ACKNOWLEDGEMENTS
This work is partially supported by CyberSec4Europe
H2020 Grant Agreement No. 830929.
REFERENCES
˚
Akerlund, A. and Große, C. (2020). Integration of data
envelopment analysis in business process models: A
novel approach to measure information security. In
ICISSP, pages 281–288.
Barsocchi, P., Calabr
`
o, A., Ferro, E., Gennaro, C.,
Marchetti, E., and Vairo, C. (2018). Boosting a low-
cost smart home environment with usage and access
control rules. Sensors, 18(6):1886.
Bartolini, C., Calabr
`
o, A., and Marchetti, E. (2019a). En-
hancing business process modelling with data protec-
tion compliance: An ontology-based proposal. In Pro-
ceedings of the 5th International Conference on Infor-
mation Systems Security and Privacy, ICISSP 2019,
Prague, Czech Republic, February 23-25, 2019.,
pages 421–428.
Bartolini, C., Daoudagh, S., Lenzini, G., and Marchetti, E.
(2019b). Gdpr-based user stories in the access con-
trol perspective. In Piattini, M., da Cunha, P. R.,
de Guzm
´
an, I. G. R., and P
´
erez-Castillo, R., editors,
Quality of Information and Communications Technol-
ogy - 12th International Conference, QUATIC 2019,
Ciudad Real, Spain, September 11-13, 2019, Proceed-
ings, volume 1010 of Communications in Computer
and Information Science, pages 3–17. Springer.
Bartolini, C., Daoudagh, S., Lenzini, G., and Marchetti, E.
(2019c). Towards a lawful authorized access: A pre-
liminary gdpr-based authorized access. In van Sin-
deren, M. and Maciaszek, L. A., editors, Proceed-
ings of the 14th International Conference on Software
Technologies, ICSOFT 2019, Prague, Czech Republic,
July 26-28, 2019, pages 331–338. SciTePress.
Calabr
`
o, A., Daoudagh, S., and Marchetti, E. (2019). Inte-
grating access control and business process for GDPR
compliance: A preliminary study. In Proceedings of
the Third Italian Conference on Cyber Security, Pisa,
Italy, February 13-15, 2019.
Calabr
`
o, A., Marchetti, E., Moroni, D., and Pieri, G. (2019).
A dynamic and scalable solution for improving daily
life safety. In Proceedings of the 2nd International
Conference on Applications of Intelligent Systems,
pages 1–6.
Carauta Ribeiro, R. and Dias Canedo, E. (2020). Using
mcda for selecting criteria of lgpd compliant personal
data security. In The 21st Annual International Con-
ference on Digital Government Research, dg.o ’20,
page 175–184, New York, NY, USA. Association for
Computing Machinery.
Dernaika, F., Cuppens-Boulahia, N., Cuppens, F., and Ray-
naud, O. (2020). Accountability in the A posteriori
access control: A requirement and a mechanism. In
Quality of Information and Communications Technol-
ogy - 13th International Conference, QUATIC 2020,
Faro, Portugal, September 9-11, 2020, Proceedings,
volume 1266 of Communications in Computer and In-
formation Science, pages 332–342. Springer.
European Union (2016). Regulation (EU) 2016/679 of the
European Parliament and of the Council of 27 April
2016 (General Data Protection Regulation). Official
Journal of the European Union, L119:1–88.
Greaves, B., Coetzee, M., and Leung, W. S. (2018). Access
control requirements for physical spaces protected by
virtual perimeters. In Furnell, S., Mouratidis, H., and
Pernul, G., editors, Trust, Privacy and Security in Dig-
ital Business, pages 182–197, Cham. Springer Inter-
national Publishing.
Haofeng, J. and Xiaorui, G. (2019). Wi-fi secure access con-
trol system based on geo-fence. In 2019 IEEE Sym-
posium on Computers and Communications (ISCC),
pages 1–6.
Jensen, C. D., Geneser, K., and Willemoes-Wissing, I. C.
(2013). Sensor enhanced access control: Extend-
ing traditional access control models with context-
awareness. In Fern
´
andez-Gago, C., Martinelli, F.,
Pearson, S., and Agudo, I., editors, Trust Management
VII, pages 177–192, Berlin, Heidelberg. Springer
Berlin Heidelberg.
Krenn S. et al. (2020). Deliverable D3.2: Cross Sec-
toral Cybersecurity Building Blocks. https://
cybersec4europe.eu/wp-content/uploads/2020/06/D3.
2-Cross sectoral cybersecurity-building-blocks-v2.0.
pdf.
Neuh
¨
uttler, J., Fischer, R., Ganz, W., and Urmetzer, F.
(2020). Perceived quality of artificial intelligence in
smart service systems: A structured approach. In
Shepperd, M., Brito e Abreu, F., Rodrigues da Silva,
A., and P
´
erez-Castillo, R., editors, Quality of Infor-
mation and Communications Technology, pages 3–16,
Cham. Springer International Publishing.
OASIS (2013). eXtensible Access Control Markup Lan-
guage (XACML) Version 3.0. http://docs.oasis-open.
org/xacml/3.0/xacml-3.0-core-spec-os-en.html.
Samir Labib, N., Liu, C., Esmaeilzadeh Dilmaghani,
S., Brust, M., Danoy, G., and Bouvry, P. (2018).
White paper: Data protection and privacy in smart
ict-scientific research and technical standardization.
Technical report, ILNAS.
Sforzin A. et al. (2020). Deliverable D3.11: Definition of
Privacy by Design and Privacy Preserving Enablers.
https://cybersec4europe.eu/publications/deliverables/.
Sokolovska, A. and Kocarev, L. (2018). Integrating tech-
nical and legal concepts of privacy. IEEE Access,
6:26543–26557.
How to Improve the GDPR Compliance through Consent Management and Access Control
541