-
disciplinary methodology to validate formal represen-
tations of legal text applied to the GDPR. In Proceed-
ings of the Twelfth International Workshop on Juris-
informatics (JURISIN).
Basin, D., Debois, S., and Hildebrandt, T. (2018). On
Purpose and by Necessity: Compliance Under the
GDPR. In Meiklejohn, S. and Sako, K., editors, Fi-
nancial Cryptography and Data Security, pages 20–
37, Berlin, Heidelberg. Springer Berlin Heidelberg.
Br
¨
aunlich, K., Richter, P., Grimm, R., and Roßnagel, A.
(2011). Verbindung von CC-Schutzprofilen mit der
Methode rechtlicher IT-Gestaltung KORA. Daten-
schutz und Datensicherheit-DuD, 35(2):129–135.
Common Criteria (2017). Common Criteria for Informa-
tion Technology Security Evaluation, Part 2: Security
functional components. Version 3.1 Revision 5.
Dewitte, P., Wuyts, K., Sion, L., Van Landuyt, D.,
Emanuilov, I., Valcke, P., and Joosen, W. (2019).
A comparison of system description models for data
protection by design. In Proceedings of the 34th
ACM/SIGAPP Symposium on Applied Computing,
SAC ’19, pages 1512–1515, New York, NY, USA.
ACM.
Hammer, V., Roßnagel, A., and Pordesch, U. (1992).
KORA: Konkretisierung rechtlicher Anforderungen zu
technischen Gestaltungsvorschl
¨
agen f
¨
ur IuK-Systeme.
Number 100 in Arbeitspapier. provet.
Jensen, M., Kapila, S., and Gruschka, N. (2019). Towards
Aligning GDPR Compliance with Software Develop-
ment: A Research Agenda. In Proceedings of the 5th
International Conference on Information Systems Se-
curity and Privacy - Volume 1: ICISSP,, pages 389–
396. INSTICC, SciTePress.
Kamm
¨
uller, F. (2018). Formal Modeling and Analysis of
Data Protection for GDPR Compliance of IoT Health-
care Systems. In 2018 IEEE International Confer-
ence on Systems, Man, and Cybernetics (SMC), pages
3319–3324.
Kamm
¨
uller, F., Ogunyanwo, O. O., and Probst, C. W.
(2019). Designing Data Protection for GDPR Com-
pliance into IoT Healthcare Systems. arXiv e-prints.
arXiv:1901.02426v1.
Lopes, I. M., Guarda, T., and Oliveira, P. (2019). How ISO
27001 Can Help Achieve GDPR Compliance. In 2019
14th Iberian Conference on Information Systems and
Technologies (CISTI), pages 1–6.
Marshall, D. and Hudek, T. (2018). Threat modeling for
drivers. last accessed on 2019-07-19.
Martin, D., Villa, X., Bogner, T., and Manaloto, A. (2018).
DREAD score calculator for Dradis. Version 3.11.0.
Microsoft (2009). The STRIDE Threat Model.
https://msdn.microsoft.com/en-us/library/ee823878
(v=cs.20).aspx. Last accessed on 2019-08-21.
Nissim, K., Bembenek, A., Wood, A., Bun, M., Gaboardi,
M., Gasser, U., O’Brien, D., Steinke, T., and Vadhan,
S. (2018). Bridging the gap between computer science
and legal approaches to privacy. In Harvard Journal of
Law & Technology, volume 31, pages 687–780. Har-
vard Journal of Law & Technology, Harvard Journal
of Law & Technology.
Palmirani, M., Martoni, M., Rossi, A., Bartolini, C., and
Robaldo, L. (2018). PrOnto: Privacy ontology for le-
gal reasoning. In K
˝
o, A. and Francesconi, E., editors,
Electronic Government and the Information Systems
Perspective, pages 139–152, Cham. Springer Interna-
tional Publishing.
Pandit, H. J., Fatema, K., O’Sullivan, D., and Lewis, D.
(2018a). GDPRtEXT - GDPR as a Linked Data Re-
source.
Pandit, H. J. and Lewis, D. (2017). Modelling Provenance
for GDPR Compliance using Linked Open Data Vo-
cabularies. In Proceedings of the 5th Workshop on
Society, Privacy and the Semantic Web - Policy and
Technology (PrivOn2017) (PrivOn).
Pandit, H. J., OSullivan, D., and Lewis, D. (2018b).
Queryable provenance metadata for GDPR compli-
ance. Procedia Computer Science, 137:262–268.
Ringmann, S. D. and Langweg, H. (2017). Determining
security requirements for cloud-supported routing of
physical goods. In 2017 IEEE Conference on Com-
munications and Network Security (CNS), pages 514–
521. IEEE.
Ringmann, S. D., Langweg, H., and Waldvogel, M. (2018).
Requirements for Legally Compliant Software Based
on the GDPR. In Panetto, H., Debruyne, C., Proper,
H. A., Ardagna, C. A., Roman, D., and Meersman, R.,
editors, On the Move to Meaningful Internet Systems.
OTM 2018 Conferences, pages 258–276. Springer In-
ternational Publishing.
Simi
´
c-Draws, D., Neumann, S., Kahlert, A., Richter,
P., Grimm, R., Volkamer, M., and Roßnagel, A.
(2013). Holistic and law compatible IT security eval-
uation: Integration of common criteria, ISO 27001/IT-
Grundschutz and KORA. International Journal of In-
formation Security and Privacy, 7(3):16–35.
Sion, L., Dewitte, P., Van Landuyt, D., Wuyts, K.,
Emanuilov, I., Valcke, P., and Joosen, W. (2019). An
architectural view for data protection by design. In
2019 IEEE International Conference on Software Ar-
chitecture (ICSA), pages 11–20.
Wuyts, K., Scandariato, R., Joosen, W., Deng, M., and Pre-
neel, B. (2014). LINDDUN privacy threat modeling.
https://linddun.org/index.php. Last accessed 2019-10-
22.
Yin, L. and Qiu, F. (2010). A novel method of security re-
quirements development integrated common criteria.
In 2010 International Conference On Computer De-
sign and Applications, volume 5, pages V5–531–V5–
535.
ICISSP 2020 - 6th International Conference on Information Systems Security and Privacy
480