<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Life Cycle for Authorization Systems Development in the GDPR Perspective *</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Said</forename><surname>Daoudagh</surname></persName>
							<email>said.daoudagh@isti.cnr.it</email>
							<affiliation key="aff0">
								<orgName type="institution">ISTI-CNR</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">University of Pisa</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Eda</forename><surname>Marchetti</surname></persName>
							<email>eda.marchetti@isti.cnr.it</email>
							<affiliation key="aff0">
								<orgName type="institution">ISTI-CNR</orgName>
								<address>
									<settlement>Pisa</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Life Cycle for Authorization Systems Development in the GDPR Perspective *</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">43B79B97B585D177BA7E4C0C878FB923</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T04:57+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The General Data Protection Regulation (GDPR) defines the principle of Integrity and Confidentiality, and implicitly calls for the adoption of authorization systems for regulating the access to personal data. We present here a process development life cycle for the specification, deployment and testing of authorization systems. The life cycle targets legal aspects, such as the data usage purpose, the user consent and the data retention period. We also present its preliminary architecture where available solutions for extracting, implementing and testing the data protection regulation are integrated. The objective is to propose for the first time a unique improved solution for addressing different aspects of the GDPR development and enforcement along all the life cycle phases.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>The General Data Protection Regulation (GDPR) is the new EU Data Protection Regulation <ref type="bibr" target="#b20">[21]</ref> in charge of harmonize the regulation of Data Protection across the EU member states. At the same time, it enhances and arises business opportunities within the Digital Single Market space. However, the natural language nature of the GDPR makes most of the provisions to be expressed in generic terms and does not provide specific indication on how they should be actuated. Thus, applying and demonstrating the GDPR compliance, in order to avoid also the related penalties, becomes an important research challenge.</p><p>Many businesses today are struggling in the definition of appropriate procedures and technical solutions for their development process so as to enforce and demonstrate the GDPR compliance <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b14">15,</ref><ref type="bibr" target="#b23">24]</ref>. In particular, following the correct-by-design principle, they are looking for effective and efficacious means for increasing the software high-confidence and quality and, at the same time, reducing the cost and effort of development. Consequently, integrated solutions for designing and promptly testing their applications and systems are urgently necessary. Considering the GDPR, as for any other software requirement, a fundamental step for guaranteeing its by-design compliant realization is that the data protection concepts have to be integrated into overall software life cycle: from gathering of the requirements to deployment and subsequent maintenance of the system.</p><p>Currently, several proposals are trying to assist the organizations in the deployment of adequate fine-grained mechanisms that take into account legal requirements, such as the data usage purpose, user consent and the data retention period. In particular, research attention has been devoted to authorization systems because they are recognised, by scientific communities and private companies, as the successful elements for the development of GDPR-by-design compliant solutions <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b28">29,</ref><ref type="bibr" target="#b29">30]</ref>. However, to the best of our knowledge, most of the available proposals targets just a single aspect of authorization system development and no integrated solutions for guiding their GDPR-by-design compliant development through the entire life cycle are provided.</p><p>Therefore, the proposal of this paper: a specific, integrated GDPR focused process development life cycle for the specification, deployment and testing of adequate fine-grained authorization mechanisms able to take into account legal requirements. The idea has been inspired by the life cycle introduced in <ref type="bibr" target="#b13">[14]</ref>, which is a systematic approach to implementing authorization systems within enterprise. Even if generic, the proposal of <ref type="bibr" target="#b13">[14]</ref> does not target explicitly the GDPR demands or any other legal framework.</p><p>Additionally, to promote the applicability of the proposed life cycle into the business and industrial context we also present its preliminary automation. More precisely, we integrated, for the first time, into a unique environment some of the available solutions for: specifying the privacy requirements, controlling personal data, processing them, and demonstrating the compliance with the GDPR in collecting, using, storing, disclosing and/or disposing of the personal data.</p><p>In line with this view, the paper focuses on the following primary objectives: OBJ 1: defining a GDPR-based life cycle for authorization systems; OBJ 2: providing an integrated environment for automatically enforcing the data protection or privacy regulations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Outline.</head><p>Section 2 presents the basic concepts used along the proposal; Section 3 describes the adopted development process and the solutions proposed for its phases; Section 4 presents the unique environment we are developing to accommodate the proposed life cycle; finally, Section 5 concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Background and Related Work</head><p>In this section we briefly overview the concepts and definitions adopted in the remains of this paper, focusing in particular on the GDPR and access control concepts.</p><p>General Data Protection Regulation. The GDPR <ref type="bibr" target="#b20">[21]</ref> defines Personal Data as any information relating to an identified or identifiable natural person called Data Subject. That means that, a data subject is a Natural Person (a living human being), whose data are managed by a Controller. This regulation became into effect on May 2018 and has replaced the previous Data Protection Directive conceived in 1995. The aim of the new regulation is to strengthen the rights of the individual over their own data and at the same time to make organizations more accountable w.r.t. the previous directive. In addition, the GDPR has also the objective to eliminate all the barriers for the services to be delivered in the European Union and, therefore, to enhance business opportunities within the Digital Single Market. The GDPR will contribute to the harmonization of the previous fragmented data protection laws across the EU, so as to ensure equal protection of Human Rights of the European Citizens.</p><p>The GDPR is composed of 99 articles that represent the mandatory part of the regulation. The GDPR is applied to the processing of personal data, whether it is automated (even partially) or not. It defines, among others, the following principles and demands: Transparency, i.e., data must be processed fairly, lawfully and transparently; Purposes, i.e., data should only be collected for determined, explicit and legitimate purposes, and should not be processed later for other purposes; Minimization, i.e., the processed data must be relevant, adequate and limited to what is necessary in view of the purposes for which they are processed; Accuracy, i.e., the processed data must be accurate and up-to-date regularly; Retention, i.e., data must be deleted after a limited period; Subject explicit consent, i.e., data may be collected and processed only if the data subject has given his explicit consent.</p><p>Access Control Concepts. Access Control (AC) is a fundamental building block for secure information sharing <ref type="bibr" target="#b8">[9]</ref>, because it ensures that only the intended people can access securityclassified data and that these intended users are only given the level of access required to accomplish their tasks. Several access control models have been proposed, including models taking into account time, location, and situation <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b17">18,</ref><ref type="bibr" target="#b24">25,</ref><ref type="bibr">32]</ref> and models specific for privacysensitive data <ref type="bibr" target="#b25">[26]</ref>.</p><p>An AC is usually implemented through Access Control Mechanism (ACM), which is the system that provides a decision to an authorization request, typically based on predefined Access Control Policy (ACP). This is a specific statement of what is and is not allowed on the basis of a set of rules, defined in terms of conditions on attributes of subjects, resources, actions, and environment, and combining algorithms for establish the precedence among the rules. Attribute-Based Access Control (ABAC) <ref type="bibr" target="#b22">[23]</ref> and its standard implementation, the eXtensible Access Control Markup Language (XACML) <ref type="bibr" target="#b26">[27]</ref>, are the widespread adopted models in the access control environment. As schematize in Figure <ref type="figure" target="#fig_0">1</ref>(a), the main components of XACML standard are: the Policy Administration Point (PAP) is the system entity in charge of managing the policies; the Policy Enforcement Point (PEP), usually embedded into an application system, receives the access request in its native format, constructs an XACML request and sends it to the Policy Decision Point (PDP); the Policy Information Point (PIP) provides the PDP with the values of subject, resource, action and environment attributes; the PDP evaluates the policy against the request and returns the response, including the authorization decision, to the PEP.</p><p>The structure of an XACML access control policy is sketched in Figure <ref type="figure" target="#fig_0">1</ref> Deny) is returned, otherwise a NotApplicable decision is formulated. If an error occurs during the evaluation of a policy against a request, Indeterminate value is returned. The Policy-CombiningAlgorithm (not represented in the figure) and the RuleCombiningAlgorithm define how to combine the results from multiple policies and rules respectively in order to derive a single authorization access decision.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Related Work.</head><p>In literature there are several works that use access control as main means of protecting personal data. Different proposals are mainly divided into two main categories. The former uses Access Control to address specific concepts that can be related to a given law, such as consent and purpose. In this area an initial proposal for an automatically enforceable policy language is discussed in <ref type="bibr" target="#b15">[16]</ref>, whereas, a formal definition of the consent is introduced in <ref type="bibr" target="#b30">[31]</ref>. The latter refers explicitly a given law (e.g., the EU GDPR or the US HIPAA) in using Access Control. In particular in <ref type="bibr" target="#b16">[17]</ref> the authors have evaluated whether the XACML standard is adequate to express the constraints imposed in HIPAA, whereas in <ref type="bibr" target="#b21">[22]</ref>, the authors investigated the feasibility of translating the articles related to access control of the previous EU data protection directive. In the industrial environment, authors in <ref type="bibr" target="#b13">[14]</ref> proposed a systematic methodology for the implementation of ABAC solutions in real contexts.</p><p>Differently from the above contributions, the proposal of this paper does not focus on a single aspect of the development process but provides a unified environment able to: model ACPs that are by-design compliant with the GDPR; test those ACPs by means of state-of-theart testing tools; and to monitors their application during the production time, and eventually to suggest possible improvements in case of deviation of the expected behaviour. Therefore, the solution proposed in this paper aims at providing, for the first time, a practical specification of the Authorization Development Life Cycle in the light of the GDPR covering all its stages.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Authorization Policy Life Cycle</head><p>In this section we target the first objective of this paper (OBJ 1): defining a GDPR-based life cycle for authorization systems assuring the by-design compliance to data protection regulation. As any other software application, the development of GDPR compliant authorization systems involves different stages of software development. Thus, our first objective is to formalize into a specific life cycle the required activities for: collecting and specifying legal requirements into formal representations, defining and testing data protection policies, and implementing ACbased mechanisms.</p><p>In presenting our proposal, among the different development processes, we refer to and modify the authorization policy life cycle introduced in <ref type="bibr" target="#b13">[14]</ref>, which is a systematic approach to implementing ABAC systems within enterprises. The proposed life cycle, schematized in Figure <ref type="figure">2</ref>, does not strictly depend on any specific ABAC implementation. However, in this paper we refer to the widely industrial adopted XACML-based authorization system because it is the only available standardized specification for ABAC. As schematize in Figure <ref type="figure">2</ref>, the modified version of the process consists of the following steps:</p><p>GDPR-based use case definition (step 1 ): i.e., define context and an achievable scope so as to establish a common base to discuss with different stakeholders. In this case, the established use cases need to be conceived according to GDPR implementation challenges; Gather authorization requirements (step 2 ): i.e., to gather all the requirements and the sources they come from. In our case, the primary source is the GDPR regulation, therefore, authorization requirements should de defined in terms of statements or natural language Figure <ref type="figure">2</ref>: The Authorization Policy Life Cycle (adapted from <ref type="bibr" target="#b13">[14]</ref>). authorization policies. Additionally, business requirements (e.g., working hours) and security best practices (e.g., encrypting data) need also to be defined. Identify required attributes (step 3 ): i.e., to identify the attributes used in the selected requirements and their origin so as to make easier requirement reviews. The attributes should depend on the language or functionalities of the XACML reference architecture. Author authorization policies (step 4 ): i.e., to transform the natural language statements into machine-interpretable statements, in order to eliminate any ambiguity introduced by natural language. Thus, a list of XACML policies encoding the GDPR's provisions need to be defined as well as the order in which those policies should be evaluated. Test ACPs &amp; AC mechanisms (step 5 ): i.e., to ensure that the implemented XACML policies meet the GDPR requirements. State-of-the-art and specifically conceived testing techniques should be used according to the different purposes. This step involves also the evaluation of the adequacy of the current AC mechanisms in the context of the GDPR. Deploy the architecture (step 6 ): i.e., to define the contact point within the existing systems in order to make the different applications able to interact with authorization system. Deploy the policies (step 7 ): i.e., to deploying the authored XACML policies according to the selected (production) environment. This step is usually business dependent. Run access reviews (step 8 ): i.e., to analyse the policies against a set of attributes to determine what these attributes grant. In the context of the GDPR, this should involve the simulation of realistic scenarios according to specific application use cases. Additionally, the data coming from the testing activities could be used to assess the implemented solutions and identify possible improvements.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Life Cycle Automation</head><p>In order to propose an applicable and effective solution, the second objective of this paper (OBJ 2) is to provide an integrated environment for the automatic enforcing of the GDPR-based life cycle presented in the previous section. To the best of the authors' knowledge, this proposal is the first attempt to integrate, in a unique automated environment, different available solutions for extracting, implementing and testing the data protection regulation. Differently from the generic ACS architecture, in this paper we assume that the protected resources are Personal Data hosted in a specific database, the Personal Data DB component of Figure <ref type="figure" target="#fig_2">3</ref>.</p><p>In the remainder this section, we detail how the modules have been implemented into the proposed environment and how they are related to the authorization life cycle schematized in Figure <ref type="figure">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Use case definition and Gathering of authorization requirements</head><p>Among the solutions to tackle security issues and vulnerabilities in an efficient and effective way, the possibility of using backlogs to drive the software development work is currently taking place. Generally, a backlog is a prioritized features list describing the functionalities to be included in the final product <ref type="bibr" target="#b1">[2]</ref>. These backlog items are often provided in the form of User Stories <ref type="bibr" target="#b2">[3]</ref>, i.e., a list of ready-made specification of items (requirements and task descriptions) useful for the implementation.</p><p>In the context of GDPR having a ready-to-use set of User Stories, focused on GDPR provisions and associated to specific ACPs, represents an important means to minimize development effort and assure high quality of the final product. Indeed, when an authorization system need to be implemented, developers could pick up the necessary predefined User Stories, and their associated ACPs, and exploit them in order to easily implement the required policies into the Access Control Mechanism.</p><p>Considering the life cycle schematized in Figure <ref type="figure">2</ref>, the definition of the User Stories set can be reloaded as: the definition of a Data Protection Backlog that contains User Stories based on the requirements (Step 1 ); and the mapping of the GDPR provisions into User Stories (Step 2 ).</p><p>In the environment proposed in Figure <ref type="figure" target="#fig_2">3</ref>, the definition of User Stories is in charge of the module A , and specifically of the User Stories Tool component. From a practical point of view, the methodology for defining GDPR based User Stories has been introduced in <ref type="bibr" target="#b4">[5]</ref>, and therefore the component provides an automation of the previously introduced process. More precisely, the User Stories tool component takes as input a Legal Text (the GDPR text in this case), analyses the GDPR's articles related to ACs and creates an Epic <ref type="bibr" target="#b1">[2]</ref> for each of them. An Epic is a set of User Stories having the same conceptual purpose. For the GDPR, a total of forty-one Epics are produced: three of them concerning only AC mechanism; eight referring only ACP, and thirty articles related to both ACP and AC mechanism. Then, for each article one or more User Stories are derived and linked to the proper Epic. As an output of the User Stories Tool component, a Data Protection Backlog, i.e., a Privacy Backlog containing a set of User Stories organized in Epics, is stored into the USER Stories DB (Figure <ref type="figure" target="#fig_2">3</ref>). In Table <ref type="table" target="#tab_0">1</ref> an extract of content of the Data Protection Backlog is presented. As in the table the column Article (first column) contains the GDPR's articles, and the column User Story contains the GDPR-based User Stories defined. Through the GUI of module A in Figure <ref type="figure" target="#fig_2">3</ref>, the User (in this case an authorization system developer) can select a set of predefined User Stories and proceed with their translation into ACPs as detailed in the next section.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Identify required attributes and Author authorization policies</head><p>Step 3 and Step 4 of the life cycle of Figure <ref type="figure">2</ref> aim at transforming the User Stories into machine-interpretable statements. As a result, a list of XACML policies encoding the GDPR principles is defined.</p><p>In the environment depicted in Figure <ref type="figure" target="#fig_2">3</ref>, the Access Control Tool component of module A is in charge of automating the two steps. Hence, the component takes as input a set of User Stories selected by the User from the User Stories DB and, through the automation of the methodology introduced in <ref type="bibr" target="#b5">[6]</ref>, provides the associate GDPR-based ACPs.</p><p>In details, considering the Step 3 , first the component classifies the identified attributes into access control commonly-used entities (or categories) (see Section 2), highlights relations between them and lets the mapping into the ABAC terms. For instance, by referring to the User Story related to the Art. <ref type="bibr" target="#b14">15</ref>.1 (see the second row of Table <ref type="table" target="#tab_0">1</ref>), the component identifies and classifies the following attributes: Data Subject as a Subject, access as an Action, and Personal Data as a Resource category.</p><p>Then, the Access Control Tool component automates the translation of the selected User Stories into derived AC rules that corresponds to Step 4 of Figure <ref type="figure">2</ref>. In particular, this step consist into the instantiation of the AC rules with actual attributes, and the translation of the resulting into a given formalism or language <ref type="foot" target="#foot_0">1</ref> .</p><p>As in Figure <ref type="figure" target="#fig_2">3</ref>, the final translation requires the interaction with the User and the Personal Data DB. Specifically, the User needs to identify in the Personal Data DB the real attributes to be considered. As example, considering the Art. 15.1 (Table <ref type="table" target="#tab_0">1</ref>), Table <ref type="table" target="#tab_1">2</ref> reports the attribute mapping for the following realistic scenario: Alice (Customer, i.e., Data Subject) provided her name, her E-mail address, and the name of the city where she has the permanent address to the ABC company (Controller). Alice in any moment can exercise her right of access pursuant the Art. 15.1.</p><p>More precisely, column Identified Attribute of Table <ref type="table" target="#tab_1">2</ref> contains the identified attributes; column Attribute Category shows the classification of those attributes into a specific category; finally, column Access Control Category illustrates the classification attributes into the commonly used entities in access control.  The Access Control Tool uses the derived attribute classification for mapping them into the attributes of the User Stories and deriving enforceable ACPs in a given language. As an example, by considering the attribute classification of Table <ref type="table" target="#tab_1">2</ref> and the User Stories associated with Art. 15.1, Figure <ref type="figure" target="#fig_3">4</ref> shows the derived matching, whereas Figure <ref type="figure" target="#fig_4">5</ref> reports the translation into XACML-like language. Consequently, the policy is applicable to the subject Alice and contains two rules:</p><p>(1) the first rule, with RuleId equal to read-Rule, represents the AC rule starting from User Story associated with Art. 15.1 (see second row of Table <ref type="table" target="#tab_0">1</ref>), and guarantees that Alice can read all the information concerning her; (2) the second rule, called defaultRule, represents a standard default rule that denies all which is not allowed explicitly.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Test ACPs &amp; AC mechanisms</head><p>Step 5 of Figure <ref type="figure">2</ref> aims at testing both the developed ACPs and the current AC mechanisms. Indeed, to ensure that the implemented XACML policies meet the GDPR requirements specific testing process should be adopted. Considering the environment of Figure <ref type="figure" target="#fig_2">3</ref>  In particular, it integrates available solutions for: assessment of test strategies, testing GDPRbased ACPs expressed in XACML 3.0 and evaluating the adequacy of AC mechanisms with respect to the GDPR's provisions. For aim of completeness we report here below the main features of the Access Control Testing Tools component. Specifically:</p><p>1. Test Case Generation: starting from the developed ACPs, it is possible to generate AC requests able to test both the ACPs and AC mechanisms through a modified version of the X-CREATE tool <ref type="bibr" target="#b11">[12]</ref>, which provides several combinatorial test strategies, and the XACMET tool <ref type="bibr" target="#b18">[19]</ref> that provides a model-based test generation strategy;</p><p>2. Mutation Generation: mutation analysis <ref type="bibr" target="#b27">[28]</ref>  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.4">From the Deploy to the Access Review</head><p>In section we briefly provide some hints for targeting the last three phases of the proposed authorization life cycle that involve the deployment of the AC architecture (Step 6 of Figure <ref type="figure">2</ref>), the deployment of the developed and tested policies (Step 7 ), and the final analysis of the process development data (Step 8 ).</p><p>The idea behind Step 6 is to decouple the authorization functionalities from the business logic. This enables to adapt and extend the XACML reference architecture with new features without modifying the business logic of the applications that use Personal Data. This separation of concerns helps to propose scalable, manageable and extendible authorization solutions.</p><p>Once the architecture is deployed (module B of Figure <ref type="figure" target="#fig_2">3</ref>), Step 7 involves the deployment of the tested GDPR-based ACPs within the Policy Administration Point component of the AC system in order to assure the GDPR compliance. This allows the Policy Decision Point to retrieve and to evaluate the right ACP when the system receives an access request, from the end user (e.g., Data Subject or Controller), to the Personal Data hosted in the Personal Data DB.</p><p>Additionally, by referring to Step 8 , facilities for collecting and managing information for the GDPR compliance and audit purposes <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b14">15]</ref> should be included. To this purpose, module C of Figure <ref type="figure" target="#fig_2">3</ref> is the proposal that we are currently finalizing. The module extends with logging systems, monitoring capabilities, and reporting functionalities of the proposed environment <ref type="bibr" target="#b19">[20]</ref>, so that data mining and machine learning techniques can be adopted to construct behavioral models based on data coming from the logging and testing activities and to discover and notify unwanted behaviors.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusions</head><p>The GDPR represents a significant breakthrough in the digital economy and brings a lot of changes to the way in which online services are offered. This scenario calls for new approaches for developing systems where legal requirements are taken into account, just like the other requirements that a system must respond to. This paper focused on data protection requirements and, in particular, on the development of authorization systems able to enforcing the GDPR provisions. The idea was to provide for the first time a specific GDPR-based life cycle, able to assure the by-design compliance of the developed access control systems. Additionally, in order to make the proposal effective and applicable in real context, we provide also a reference architecture enforcing the proposed life cycle. The general nature of the proposed GDPR-based life cycle does not constrain the environment to the specific tools selected in this paper, and different components implementations could be considered. The intention was to demonstrate the feasibility of our proposal. Therefore, this work represented a preliminary step to integrate legal requirements into a software development process and several improvements are possible. In particular, the proposals of this paper need to be thoroughly extended and validated with real case studies and the architecture finalized in order to provide a unique user-friendly environment, able to assist developers in all the stages of development. </p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Access Control System: Reference Architecture and ACP Data Model.</figDesc><graphic coords="3,100.49,325.22,411.01,123.94" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>(b). More precisely, an XACML policy has a tree structure whose main elements are: PolicySet (not presented in the figure), Policy, Rule, Target and Condition. The PolicySet includes one or more policies. A Policy contains a Target and one or more rules. The Target specifies a set of constraints on attributes of a given request. Typical categories of attributes are Subject, Resource, Action and Environment. The Rule specifies a Target and a Condition containing one or more boolean functions. If the Condition evaluates to true, then the Rule's Effect (a value of Permit or</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: The Proposed GDPR-based Environment.</figDesc><graphic coords="6,100.49,106.42,411.03,238.86" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Attributes Matching Example.</figDesc><graphic coords="8,310.11,413.17,197.29,69.62" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: A XACML-like Policy.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head></head><label></label><figDesc>legally sufficient and automated consent provision in iot scenarios. In DPM 2018 and CBT 2018 -ESORICS 2018 International Workshops, Barcelona, Spain, September 6-7, 2018, pages 329-344, 2018. [32] Stephen S. Yau and Junwei Liu. A situation-aware access control based privacy-preserving service matchmaking approach for service-oriented architecture. In 2007 IEEE (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pages 1056-1063. IEEE Computer Society, 2007.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 :</head><label>1</label><figDesc>GDPR-focused User Stories: Controller and Data Subject Perspectives.</figDesc><table /><note>Article User StoryArt.<ref type="bibr" target="#b5">6</ref>.1(a) As a [Controller], I want [to process Personal Data only if Data Subject has given consent for one or more specific purpose], so that [the processing shall be lawful]. Art. 15.1 As a [Data Subject], I want [to access my Personal Data and all the information (e.g., purpose and categories)], so that [I can be aware about my privacy].</note></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 2 :</head><label>2</label><figDesc>Attribute Classification Example.</figDesc><table><row><cell>Identified Attribute</cell><cell>Attribute Category</cell><cell>Access Control Category</cell></row><row><cell>Alice</cell><cell>Customer</cell><cell>Subject</cell></row><row><cell>read</cell><cell></cell><cell>Action</cell></row><row><cell>name</cell><cell>Biodata</cell><cell>Resource</cell></row><row><cell>E-mail</cell><cell>Contact data</cell><cell>Resource</cell></row><row><cell>permanent city</cell><cell>Location data</cell><cell>Resource</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head></head><label></label><figDesc>, the Access Control Testing Tools component of module A is in charge of implementing the Step 5 . . . . . . . . . . . . . . . . . . . . . . . . . PolicyId = alicePolicy root element rule-combining-algorithm:deny-overrides Target . . . . . . . . . . . . . . . . . . . . . . Sample Policy Subject . . . . . . . . . . . . . . . . . . Subject = Alice Rule . . . . . . . . . . . . . . . . . . . . . . . . RuleId = readRule, Effect = Permit Target . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Resource . . . . . . . . . . . . . . . Resource = Name Resource . . . . . . . . . . . . . . . Resource = E-mail Resource . . . . . . . . . . . . . . . Resource = PermanentCity Action . . . . . . . . . . . . . . . . Action = read Condition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rule . . . . . . . . . . . . . . . . . . . . . . . . default: deny all, which is not allowed explicitly. RuleId = defaultRule, Effect = Deny</figDesc><table><row><cell>Policy And . . . . . . . . . . . . . . . . . . And Operator</cell></row><row><cell>string-one-and-only . . . type-One-And-Only Function.</cell></row><row><cell>#Resource = 1</cell></row><row><cell>string-equal . . . . . . . . type-Equal Function.</cell></row><row><cell>Resource.owner = Subject</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head></head><label></label><figDesc>Oracle Derivation: is an automatic oracle able to associate the expected result for a given AC request based on a given ACP through an enhanced version of the XACMET tool<ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b18">19]</ref>, which is an automated model-based oracle.The Tester can interact with the Access Control Testing Tools component for realizing specific testing purposes. For instance, for testing GDPR-based ACPs expressed in XACML 3.0 the user can run the following facilities: first, the Test Case Generation for deriving the set of AC requests (in this case a test strategy can be selected from available ones); then, through Test Cases Execution &amp; Result Analyzer, the Tester can execute the test cases on the GDPR-based ACPs and collect the results; whereas, through the Oracle Derivation component the tester can associate the expected result to each of the executed test cases; finally, the Testing Strategy Enhancement component can be used to visualize the results and suggestions for possible improvement of the test case generation strategy.</figDesc><table><row><cell>can be applied on ACPs for measuring the</cell></row><row><cell>adequacy of a test suite through an enhanced version of XACMUT tool [10];</cell></row><row><cell>3. Test Cases Execution &amp; Result Analyzer : is an automated executor of test cases able to</cell></row><row><cell>collect the execution results and calculates either the effectiveness of the considered test</cell></row><row><cell>suites, or the vulnerabilities detected;</cell></row><row><cell>4. Testing Strategy Enhancement: it suggests possible hints for enhancing the applied test</cell></row><row><cell>suite;</cell></row><row><cell>5.</cell></row></table></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">In the current implementation the XACML standard<ref type="bibr" target="#b26">[27]</ref> is considered but other implementation of ABAC model can be equally adopted.</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Acknowledgments</head><p>This work is partially supported by CyberSec4Europe Grant agreement ID: 830929.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Supporting privacy impact assessment by model-based privacy analysis</title>
		<author>
			<persName><forename type="first">Daniel</forename><surname>Amir Shayan Ahmadian</surname></persName>
		</author>
		<author>
			<persName><surname>Strüber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jan</forename><surname>Volker Riediger</surname></persName>
		</author>
		<author>
			<persName><surname>Jürjens</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the The 33 rd ACM/SIGAPP Symposium On Applied Computing (SAC)</title>
				<meeting>the The 33 rd ACM/SIGAPP Symposium On Applied Computing (SAC)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2018-04">April 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Handbook of the secure agile software development life cycle</title>
		<author>
			<persName><surname>Ahola</surname></persName>
		</author>
		<author>
			<persName><surname>Frühwirth</surname></persName>
		</author>
		<author>
			<persName><surname>Helenius</surname></persName>
		</author>
		<author>
			<persName><surname>Kutvonen</surname></persName>
		</author>
		<author>
			<persName><surname>Myllylahti</surname></persName>
		</author>
		<author>
			<persName><surname>Nyberg</surname></persName>
		</author>
		<author>
			<persName><surname>Pietikäinen</surname></persName>
		</author>
		<author>
			<persName><surname>Pietikäinen</surname></persName>
		</author>
		<author>
			<persName><surname>Röning</surname></persName>
		</author>
		<author>
			<persName><surname>Ruohomaa</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
		<respStmt>
			<orgName>University of Oulu</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Practical security stories and security tasks for agile development environments</title>
		<author>
			<persName><forename type="first">Izar</forename><surname>Vishal Asthana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Niall</forename><surname>Tarandach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Bryan</forename><surname>Odonoghue</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mikko</forename><surname>Sullivan</surname></persName>
		</author>
		<author>
			<persName><surname>Saario</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Online</title>
		<imprint>
			<date type="published" when="2012-07">July, 2012</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">GDPR and business processes: an effective solution</title>
		<author>
			<persName><forename type="first">Cesare</forename><surname>Bartolini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Antonello</forename><surname>Calabrò</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eda</forename><surname>Marchetti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2nd International Conference on Applications of Intelligent Systems, APPIS 2019</title>
				<meeting>the 2nd International Conference on Applications of Intelligent Systems, APPIS 2019<address><addrLine>Las Palmas de Gran Canaria, Spain</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">January 07-09, 2019. 2019</date>
			<biblScope unit="page">5</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">GDPR-based user stories in the access control perspective</title>
		<author>
			<persName><forename type="first">Cesare</forename><surname>Bartolini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Said</forename><surname>Daoudagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gabriele</forename><surname>Lenzini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eda</forename><surname>Marchetti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Quality of Information and Communications Technology</title>
				<editor>
			<persName><forename type="first">Mario</forename><surname>Piattini</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Paulo</forename><surname>Rupino Da Cunha</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Ignacio</forename><surname>García Rodríguez De Guzmán</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Ricardo</forename><surname>Pérez-Castillo</surname></persName>
		</editor>
		<meeting><address><addrLine>Cham</addrLine></address></meeting>
		<imprint>
			<publisher>Springer International Publishing</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="3" to="17" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Towards a lawful authorized access: A preliminary gdpr-based authorized access</title>
		<author>
			<persName><forename type="first">Cesare</forename><surname>Bartolini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Said</forename><surname>Daoudagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gabriele</forename><surname>Lenzini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eda</forename><surname>Marchetti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th International Conference on Software Technologies -Volume 1: ICSOFT</title>
				<meeting>the 14th International Conference on Software Technologies -Volume 1: ICSOFT</meeting>
		<imprint>
			<publisher>INSTICC, SciTePress</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="331" to="338" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">On purpose and by necessity</title>
		<author>
			<persName><forename type="first">David</forename><surname>Basin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Søren</forename><surname>Debois</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Thomas</forename><surname>Hildebrandt</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Twenty-Second International Conference on Financial Cryptography and Data Security (FC)</title>
				<meeting>the Twenty-Second International Conference on Financial Cryptography and Data Security (FC)</meeting>
		<imprint>
			<date type="published" when="2018-02">February 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">TRBAC: A temporal role-based access control model</title>
		<author>
			<persName><forename type="first">Elisa</forename><surname>Bertino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Piero</forename><forename type="middle">A</forename><surname>Bonatti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elena</forename><surname>Ferrari</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst. Secur</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="191" to="233" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Access control for databases: Concepts and systems</title>
		<author>
			<persName><forename type="first">Elisa</forename><surname>Bertino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gabriel</forename><surname>Ghinita</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ashish</forename><surname>Kamra</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Foundations and Trends R in Databases</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">1-2</biblScope>
			<biblScope unit="page" from="1" to="148" />
			<date type="published" when="2011">2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Xacmut: Xacml 2.0 mutants generator</title>
		<author>
			<persName><forename type="first">A</forename><surname>Bertolino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Daoudagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Lonetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Marchetti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of 8th International Workshop on Mutation Analysis</title>
				<meeting>of 8th International Workshop on Mutation Analysis</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="28" to="33" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">An automated modelbased test oracle for access control systems</title>
		<author>
			<persName><forename type="first">Antonia</forename><surname>Bertolino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Said</forename><surname>Daoudagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Francesca</forename><surname>Lonetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eda</forename><surname>Marchetti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 13th International Workshop on Automation of Software Test, AST &apos;18</title>
				<meeting>the 13th International Workshop on Automation of Software Test, AST &apos;18<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="2" to="8" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Automated testing of extensible access control markup language-based access control systems</title>
		<author>
			<persName><forename type="first">Antonia</forename><surname>Bertolino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Said</forename><surname>Daoudagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Francesca</forename><surname>Lonetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eda</forename><surname>Marchetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Louis</forename><surname>Schilders</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IET Software</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="203" to="212" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Data protection impact assessment</title>
		<author>
			<persName><forename type="first">Felix</forename><surname>Bieker</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Nicholas</forename><surname>Martin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Michael</forename><surname>Friedewald</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marit</forename><surname>Hansen</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">IFIP Advances in Information and Communication Technology</title>
				<editor>
			<persName><forename type="first">Marit</forename><surname>Hansen</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Eleni</forename><surname>Kosta</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Igor</forename><surname>Nai-Fovino</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Simone</forename><surname>Fischer-Hübner</surname></persName>
		</editor>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">526</biblScope>
			<biblScope unit="page" from="207" to="220" />
		</imprint>
	</monogr>
	<note>Privacy and Identity Management</note>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">A systematic approach to implementing abac</title>
		<author>
			<persName><forename type="first">David</forename><surname>Brossard</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Gerry</forename><surname>Gebel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mark</forename><surname>Berg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2Nd ACM Workshop on Attribute-Based Access Control, ABAC &apos;17</title>
				<meeting>the 2Nd ACM Workshop on Attribute-Based Access Control, ABAC &apos;17<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="53" to="59" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Integrating access control and business process for GDPR compliance: A preliminary study</title>
		<author>
			<persName><forename type="first">Antonello</forename><surname>Calabrò</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Said</forename><surname>Daoudagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Eda</forename><surname>Marchetti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Third Italian Conference on Cyber Security</title>
				<meeting>the Third Italian Conference on Cyber Security<address><addrLine>Pisa, Italy</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">February 13-15, 2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Towards a declarative approach to stateful and stateless usage control for data protection</title>
		<author>
			<persName><forename type="first">Francesco</forename><surname>Di Cerbo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fabio</forename><surname>Martinelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ilaria</forename><surname>Matteucci</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paolo</forename><surname>Mori</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">WEBIST</title>
				<imprint>
			<publisher>SciTePress</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="308" to="315" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">On xacml&apos;s adequacy to specify and to enforce hipaa</title>
		<author>
			<persName><forename type="first">Omar</forename><surname>Chowdhury</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Haining</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jianwei</forename><surname>Niu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ninghui</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elisa</forename><surname>Bertino</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 3rd USENIX Conference on Health Security and Privacy, HealthSec&apos;12</title>
				<meeting>the 3rd USENIX Conference on Health Security and Privacy, HealthSec&apos;12<address><addrLine>Berkeley, CA, USA</addrLine></address></meeting>
		<imprint>
			<publisher>USENIX Association</publisher>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="11" to="11" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">GEO-RBAC: A spatially aware RBAC</title>
		<author>
			<persName><forename type="first">Maria</forename><surname>Luisa Damiani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elisa</forename><surname>Bertino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Barbara</forename><surname>Catania</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paolo</forename><surname>Perlasca</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst. Secur</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page">2</biblScope>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">XACMET: XACML Testing &amp; Modeling</title>
		<author>
			<persName><forename type="first">S</forename><surname>Daoudagh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Lonetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Marchetti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Software Quality Journal</title>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>To appear</note>
</biblStruct>

<biblStruct xml:id="b19">
	<monogr>
		<title level="m" type="main">A Data Warehouse and a Framework for the Validation and Testing of Access Control Systems</title>
		<author>
			<persName><forename type="first">Said</forename><surname>Daoudagh</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
		<respStmt>
			<orgName>Department of Computer Science, University of Pisa, Italy</orgName>
		</respStmt>
	</monogr>
	<note type="report_type">Master&apos;s thesis</note>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation</title>
	</analytic>
	<monogr>
		<title level="j">Official Journal of the European Union</title>
		<imprint>
			<biblScope unit="volume">119</biblScope>
			<biblScope unit="page" from="1" to="88" />
			<date type="published" when="2016-05">May 2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">A semi-automated methodology for extracting access control rules from the european data protection directive</title>
		<author>
			<persName><forename type="first">Kaniz</forename><surname>Fatema</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Christophe</forename><surname>Debruyne</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dave</forename><surname>Lewis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Declan</forename><surname>Osullivan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><forename type="middle">P</forename><surname>Morrison</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Abdullah-Al</forename><surname>Mazed</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Security and Privacy Workshops (SPW)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="25" to="32" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Extensible access control markup language (XACML) and next generation access control (NGAC)</title>
		<author>
			<persName><forename type="first">David</forename><forename type="middle">F</forename><surname>Ferraiolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ramaswamy</forename><surname>Chandramouli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Rick</forename><surname>Kuhn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vincent</forename><forename type="middle">C</forename><surname>Hu</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016</title>
				<meeting>the 2016 ACM International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016<address><addrLine>New Orleans, Louisiana, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2016-03-11">March 11, 2016. 2016</date>
			<biblScope unit="page" from="13" to="24" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Static analysis for GDPR compliance</title>
		<author>
			<persName><forename type="first">Pietro</forename><surname>Ferrara</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Fausto</forename><surname>Spoto</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Second Italian Conference on Cyber Security (ITASEC)</title>
				<editor>
			<persName><forename type="first">Elena</forename><surname>Ferrari</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Marco</forename><surname>Baldi</surname></persName>
		</editor>
		<editor>
			<persName><forename type="first">Roberto</forename><surname>Baldoni</surname></persName>
		</editor>
		<meeting>the Second Italian Conference on Cyber Security (ITASEC)</meeting>
		<imprint>
			<date type="published" when="2018-02">February 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">An ontological framework for situation-aware access control of software services</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">S M</forename><surname>Kayes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jun</forename><surname>Han</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alan</forename><forename type="middle">W</forename><surname>Colman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Inf. Syst</title>
		<imprint>
			<biblScope unit="volume">53</biblScope>
			<biblScope unit="page" from="253" to="277" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Privacy-aware role-based access control</title>
		<author>
			<persName><forename type="first">Qun</forename><surname>Ni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Elisa</forename><surname>Bertino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jorge</forename><surname>Lobo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Carolyn</forename><surname>Brodie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Clare-Marie</forename><surname>Karat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">John</forename><surname>Karat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Alberto</forename><surname>Trombetta</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Trans. Inf. Syst. Secur</title>
		<imprint>
			<biblScope unit="volume">13</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page">31</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<ptr target="http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html" />
		<title level="m">eXtensible Access Control Markup Language (XACML) Version 3</title>
				<imprint>
			<date type="published" when="2013-01">January 2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Chapter six -mutation testing advances: An analysis and survey</title>
		<author>
			<persName><forename type="first">Mike</forename><surname>Papadakis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Marinos</forename><surname>Kintis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jie</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yue</forename><surname>Jia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Yves</forename><surname>Le Traon</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Mark</forename><surname>Harman</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Computers</title>
				<imprint>
			<publisher>Elsevier</publisher>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">112</biblScope>
			<biblScope unit="page" from="275" to="378" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">From secure business process modeling to design-level security verification</title>
		<author>
			<persName><forename type="first">Mattia</forename><surname>Qusai Ramadan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Daniel</forename><surname>Salnitri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jan</forename><surname>Strüber</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Paolo</forename><surname>Jürjens</surname></persName>
		</author>
		<author>
			<persName><surname>Giorgini</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the ACM/IEEE 20 th International Conference on Model Driven Engineering Languages and Systems (MODELS)</title>
				<meeting>the ACM/IEEE 20 th International Conference on Model Driven Engineering Languages and Systems (MODELS)</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017-09">September 2017</date>
			<biblScope unit="page" from="123" to="133" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<analytic>
		<title level="a" type="main">Automated legal compliance checking by security policy analysis</title>
		<author>
			<persName><forename type="first">Silvio</forename><surname>Ranise</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Hari</forename><surname>Siswantoro</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Computer Safety, Reliability, and Security -SAFECOMP 2017 Workshops, ASSURE, DECSoS</title>
		<title level="s">Lecture Notes in Computer Science</title>
		<meeting><address><addrLine>, SASSUR, TELERISE, and TIPS, Trento, Italy</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017-09-12">September 12, 2017. 2017</date>
			<biblScope unit="volume">10489</biblScope>
			<biblScope unit="page" from="361" to="372" />
		</imprint>
	</monogr>
	<note>Proceedings</note>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Yappl -A lightweight privacy preference language for</title>
		<author>
			<persName><forename type="first">Max-Robert</forename><surname>Ulbricht</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Frank</forename><surname>Pallas</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
