Corpus ID: 227151847

Transforming Data Flow Diagrams for Privacy Compliance (Long Version)

@article{Alshareef2020TransformingDF,
  title={Transforming Data Flow Diagrams for Privacy Compliance (Long Version)},
  author={Hanaa Alshareef and Sandro Stucki and G. Schneider},
  journal={ArXiv},
  year={2020},
  volume={abs/2011.12028}
}
Recent regulations, such as the European General Data Protection Regulation (GDPR), put stringent constraints on the handling of personal data. Privacy, like security, is a non-functional property, yet most software design tools are focused on functional aspects, using for instance Data Flow Diagrams (DFDs). In previous work, a conceptual model was introduced where DFDs could be extended into so-called Privacy-Aware Data Flow Diagrams (PA-DFDs) with the aim of adding specific privacy checks to… Expand

Figures and Tables from this paper

References

SHOWING 1-10 OF 35 REFERENCES
Privacy Compliance Via Model Transformations
TLDR
This work presents an approach based on model transformations, which guarantee that an architectural design encompasses regulation-oriented principles such as purpose limitation, or accountability of the data controller, thus enabling a constructive approach to privacy by design. Expand
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis
TLDR
An intuitive graphical notation is provided, based on the familiar Data Flow Diagrams, which requires as little effort as possible in terms of extra security-centric information the designer has to provide and is meant to be amenable for designers that have very limited or no background in formal models, logics, and the like. Expand
A Privacy-Aware Conceptual Model for Handling Personal Data
TLDR
This paper outlines the technical concepts related to privacy that need to be taken into consideration in a software design and extends a popular design notation in order to support the privacy concepts illustrated in the previous point. Expand
A Critical Analysis of Privacy Design Strategies
TLDR
This paper helps bridge the gap between data protection requirements set out in law, and system development practice, and suggests an additional level of abstraction between strategies and privacy patterns: 'tactics'. Expand
Is Privacy by Construction Possible?
TLDR
The main question is how much privacy can you effectively achieve by using PbD, and in particular whether it is possible to achieve Privacy by Construction. Expand
A systematic methodology for privacy impact assessments: a design science approach
TLDR
It is argued that companies that employ the proposed PIA can achieve ‘privacy-by-design’, which is widely heralded by data protection authorities and ratified by the German Federal Office for Information Security. Expand
Empirical evaluation of a privacy-focused threat modeling methodology
TLDR
This assessment characterizes the correctness and completeness of the analysis results produced by LINDDUN, as well as the productivity associated with executing the methodology, and looks into aspects such as the ease of use and reliability of LindDUN. Expand
Towards Confidentiality-by-Construction
TLDR
This work proposes a development method for specifying information flow policies first and constructing programs satisfying these policies subsequently, and replaces functional pre- and postcondition specifications with confidentiality properties and defines rules to derive new confidentiality specifications for each refining program construct. Expand
Integrating advanced technologies to uphold security of payment: Data flow diagram
TLDR
A comprehensive framework that integrates practical advanced technologies to address SOP issues in the construction industry is developed and new and practical insights into the application and integration of smart sensors, oracles, BIM, blockchain technology and smart contracts are contributed. Expand
Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions
TLDR
This work reviews all controversies around the new stringent definitions of consent revocation and the right to be forgotten and argues that such enforcement is indeed feasible provided that implementation guidelines and low-level business specifications are put in place in a clear and cross-platform manner in order to cater for all possible exceptions and complexities. Expand
...
1
2
3
4
...