<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Model-driven Evidence-based Privacy Risk Control in Trustworthy Smart IoT Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Victor Munte´s-Mulero , Jacek Dominiaky, Elena Gonza´lezz</string-name>
          <email>f victor.muntes, yjacek.dominiak, zelena.gonzalezg@beawre.com</email>
          <email>zelena.gonzalezg@beawre.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>David Sanchez-Charles</string-name>
          <email>david.sanchez@trialog.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Beawre Digital SL</institution>
          ,
          <addr-line>Barcelona</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Trialog SA</institution>
          ,
          <addr-line>Paris</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
      </contrib-group>
      <fpage>23</fpage>
      <lpage>30</lpage>
      <abstract>
        <p>-Preventing privacy-related risks in the creation of Trustworthy Smart IoT Systems (TSIS) will be essential, not only because of the growing amount of regulations that impose strict mechanisms to control risks and quality, but also to effectively mitigate the effect of potential threats exploiting vulnerabilities that may jeopardize privacy. While privacy-related risks usually consider assets represented by elements of the functional description of a TSIS, most monitoring efforts are focused on monitoring security aspects related to the system architecture components and it is not straightforward to link the evidences collected through this monitoring systems to functional description elements, making it difficult to use this information for privacy-related risk management. In this paper, we propose a methodology for continuous risk management and a model for risks to increase trustworthiness in IoT systems by enabling continuous monitoring of privacy-related risks. Our approach is based in connecting our risk model with a modelling language to describe IoT architectures, such as that proposed in GeneSIS, and Data Flow Diagrams (DFD). With the combination of architecture (technical description) and data flow models (functional description), we enable continuous risk management using monitoring to improve risk assessment related to data protection issues, as required by GDPR. Index Terms-Risk management, Trust, IoT, Continuous, Privacy, Security</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Until now, IoT system innovations have been mainly
focused on sensors, device management and connectivity,
usually aimed at gathering data for processing and analysis in the
cloud1. The next generation IoT systems need to perform
distributed processing and coordinated behaviour across IoT, edge
and cloud infrastructures, manage the closed loop from sensing
to actuation, and cope with vast heterogeneity, scalability and
dynamicity of IoT systems and their environments [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. To
unleash the full potential of IoT, it is essential to facilitate
the creation and operation of trustworthy Smart IoT Systems
or, for short, TSIS. TSIS typically operate in changing and
often unpredictable environments. Thus, the ability of these
systems to continuously evolve and adapt to their new
environment is essential to ensure and increase their trustworthiness,
      </p>
      <p>Copyright © 2019 for this paper by its authors. Use permitted under Creative
Commons License Attribution 4.0 International (CC BY 4.0).</p>
      <p>This work is supported by the European Commission through the ENACT
project under Project ID: 780351 and the PDP4E project under Project
ID: 787034.</p>
      <p>1IEC white paper entitled IoT 2020: Smart and secure IoT platform.
http://www.iec.ch/whitepaper/pdf/iecWP-loT2020-LR.pdf
quality and user experience. Besides, by 2021, the number
of connected things will grow to 25 billion, according to
Gartner2. Thus, processes that were formerly run by humans
will be automated, making it much more difficult to control
data ownership, privacy and regulatory compliance.</p>
      <p>
        Yan et al. [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] described the different dimensions of trust
for IoT systems, concluding that risk management is essential
to guarantee trustworthiness. Markets in the need of TSIS,
such as eHealth, are just flourishing and businesses will be
continuously adapting to new technologies. In this context,
poor risk management together with a reactive strategy usually
forces companies to continuously re-factor application
architectures to improve software quality and security, incurring
high re-implementation costs [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In general, there is the lack
of solutions to support continuous control of risks through
evidence collection. Companies have little control on actual
effectiveness of the mitigation actions defined during risk
management process. Besides, many companies fill this gap by
using manual procedures based on storing all the information
in spreadsheets, by departments and locally [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. This approach
rapidly turns inefficient as projects or teams grow.
      </p>
      <p>
        In parallel, GDPR discusses data protection by design and
by default, remarking that it is essential to consider privacy
from the beginning to address related issues successfully. This
is specially true in the IoT arena, where technologies are not
consolidated yet and mixing legal requirements with a deep
technical understanding is challenging. In particular, including
privacy aspects in a continuous risk management process
is difficult. Continuous evidence collection to support risk
management is usually key, but most monitoring approaches
focus on collecting evidences from the TSIS infrastructure or
technical architectural components. However, privacy-related
risks are usually detected by analyzing functional descriptions
of the system [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] (e.g. data flows). Connecting this functional
level with the components of the architecture that are being
monitored is not trivial. Recognizing the overlap between
privacy and security is key to determining when existing security
risk models may be applied to address privacy concerns [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>
        In this paper, we improve continuous risk management in
TSIS development by embedding privacy-related risks
explic2https://www.networkworld.com/article/3322517/internet-of-things/acritical-look-at-gartners-top-10-iot-trends.html
itly through the combined used of models for both the
architecture and the data flow implemented on the components of the
architecture. We present a new approach that, through linking
GeneSIS [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] models and Data Flow Diagrams (DFDs) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ],
improves risk assessment process for privacy-related risks. We
achieve this by enabling the use of the information that is
typically collected from the infrastructure to control security,
thanks to the link that LINDDUN [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ] establishes between
privacy and security threads in STRIDE [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
      </p>
      <p>This paper is organized as follows. Section II provides an
analysis of the state of the art. In Section III, we describe
a usual use case for our proposal. Section IV presents a
brief analysis of existing approaches and risk guidelines in
standards. Section V presents our methodology and a class
diagram model to describe the concepts we use in our risk
management methodology, and describe the mapping between
the architecture model and DFDs as well as our risk model.
Finally, in Section VI, we draw some conclusions.</p>
    </sec>
    <sec id="sec-2">
      <title>II. STATE OF THE ART</title>
      <p>
        There exist quantitative risk methodologies and tools, like
RiskWatch3 or ISRAM [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and qualitative risk
methodologies such as OCTAVE [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], CORAS [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] or STRIDE [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
Traditional risk management methodologies focus on the
assessment of risks at a singular stage in time, and do not address
the challenge of managing continuously evolving risk profiles.
      </p>
      <p>
        Managing continuous changes in software development has
been studied from different perspectives. The most common
practice in industry is continuous software integration [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ].
Fitzgerald et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], for instance, published a roadmap and
agenda for continuous software engineering. Besides, there is
a growing interest on security and privacy and this has
motivated work on continuous security and regulatory compliance.
Continuous security [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ] was proposed to prioritize security
throughout the whole software development life cycle.
      </p>
      <p>
        There has been work on risk management in complex and
evolving environments. For instance, different papers [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ],
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] propose managing risk related to accountability,
assurance, agility or financial aspects in multi-cloud applications.
Risks analysis is then used to guide the selection of cloud
service providers. Shrivastava et al. [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] present a risk
management framework for distributed agile development,
studying risks related to software development life cycle, project
management, group awareness, etc. However, they focus on
analysing risk factors that represent a threat to the successful
completion of a software development project, rather than
risk related to non-functional requirements such as security or
privacy. In [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], the authors performed a systematic literature
review on risks and control mechanisms for distributed
software development. Moran [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] explicitly tackles issues related
to risk management for agile software development. Moran
proposes a risk modified kanban board and user story map.
Finally, in [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], a framework to manage risks that supports
collaboration, agility, and continuous development is proposed.
3RiskWatch: https://www.riskwatch.com . Accessed: 2019-07-18
      </p>
      <p>None of these contribution tackles how to monitor
privacyrelated risks for continuous risk management.</p>
      <p>
        In general, even for security, risks are not analysed and
monitored continuously and historical data is not taken into
account [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Besides, security risks are assessed based on
speculation rather than evidence [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. The interaction
between analytics capabilities and information security risk
management (ISRM) capabilities can help organizations to
perform continuous risk assessments and enable
evidencebased decision making [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>
        In parallel, Article 25 in GDPR4 discusses data protection
by design and by default, underlining that considering privacy
from the beginning is essential to address privacy successfully.
GDPR establishes binding data protection principles,
individuals rights, and legal obligations to ensure the protection of
personal data of EU citizens. However, legal measures need
to come along with technical measures to protect privacy and
personal data in practice. PDP4E H2020 project [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] focuses
on the importance to involve engineers in the loop, for
Privacyby-Design (PbD) to be viable.
      </p>
      <sec id="sec-2-1">
        <title>A. MUSA Risk Assessment tool</title>
        <p>
          The MUSA Risk Assessment tool5 is a reference
implementation of the continuous risk management framework proposed
by [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ]. The tool uses a pull system in the style of Kanban,
where the status of each asset with respect to a risk analysis
methodology is expressed through the different columns in the
Kanban board. Albeit this approach makes the tool agnostic
to any specific risk analysis methodology, the tool showcases
a methodology that is tailored to multi-cloud environments.
        </p>
        <p>In order to assess the risks in the different components
of an application, the tool asks users to provide an informal
description of the system and its components. Then, users are
free to choose among pre-defined threats that may potentially
affect each individual component. Once threats are selected,
they are automatically classified in the STRIDE
securityoriented framework (Spoofing identity, Tampering,
Repudiation, Information disclosure, Denial of service and Elevation
of privilege). Then the user can continue with the assessment,
evaluation and posterior mitigation of the risk. We take this
tool as the baseline for the proposal presented in this paper.</p>
      </sec>
      <sec id="sec-2-2">
        <title>B. GeneSIS Modelling Language</title>
        <p>
          Recent work in the ENACT H2020 project [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] defined TSIS
as the next generation IoT systems, capable of performing
distributed processing and coordinated behaviour across IoT,
edge and cloud infrastructures. GeneSIS [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] facilitates the
development and continuous deployment of TSIS, allowing
decentralized processing across heterogeneous IoT, edge, and
cloud infrastructures. GeneSIS includes a domain-specific
modelling language to model the architecture of TSIS as well
4Regulation (EU) 2016/679 of the European Parliament and of the Council
of 27 April 2016 on the protection of natural persons with regard to the
processing of personal data and on the free movement of such data, and
repealing Directive 95/46/EC (General Data Protection Regulation). Official
Journal of the European Union, L119:188, May 2016.
        </p>
        <p>5https://musa-project.eu/node/326
as the orchestration and deployment. In this paper, we will base
our Risk Management methodology in the GeneSIS
domainspecific modelling. Figure 1 shows a high level description of
the generic elements modelled through GeneSIS.</p>
        <p>
          GeneSIS modelling language is an extension of
ThingML [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. ThingML is a domain specific language
for modelling distributed IoT systems including the behaviour
of the distributed components in a platform-specific or
-independent way. Currently, GeneSIS engine maintains a
list of the generic component types that are available in the
registry, namely FIWARE Orion, Arduino, RFXCom, and
ThingML. For instance, a component written in ThingML will
use the ThingML type. However, GeneSIS is very flexible
and allows any user to create new component types at any
level of abstraction (e.g. “SQL database” or even “Oracle
SQL database”). Any of these types can be modelled as
a subtype of an Internal, an External or an Infrastructure
Component (see Figure 1). Communication channels can be
established between internal and external components and
also between internal components through execution ports.
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>C. LINDDUN</title>
        <p>
          LINDDUN [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] is a threat modelling methodology that
encourages risk analysts to address privacy risks affecting
endusers of the application or system. This methodology provides
some guidance to identify and categorize threats under a set
of general risks (Linkability, Identifiability, Non-repudiation,
        </p>
      </sec>
      <sec id="sec-2-4">
        <title>Detectability, Disclosure of information, Unawareness, and</title>
        <p>
          Non-compliance). LINDDUN is sometimes considered the
privacy-oriented alternative to the STRIDE framework. In
fact, LINDDUN threats are described in the so-called
LINDDUN trees which are explicitly connected to STRIDE threats
trees [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ]. We take this link between privacy and security as
the baseline for our proposal in this paper.
        </p>
        <p>
          Unlike the approach proposed by MUSA Risk Assessment
tool, which grounds its threat modelling on descriptions of
individual components, the LINDDUN methodology requires
to formalize the functionality of the system and their
dependencies with respect to personal data. In such sense,
LINDDUN proposed the usage of the Data Flow Diagrams [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
The notation of a DFD is based upon 4 distinct element types:
(i) an external entity (i.e., end-users or third party services
that are external to the system), (ii) a data flow (explains
data propagation and dependencies between all the functional
components), (iii) a data store (i.e., a passive container of
information) and (iv) a process (i.e., a computation unit).
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>III. USE CASE MOTIVATION</title>
      <p>We devote this subsection to explain the usual scenario we
may find in a software company that offers Trustworthy IoT
solutions. The aim of this section is to provide some context
for the paper rather than characterizing the generic
organization of TSIS companies, as this would require conducting an
exhaustive and more accurate study.</p>
      <p>The scenario discussed is particularly relevant in highly
regulated markets where a company needs to prove they follow
a risk-based approach as required by GDPR or comply with
existing standards such as ISO 27001 for security for instance.
This company needs to gain trust because it is dealing with
data that may be crucial about users (e.g. health data about
remotely monitored patients at home). Content of this section
is based on our experience with our customers.</p>
      <p>Companies in highly regulated markets usually have risk
management owners in the organization. The exact role they
play may depend on the type of company and the type of
requirements this company may have. For instance, the company
may have a Chief Security Officer (CSO), a Data Protection
Officer (DPO) as requested in some situations by GDPR, etc.
In large organizations, it is common to have risk analysts to
support the risk management process, while in SMEs this is
typically a role played by individuals whose background and
knowledge is not on risk management. Companies that are
truly following DevOps principles, tend to make decisions
around risk in a collegial manner, involving product owners,
risk analysts, developers, operations, etc.</p>
      <p>In this context, companies need to face many challenges,
including coping with rapid software evolution, the need to
obtain and keep relevant certificates to gain the trust of their
customers, the need to prepare for any unwanted incident that
may negatively impact their businesses, etc. For this, they need
to prepare internal policies to describe their procedures to
handle risk management. Among these procedures, frequent
meetings are usual where they need to rapidly understand
the status of risks in their projects, as well as, to reshape
or re-prioritize risk plans to better accommodate the current
situation and market. When these needs are crossed with IoT,
proper risk management procedures become even more
significant. Requirements change frequently, technology evolves
rapidly and, consequently, companies adopt agile software
development processes. Therefore, continuous risk management
is probably the only effective strategy to ensure that risks are
properly mitigated in long-term development processes.</p>
      <p>Figure 2 shows the high-level description of a typical risk
management processes implemented in software companies. A
company may be developing software in the form of a product
or SaaS (e.g. connected to a trustworthy IoT system). Each
product will have a person playing the role of the product
owner, who will supervise the whole development of that
product. Apart from this role, the company will typically have
a risk owner, who owns the risk management process and
strategy. This role may also take the form of a committee,
composed of different people playing different roles, and bringing
different perspectives, including Chief Product Officers, Chief
Technology Officers or Chief Operation Officers. Risk owner
will typically start and contribute and monitor the risk
management process. Engineers may also be involved in this process
including developers and operators, to empower a DevOps
approach. Architects and Product Owners will also be involved
in the risk management process. An efficient risk management
process will help the organization to understand risk level
associated to detected risks and prioritize the implementation
of mitigation actions (or treatments or controls) in the form
of new product features. Finally, risk management owner(s)
needs to report the status of risk management.</p>
      <p>In this context, companies lack mechanisms to continuously
monitoring processes. In particular, there is a lack of
mechanisms to monitor privacy-related issues. They require
mechanisms to monitor the implementation of related mitigation
actions and the effectiveness of the treatments.</p>
      <p>IV. ALIGNMENT WITH STANDARDS AND BEST PRACTICES</p>
      <p>While most risk management methodologies presented in
the literature and accepted by the international community
through standards, scientific work or other best practices are
similar, they also differ in some aspects. Following, we analyze
some well-known risk management methodologies or risk
management guidelines proposed in standards, focusing in
particular in those related to privacy issues. In particular, we
explore the following best practices in industry and some
previous related FP7 and H2020 projects:</p>
      <p>Risk management methodologies used in MODAClouds6
and MUSA7 (and CORAS methodology implicitly):
MODAClouds risk management methodology has a
strong influence from CORAS, simplified to favour
usability. It was later on inherited and refined in MUSA.
We use it as the baseline of our methodology.</p>
      <p>ISO/IEC 29134:2017 : it gives guidelines for: (i) a
process on privacy impact assessments, and (ii) a structure
and content of a Privacy Impact Assessment (PIA) report.
PIAs include a methodology for risk management.
ISO/IEC 27001:2013 : it specifies the requirements for
establishing, implementing, maintaining and continually
improving an information security management system
within the context of the organization. It also includes
requirements for managing information security risks.
ISO/IEC 27550 (to be published in 2019) : this standard
complements ISO/IEC 27001:2013 by providing an
engineering, privacy-oriented perspective. LINDDUN is
mentioned as a methodology in this risk-oriented standard.
ISO 31000:2018 : it provides guidelines on managing
risk. It can be used throughout the life of the any
organization and can be applied to any activity, including
decision-making at all levels. Since it is the most generic
standard to describe risk management activities and it is
agnostic to a particular context, we take it as a general
reference for our methodology.</p>
      <p>Figure 3 shows a visual summary of the main steps followed
by the risk management methodology in MUSA and the steps
suggested in ISO/IEC 29134:2017. While the vocabulary is not
identical, the processes are similar, and it is possible to
establish reasonable mappings among them. For instance, in MUSA
6MODAClouds FP7 (Project id: 318484) www.multiclouddevops.com
7MUSA H2020 (Project id: 644429) www.musa-project.eu
assets and vulnerabilities are defined and threats are identified
with respect to those. In ISO/IEC 29134:2017, the definition
of assets and vulnerabilities is quite ambiguous, but they put
the emphasis in the description of risk sources. Both define
threats (i.e. unwanted incidents in CORAS) and then risks. In
general, a risk is an unwanted incident which likelihood and
impact have been analyzed. Some methodologies talk about
treatments, while others talk about controls. In general, these
are all different terms to refer to mitigation actions.</p>
    </sec>
    <sec id="sec-4">
      <title>V. MODEL-BASED CONTINUOUS RISK MANAGEMENT</title>
      <p>In this section, we will present our risk management
methodology, focusing in particular on capturing those aspects
that make the risk management process suitable to enable
continuous risk management on privacy-related issues.</p>
      <p>
        Figure 4 presents a class diagram to model risk
management concepts to allow to control privacy risks using DFDs.
In particular, we consider each element of a DFD (Entity,
DataFlow, DataStore and Process) a specific asset, following
LINDDUN methodology. This diagram is inspired by the
UML diagram presented by Gupta et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. We generalize
that UML diagram eliminating the part of the model that was
specific to cloud aspects. We also introduce the idea of a
vulnerability associated to a combination of different assets in
the system. In order to consider vulnerabilities and unwanted
incidents on multiple assets, we propose a new AssetSet
class and link vulnerabilities to this class (in addition to the
link to Asset class). Finally, note that when simplifying the
risk management process is important, the explicit description
of vulnerabilities may be taken into consideration implicitly.
Therefore, an alternative UML diagram could be considered
that connects Asset class with Unwanted Incident class.
      </p>
      <p>In Figure 5, we propose a methodology for risk management
for the creation of TSIS and we indicate the actors involved in
each of those steps. Our methodology, inspired by the previous
analysis, can be summarized in 6 main steps:</p>
      <p>S1: TSIS Assets Definition: first, we edit or load DFDs
representing the functional description of the system. This
DFDs are useful to manage risks related to privacy as
described by LINDDUN, although they were initially
used for security risk control (e.g. in STRIDE). Although</p>
      <p>Fig. 5. Proposed Model-based Risk Management methodology. Roles: (O)
Risk Management Owner; (P) Product Owner; (A) Architect; (V) Developer
and (R) Risk Analist</p>
      <p>DFDs represent our primary assets in the risk
management process, our proposal entails the use of a second
layer of supporting assets in the form of TSIS
archictecture description. Therefore, in S1, GeneSIS Models (or
equivalent architectural models) are also traversed and
components are pre-loaded. This step also includes the
definition of the vulnerabilities related to a component of
an architecture or a subset of components.</p>
      <p>S2: Threats Identification: in this step, users identify
threats that may affect the components in the described
system. These threats are captured as instances of the
Unwanted Incident class in the UML diagram in Figure 4.
S3: Risk Assessment: risk assessment is composed of
two different steps: risk analysis, where risks are
evaluated in terms of likelihood and consequence, and risk
evaluation, where risks are accepted, or they are classified
as risks that need to be mitigated.</p>
      <p>S4: Definition of Treatments: mitigation actions are
defined in the form of treatments.</p>
      <p>S5: Residual Risk Assessment: once the mitigation
controls are defined, the residual risks need to be reassessed.
This involves again two steps: risk analysis, where
likelihood and consequence are updated after the application
of the control(s), and risk re-evaluation, where risks are
analysed again, and they are classified as accepted or
further mitigation actions required.</p>
      <p>S6: Treatment Implementation Control: finally, we
add a last step in the methodology that goes beyond
other previous methodologies. In particular, it involves
the monitoring of the effectiveness of the mitigation
actions proposed in the previous step. This step requires
the connection to data collectors or agents that collect
evidences from a monitoring system in order to match
them to treatments and risks. Mapping of DFDs and
architectural models will be the key for this to be possible.
Note that this methodology is continuous in the sense that
new evidence is continuously collected to challenge previous
knowledge upon which risk-related decisions were made in the
past. While immediate triggering of mitigation actions is not
our main focus, conditional options based on the status of the
system could be included in S4 to strengthen the continuous
approach. Also, the methodology is particularly customized for
TSIS, specifically in S1, where GeneSIS models are used as
the baseline, and S6, where evidences are collected to consider
privacy-related issues, as we show later on in this section.
However, the methodology can be easily adapted to other types
of systems and used generically. This will mainly depend on
the models and the risks and mitigation actions defined.</p>
      <sec id="sec-4-1">
        <title>Model-based Risk Management approach</title>
        <p>GDPR establishes a set of duties imposed on the data
processors, controllers and third parties which are aimed at
honoring the corresponding data subjects rights. In GDPR, risk
is explicitly scoped (Rec. 76) with regards to the rights and
freedoms of the data subject. In order to understand whether
these data subject rights and principles (described in GDPR)
are being effectively protected by mitigating existing risks,
current approaches tend to analyze the data flow in the system
(e.g. LINDDUN and DFDs). However, elements in a DFD
tend to be defined at a functional level (e.g. process to collect
profile data from a user or process to merge data from two
existing data sources). In this situation, collecting system data
to monitor a threat related to the identifiability of an entity as
defined by LINDDUN, just to take an example, is not obvious,
if we do not understand the relationship of a data flow in
the application with the architecture of the infrastructure that
we monitor. Without a proper connection of these elements
to architectural levels that can be monitored, continuous risk
management for privacy becomes much more difficult. Most
monitoring tools monitor the infrastructure level. These tools
may monitor system aspects in a data center or a particular
server, tools for network monitoring, etc, and collect metrics.</p>
        <p>The main contribution of the approach proposed in this
section is the mapping of TSIS architecture models, such as the
one proposed by GeneSIS, with data flows in the application
under analysis (e.g. DFDs). In S6, we may assume that the
elements from both models have been mapped establishing a
link between the two types of models. Details on this mapping
are provided below. For instance, a NoSQL data store in our
system architecture may be mapped to a data store component
in a DFD. As another example, a particular process element in
a DFD may be mapped to the server the process is running on.
As an alternative, it is possible that the mapping is not
preestablished before starting the risk analysis process. In this
situation, we consider that phase S1 can be extended to allow
the user to establish this mapping manually.</p>
        <p>
          1) Model mappings: in order to drive the mapping between
the architecture model and DFDs, we take as the baseline
the connection between privacy-related threats studied in
LINDDUN and the vulnerabilities that are related to security
aspects of the architecture, as captured by STRIDE. Please
note that LINDDUN defines a connection between threats in
LINDDUN categories and STRIDE threats through their threat
trees catalogs [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ]. Table I is a summary of the analysis of the
connection of these LINDDUN and STRIDE threat catalogs.
        </p>
        <p>
          In Table II, we show a sample of vulnerabilities extracted
from [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ] related to the STRIDE threats analyzed in Table I.
The table shows a brief description and some usual mitigation
actions. In the last two columns, we show examples of metrics
that could be used for continuous security monitoring and
what type of architectural components are being monitored.
We would like to remark that this table is not meant to
be an exhaustive list of all the potential threats, but some
examples for illustrative purposes that serve the purpose of
analyzing which DFD components are to be mapped to which
architectural components.
        </p>
        <p>Note that these vulnerabilities are specially relevant in an
IoT context. For instance, let us take the example in Table II
related to Information Disclosure of Data Flow. There may
be different vulnerabilities associated in particular to TSIS.
For instance, if we have a device IoT hub, eavesdropping
or interfering the communication between the device and the
gateway would be a potential threat. You may also find similar
threats in the communication between devices, where data may
be read in transit, tampering with the data or overloading the
device with new connections. Or even with the cloud gateways,
where eavesdropping or communication interference between
devices and gateways may occur.</p>
        <p>In general, mappings between architectural models and DFD
will link:</p>
        <p>entities in DFDs with the associated network channels in
STRIDE</p>
        <p>Threat
which entity information is transmitted or data stores in
which the information is stored;
data flows in DFDs with the corresponding network
channels;
data stores in DFDs with the corresponding databases or
data stores used in the system architecture; and
processes in DFDs with the corresponding software
components executing tasks related to those processes,
specially when these tasks entail some level of secrecy.</p>
        <p>More formally, we define a set of DFDs, which represent a
functional description of the system, D = fD1; D2; : : : ; Dng,
as a set of graphs Di = (DVi; DEi), where DVi =
fe1; : : : ; emg are the elements in the DFD representing
elements of the system architecture at the functional level. Each
element ei can be an external entity, data store or a process.
DEi =</p>
        <p>ff1; : : : ; fkg represents the data flows connecting
elements in DVi. We define a graph A = fVA; EAg where
VA = fc1; : : : ; cmg represent the architectural components at
the technical level represented in a model such as those created
by GeneSIS and EA = fl1; : : : ; lkg represents the connections
between any two components (ci; cj ) in the system
architecture. Note that components can be both software or hardware
components. We define a mapping between the two models
Di and A as a function M : DVi [ DEi ! VA [ EA.</p>
        <p>2) Exploiting model mappings: once the mapping is
established, then a final step is necessary to link metrics, such as
those presented as examples in Table II, to the related risks
or mitigation actions defined in S3 and S4. Following the risk
methodology presented above, we will obtain instances for
the rest of classes in the diagram in Figure 4, including risks
and mitigation actions. Once the risk model is developed for
each DFD, we propose two ways to exploit the established
mappings to enable continuous risk management:
Automatic likelihood recalculation: during risk
assessment in S3, an initial likelihood and consequence values
are determined for each risk. However, a basic principle
for continuous risk management is that conditions in our
system may change as time goes by. Let e be an element
in a DFD Di, e 2 DVi [ DEi, considered an asset
in the risk management process. In S3, we define risks
r1; : : : ; rj associated to e. Given a system architecture
defined through a model A = fVA; EAg, we define a set
of metrics mc1; : : : ; mch for each component c 2 VA [ EA.
Automatic likelihood recalculation involves defining a
function f for each risk r related to each asset e such
that c = M(e) and f (mc1; : : : ; mch) provides a new value
for the likelihood or risk r. With this, we connect the
metrics defined for the architectural components and use
them to calculate the likelihood of risks connected to
elements of the functional description of a system, in the
corresponding DFD.</p>
        <p>Treatment effectiveness control: a parallel approach to
enable continuous risk management, involves the
definition of a function g for each r related to an asset
e 2 DVi [ DEi such that c = M(e) and g(mc1; : : : ; mch)
represents a KPI that needs to be satisfied for a risk to be
considered effectively mitigated. If g exceeds a particular
threshold, then a warning needs to be issued for the risk
plan including mitigation actions to be reviewed.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>VI. CONCLUSIONS</title>
      <p>Handling privacy-related risks is not well understood in
the IoT context. There is a lack of mechanism to collect
meaningful evidences and continuously monitor these risks.
We need to find the intersection between data protection
challenges and the enabling of TSIS. We have presented a first
step towards the enactment of continuous privacy-related risk
control for TSIS, leveraging the link offered by LINDDUN
between privacy and security threat categories and combining
functional and architectural models. As future work, we need
to establish a stronger connection between privacy threat
models like LINDDUN and the actual requirements imposed
by GDPR, as current threat models were devised before GDPR
and they may not fully cover all derived requirements. In
particular, the relationship between data subject rights and GDPR
principles and LINDDUN categories is unclear. Besides, we
need to understand how other privacy-related evidences can
be collected beyond those collected for security purposes. In
particular in TSIS, where complex and distributed systems
increase system weaknesses and the attack surface.</p>
    </sec>
    <sec id="sec-6">
      <title>ACKNOWLEDGMENT</title>
      <p>The authors would like to thank anonymous referees for
their valuable comments and suggestions. We would also like
to thank SINTEF and the GeneSIS team for allowing us to
use some figures generated by them.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Hadgkiss</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. B.</given-names>
            <surname>Ruighaver</surname>
          </string-name>
          , “
          <article-title>Incident response teams-challenges in supporting the organisational security function</article-title>
          ,
          <source>” Computers &amp; Security</source>
          , vol.
          <volume>31</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>643</fpage>
          -
          <lpage>652</lpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C. J.</given-names>
            <surname>Alberts</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Dorofee</surname>
          </string-name>
          , Managing Information Security Risks:
          <article-title>The Octave Approach</article-title>
          . Boston, MA, USA:
          <string-name>
            <surname>Addison-Wesley Longman</surname>
          </string-name>
          Publishing Co., Inc.,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Aslam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Saba</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. S.</given-names>
            <surname>Almazyad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rehman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Anjum</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Khan</surname>
          </string-name>
          , “
          <article-title>Decision support system for risk assessment and management strategies in distributed software development</article-title>
          ,
          <source>” IEEE Access</source>
          , vol.
          <volume>5</volume>
          , pp.
          <volume>20</volume>
          <fpage>349</fpage>
          -
          <lpage>20</lpage>
          373,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>R.</given-names>
            <surname>Baskerville</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Spagnoletti</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Kim</surname>
          </string-name>
          , “
          <article-title>Incident-centered information security: Managing a strategic balance between prevention and response,” Information &amp; management</article-title>
          , vol.
          <volume>51</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>138</fpage>
          -
          <lpage>151</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Boehm</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Turner</surname>
          </string-name>
          ,
          <article-title>Balancing agility and discipline: A guide for the perplexed, portable documents</article-title>
          .
          <source>Addison-Wesley Professional</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Brooks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Brooks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Garcia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lefkovitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lightman</surname>
          </string-name>
          , and
          <string-name>
            <surname>E. Nadeau,</surname>
          </string-name>
          <article-title>An introduction to privacy engineering and risk management in federal systems</article-title>
          .
          <source>US Department of Commerce, National Institute of Standards and Technology</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>T. DeMarco</surname>
          </string-name>
          , “
          <article-title>Structure analysis and system specification,” in Pioneers and Their Contributions to Software Engineering</article-title>
          . Springer,
          <year>1979</year>
          , pp.
          <fpage>255</fpage>
          -
          <lpage>288</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. H.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Song</surname>
          </string-name>
          , P.-E. Novac,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lavirotte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-Y.</given-names>
            <surname>Tigli</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Solberg</surname>
          </string-name>
          , “Genesis:
          <article-title>Continuous orchestration and deployment of smart iot systems.” In the proceedings of the IEEE COMPSAC conference</article-title>
          , Milwaukee, USA, July
          <volume>15</volume>
          -
          <fpage>19</fpage>
          . Springer,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>N.</given-names>
            <surname>Ferry</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Solberg</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Song</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lavirotte</surname>
          </string-name>
          , J.-Y. Tigli,
          <string-name>
            <given-names>T.</given-names>
            <surname>Winter</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Munte´s-</article-title>
          <string-name>
            <surname>Mulero</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Metzger</surname>
            ,
            <given-names>E. R.</given-names>
          </string-name>
          <string-name>
            <surname>Velasco</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. C.</given-names>
            <surname>Aguirre</surname>
          </string-name>
          , “
          <article-title>Enact: Development, operation, and quality assurance of trustworthy smart iot systems</article-title>
          ,” in
          <source>International Workshop on Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment</source>
          . Springer,
          <year>2018</year>
          , pp.
          <fpage>112</fpage>
          -
          <lpage>127</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fitzgerald</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Stol</surname>
          </string-name>
          , “
          <article-title>Continuous software engineering: A roadmap and agenda</article-title>
          ,
          <source>” Journal of Systems and Software</source>
          , vol.
          <volume>123</volume>
          , pp.
          <fpage>176</fpage>
          -
          <lpage>189</lpage>
          ,
          <year>2017</year>
          . [Online]. Available: http://dx.doi.org/10.1016/j.jss.
          <year>2015</year>
          .
          <volume>06</volume>
          .063
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>F.</given-names>
            <surname>Fleurey</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Morin</surname>
          </string-name>
          , “
          <article-title>Thingml: A generative approach to engineer heterogeneous and distributed systems</article-title>
          ,” in
          <source>2017 IEEE International Conference on Software Architecture Workshops (ICSAW)</source>
          . IEEE,
          <year>2017</year>
          , pp.
          <fpage>185</fpage>
          -
          <lpage>188</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <surname>V.</surname>
          </string-name>
          <article-title>Munte´s-</article-title>
          <string-name>
            <surname>Mulero</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Matthews</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Dominiak</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Omerovic</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Aranda</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Seycek</surname>
          </string-name>
          , “
          <article-title>Risk-driven framework for decision support in cloud service selection</article-title>
          ,
          <source>” in 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. IEEE</source>
          ,
          <year>2015</year>
          , pp.
          <fpage>545</fpage>
          -
          <lpage>554</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B.</given-names>
            <surname>Karabacak</surname>
          </string-name>
          and
          <string-name>
            <surname>I. Sogukpinar</surname>
          </string-name>
          , “Isram:
          <article-title>Information security risk analysis method,” Comput</article-title>
          . Secur., vol.
          <volume>24</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>147</fpage>
          -
          <lpage>159</lpage>
          , Mar.
          <year>2005</year>
          . [Online]. Available: http://dx.doi.org/10.1016/j.cose.
          <year>2004</year>
          .
          <volume>07</volume>
          .004
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Lund</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Solhaug</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Stølen</surname>
          </string-name>
          ,
          <article-title>Model-driven risk analysis: the CORAS approach</article-title>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.-S.</given-names>
            <surname>Martin</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Kung</surname>
          </string-name>
          , “
          <article-title>Methods and tools for gdpr compliance through privacy and data protection engineering,” in 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&amp;PW)</article-title>
          . IEEE,
          <year>2018</year>
          , pp.
          <fpage>108</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>M.</given-names>
            <surname>Merkow</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Raghavan</surname>
          </string-name>
          , “
          <article-title>An ecosystem for continuously secure application software,” RUGGED Software</article-title>
          , CrossTalk March/April,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Moran</surname>
          </string-name>
          , Agile Risk Management. Springer International Publishing,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Munte</surname>
          </string-name>
          <article-title>´s-</article-title>
          <string-name>
            <surname>Mulero</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Ripolles</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Gupta</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Dominiak</surname>
            , E. Willeke,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Matthews</surname>
          </string-name>
          , and B. Somosko¨i, “
          <article-title>Agile risk management for multi-cloud software development</article-title>
          ,
          <source>” IET Software</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>172</fpage>
          -
          <lpage>181</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Naseer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Shanks</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Maynard</surname>
          </string-name>
          , “
          <article-title>Towards an analytics-driven information security risk management: A contingent resource based perspective</article-title>
          ,
          <source>” Procs of ECIS</source>
          <year>2017</year>
          , pp.
          <fpage>2645</fpage>
          -
          <lpage>2655</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Omerovic</surname>
          </string-name>
          , “
          <article-title>Supporting cloud service selection with a risk-driven cost-benefit analysis,” in Advances in Service-Oriented and</article-title>
          <string-name>
            <surname>Cloud Computing</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Celesti</surname>
          </string-name>
          and P. Leitner, Eds. Cham: Springer International Publishing,
          <year>2016</year>
          , pp.
          <fpage>166</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shameli-Sendi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Aghababaei-Barzegar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Cheriet</surname>
          </string-name>
          , “
          <article-title>Taxonomy of information security risk assessment (isra</article-title>
          ),
          <source>” Computers &amp; Security</source>
          , vol.
          <volume>57</volume>
          , pp.
          <fpage>14</fpage>
          -
          <lpage>30</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shostack</surname>
          </string-name>
          ,
          <article-title>Threat modeling: Designing for security</article-title>
          . John Wiley &amp; Sons,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>S. V.</given-names>
            <surname>Shrivastava</surname>
          </string-name>
          and U. Rathod, “
          <article-title>A risk management framework for distributed agile projects</article-title>
          ,
          <source>” Information and Software Technology</source>
          , vol.
          <volume>85</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2017</year>
          . [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0950584916304815
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>D.</given-names>
            <surname>Sta</surname>
          </string-name>
          <article-title>˚hl and</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Bosch</surname>
          </string-name>
          , “
          <article-title>Modeling continuous integration practice differences in industry software development,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Syst</surname>
          </string-name>
          . Softw., vol.
          <volume>87</volume>
          , pp.
          <fpage>48</fpage>
          -
          <lpage>59</lpage>
          , Jan.
          <year>2014</year>
          . [Online]. Available: http://dx.doi.org/10.1016/j.jss.
          <year>2013</year>
          .
          <volume>08</volume>
          .032
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J.</given-names>
            <surname>Webb</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ahmad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. B.</given-names>
            <surname>Maynard</surname>
          </string-name>
          , and G. Shanks, “
          <article-title>A situation awareness model for information security risk management,” Computers &amp; security</article-title>
          , vol.
          <volume>44</volume>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>K.</given-names>
            <surname>Wuyts</surname>
          </string-name>
          , “
          <article-title>Privacy threats in software architectures</article-title>
          ,”
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Vasilakos</surname>
          </string-name>
          , “
          <article-title>A survey on trust management for internet of things,” Journal of network and computer applications</article-title>
          , vol.
          <volume>42</volume>
          , pp.
          <fpage>120</fpage>
          -
          <lpage>134</lpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>