A survey on empirical security analysis of access-control systems: a real-world perspective

S Parkinson, S Khan - ACM Computing Surveys, 2022 - dl.acm.org
There any many different access-control systems, yet a commonality is that they provide
flexible mechanisms to enforce different access levels. Their importance in organisations to …

Compliance checking of software processes: A systematic literature review

JP Castellanos Ardila, B Gallina… - Journal of Software …, 2022 - Wiley Online Library
The processes used to develop software need to comply with normative requirements (eg,
standards and regulations) to align with the market and the law. Manual compliance …

Using models to enable compliance checking against the GDPR: an experience report

D Torre, G Soltana, M Sabetzadeh… - 2019 ACM/IEEE …, 2019 - ieeexplore.ieee.org
The General Data Protection Regulation (GDPR) harmonizes data privacy laws and
regulations across Europe. Through the GDPR, individuals are able to better control their …

Modeling data protection and privacy: application and experience with GDPR

D Torre, M Alferez, G Soltana, M Sabetzadeh… - Software and Systems …, 2021 - Springer
In Europe and indeed worldwide, the General Data Protection Regulation (GDPR) provides
protection to individuals regarding their personal data in the face of new technological …

Automated legal compliance checking by security policy analysis

S Ranise, H Siswantoro - … , SASSUR, TELERISE, and TIPS, Trento, Italy …, 2017 - Springer
Legal compliance-by-design is the process of developing a software system that processes
personal data in such a way that its ability to meet specific legal provisions is ascertained. In …

TR-model. A metadata profile application for personal data transparency

TA Coleti, PLP Corrêa, LVL Filgueiras… - IEEE Access, 2020 - ieeexplore.ieee.org
People's usage of social networks, mobile applications, websites, sensor networks and other
computer systems leads to a massive production of personal data about their behaviors and …

Model driven engineering for data protection and privacy: Application and experience with GDPR

D Torre, M Alferez, G Soltana, M Sabetzadeh… - arXiv preprint arXiv …, 2020 - arxiv.org
In Europe and indeed worldwide, the General Data Protection Regulation (GDPR) provides
protection to individuals regarding their personal data in the face of new technological …

[图书][B] Problem-based privacy analysis (ProPAn): a computer-aided privacy requirements engineering method

R Meis - 2018 - search.proquest.com
With the advancing digitalization in almost all parts of our daily life, eg, electronic health
records and smart homes, and the outsourcing of data processing, eg, data storage in the …

[PDF][PDF] Towards a reference architecture for trusted smart statistics

F Ricciato, M Skaliotis, A Wirthmann… - 104th DGINS …, 2018 - researchgate.net
In this contribution we outline the concept of Trusted Smart Statistics as the natural evolution
of official statistics in the new datafied world, where traditional data sources (survey and …

Three Decades of Formal Methods in Business Process Compliance: A Systematic Literature Review

HA López, TT Hildebrandt - arXiv preprint arXiv:2410.10906, 2024 - arxiv.org
Digitalization efforts often face a key challenge: business processes must not only be
efficient in achieving their goals but also adhere to legal regulations. Business process …