
through extended use case and sequence diagrams is
proposed. In our previous work of (Vanezi et al.,
2020), we presented Di
´
alogoP, a formal language and
tool that allows the transformation of visual purpose-
aware requirements into a formal type language pur-
pose specification, which has the potential to be rig-
orously checked and validate the compliant behaviour
of a system model. As an immediate next step, we
plan on presenting Mod
´
eloP, an algorithm for trans-
forming the formal type purpose into a pi-calculus
formal model that is guaranteed to comply with its
purpose-aware requirements. This model then has
the potential to be used in model-driven engineering
to produce a system’s code. We also aim, as a fu-
ture work, to conduct an extensive evaluation of our
methodology with software engineers, and a valida-
tion through a real-life case study.
REFERENCES
Alhazmi, A. and Arachchilage, N. A. G. (2021). I’m
all ears! listening to software developers on putting
GDPR principles into software development practice.
Personal and Ubiquitous Computing, 25(5):879–892.
Alshareef, H., Stucki, S., and Schneider, G. (2021a). Refin-
ing privacy-aware data flow diagrams. In Proceedings
of SEFM 2021, pages 121–140. Springer.
Alshareef, H., Stucki, S., and Schneider, G. (2021b). Trans-
forming data flow diagrams for privacy compliance.
MODELSWARD, 21:207–215.
Alshareef, H., Tuma, K., Stucki, S., Schneider, G., and
Scandariato, R. (2022). Precise analysis of purpose
limitation in data flow diagrams. In Proceedings of
ARES 2022. ACM.
Antignac, T., Scandariato, R., and Schneider, G. (2016). A
privacy-aware conceptual model for handling personal
data. In Proceedings of ISoLA (1) 2016, pages 942–
957. Springer.
Antignac, T., Scandariato, R., and Schneider, G. (2018).
Privacy compliance via model transformations. In
Proceedings of EuroS&P Workshops 2018, pages
120–126. IEEE.
Barth, A., Datta, A., Mitchell, J. C., and Nissenbaum, H.
(2006). Privacy and contextual integrity: Framework
and applications. In Proceedings of S&P’06, pages
184–198.
Basin, D., Debois, S., and Hildebrandt, T. (2018). On pur-
pose and by necessity: Compliance under the GDPR.
In Proceedings of FC’18, pages 20–37. Springer.
Booch, G., Jacobson, I., Rumbaugh, J., et al. (1996). The
unified modeling language. Unix Review, 14(13):5.
Byun, J., Bertino, E., and Li, N. (2005). Purpose based ac-
cess control of complex data for privacy protection. In
Proceedings of SACMAT’05, pages 102–110. ACM.
De Masellis, R., Ghidini, C., and Ranise, S. (2015). A
declarative framework for specifying and enforcing
purpose-aware policies. In Proceedings of STM’15,
LNCS 9331, pages 55–71. Springer.
European Parliament and Council of the European Union
(2012). Charter of fundamental rights of the european
union. Official Journal of the European Union.
European Parliament and Council of the European Union
(2015). General data protection regulation. Official
Journal of the European Union.
Gemino, A. and Parker, D. (2009). Use case diagrams in
support of use case modeling: Deriving understanding
from the picture. Journal of Database Management,
20(1):1–24.
Goldman, E. (2020). An introduction to the California Con-
sumer Privacy Act (CCPA). Santa Clara Univ. Legal
Studies Research Paper.
Jafari, M., Fong, P. W., Safavi-Naini, R., Barker, K., and
Sheppard, N. P. (2011). Towards defining semantic
foundations for purpose-based privacy policies. In
Proceedings of CODASPY’11, pages 213–224. ACM.
Kala, K. (2019). Refinement of the general data protection
regulation (GDPR) model: administrative fines per-
spective. Master’s thesis, University of Tartu.
Kouzapas, D., Dardha, O., Perera, R., and Gay, S. J. (2016).
Typechecking protocols with Mungo and StMungo. In
Proceedings of PPDP’16, pages 146–159. ACM.
Matulevi
ˇ
cius, R., Tom, J., Kala, K., and Sing, E. (2020). A
method for managing GDPR compliance in business
processes. In CAiSE Forum 2020, pages 100–112.
Springer.
Micskei, Z. and Waeselynck, H. (2011). The many mean-
ings of UML 2 sequence diagrams: a survey. Software
& Systems Modeling, 10(4):489–514.
Petkovi
´
c, M., Prandi, D., and Zannone, N. (2011). Pur-
pose control: Did you process the data for the intended
purpose? In Workshop on Secure Data Management,
pages 145–168. Springer.
Riahi, S., Khosravi, R., and Ghassemi, F. (2017). Purpose-
based policy enforcement in actor-based systems. In
Proceedings of FSEN’17, LNCS 10522, pages 196–
211. Springer.
Sing, E. (2018). A meta-model driven method for establish-
ing business process compliance to GDPR. Master’s
thesis, University of Tartu.
Tom, J., Sing, E., and Matulevi
ˇ
cius, R. (2018). Concep-
tual representation of the GDPR: model and applica-
tion directions. In Proceedings of BIR 2018, pages
18–28. Springer.
Tschantz, M. C., Datta, A., and Wing, J. M. (2011). On the
semantics of purpose requirements in privacy policies.
arXiv preprint arXiv:1102.4326.
Tschantz, M. C., Datta, A., and Wing, J. M. (2012). For-
malizing and enforcing purpose restrictions in privacy
policies. In Proceedings of SP’12, pages 176–190.
IEEE Computer Society.
Vanezi, E., Kapitsaki, G. M., Kouzapas, D., Philippou, A.,
and Papadopoulos, G. A. (2020). Di
´
alogop-a language
and a graphical tool for formally defining GDPR pur-
poses. In Proceedings of RCIS 2020, pages 569–575.
Springer.
Yang, N., Barringer, H., and Zhang, N. (2007). A purpose-
based access control model. In Proceedings of IAS’07,
pages 143–148. IEEE Computer Society.
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
914