SlideShare una empresa de Scribd logo
1 de 31
A UML Profile for Privacy
Enforcement
Javier L. Cánovas Izquierdo, Julián Salas
unsplash/matthew-henry
flickr/clark-tibbs
Motivation
Data is key
Data is key
User Information Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Data is key
User Information Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
Data is key
User Information
Data is the new currency
Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
Data is key
User Information
Data is the new currency
Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
•Geographic,
geopolitical
and financial
data
Statistics
Election results Legal acts
Data on crime, health, the
environment, transport
and scientific research
The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
•Geographic,
geopolitical
and financial
data
Statistics
Election results Legal acts
Data on crime, health, the
environment, transport
and scientific research
BUT…
Let’s not forget to mention…
…harmonize data privacy laws across Europe, to protect and
empower all EU citizens data privacy and to reshape the way
organizations across the region approach data privacy…
KEEP
CALM
AND
COMPLY WITH
GDPR
How is it treated currently?
How is it treated currently?…in MDE?
How is it treated currently?…in MDE?
How is it treated currently?…in MDE?
Privacy and security at high-level
Methodological approaches
Access control policy solutions
Mont, M.C., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with
Consent and Revocation Requirements
Allison, D.S., Yamany, H.F.E., Capretz, M.A.M.: Metamodel for privacy policies within SOA
Busch, M.: Evaluating & engineering: an approach for the development of secure web applications
Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications
Ahmadian, A.S., Peldszus, S., Ramadan, Q., Jürjens, J.: Model-based privacy and security analysis with carisma
Ahmadian, A.S., Strüber, D., Riediger, V., Jürjens, J.: Model-based privacy analysis in industrial ecosystems
Alshammari, M., Simpson, A.: A UML profile for privacy-aware data lifecycle models
XACML, PRBAC, UMLSec, Ponder
Unsplash/david-iskander
Our Proposal
Example
Example
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
Example with our profile
Conclusion
• Profile to specify privacy
• Models annotated with the profile
can promote privacy enforcement
What we have shown
What we want to do next
Application to specific fields
Promoting Open Data
Challenges
Flickr/TimPainter
How to add this information to existing methodologies?
…how we can leverage existing model-based approaches?
…how hard would it be?
#1
#2
How to convince organizations to annotate their data?
…are they actually concerned?
…would they see it as beneficial?
#3
Is it posible to automatically annotate existing models with privacy
information?
…are there some guidelines?
#4
How to mix data with different privacy enforcement definitions?
…how to deal with UML Class associations?
…what happens when dealing with other UML diagrams?
Except where otherwise noted, content on this presentation is licensed under a Creative Commons Attribution 4.0 International license.
Thanks!
Javier L. Cánovas Izquierdo
jcanovasi@uoc.edu
@jlcanovas
Julian Salas
jsalapi@uoc.edu

Más contenido relacionado

Similar a A UML Profile for Privacy Enforcement

Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's Presentation
Mediabistro
 
Oz!a 2009 sna v0.2
Oz!a 2009 sna   v0.2Oz!a 2009 sna   v0.2
Oz!a 2009 sna v0.2
Mia Horrigan
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppt
gealehegn
 
Security Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIsSecurity Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIs
Dr. V Vorvoreanu
 
Security Concerns With Privacy in Social Media
Security Concerns With Privacy in Social MediaSecurity Concerns With Privacy in Social Media
Security Concerns With Privacy in Social Media
Kenie Moses
 

Similar a A UML Profile for Privacy Enforcement (20)

Norman Sadeh's Presentation
Norman Sadeh's PresentationNorman Sadeh's Presentation
Norman Sadeh's Presentation
 
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
 
Oz!a 2009 sna v0.2
Oz!a 2009 sna   v0.2Oz!a 2009 sna   v0.2
Oz!a 2009 sna v0.2
 
Ethics and information architecture - The 6th Academics and Practitioners Rou...
Ethics and information architecture - The 6th Academics and Practitioners Rou...Ethics and information architecture - The 6th Academics and Practitioners Rou...
Ethics and information architecture - The 6th Academics and Practitioners Rou...
 
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - RoytmanWho Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
 
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
 
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
 
Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...Managing and publishing sensitive data in the social sciences - Webinar trans...
Managing and publishing sensitive data in the social sciences - Webinar trans...
 
UN Global Pulse Privacy Framing
UN Global Pulse Privacy FramingUN Global Pulse Privacy Framing
UN Global Pulse Privacy Framing
 
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AIAICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
 
Technology for everyone - AI ethics and Bias
Technology for everyone - AI ethics and BiasTechnology for everyone - AI ethics and Bias
Technology for everyone - AI ethics and Bias
 
hel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppthel29999999999999999999999999999999999999999999.ppt
hel29999999999999999999999999999999999999999999.ppt
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Security Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIsSecurity Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIs
 
Security Concerns With Privacy in Social Media
Security Concerns With Privacy in Social MediaSecurity Concerns With Privacy in Social Media
Security Concerns With Privacy in Social Media
 
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons LearnedPrivacy in AI/ML Systems: Practical Challenges and Lessons Learned
Privacy in AI/ML Systems: Practical Challenges and Lessons Learned
 
Privacy, Data Protection and SNS
Privacy, Data Protection and SNSPrivacy, Data Protection and SNS
Privacy, Data Protection and SNS
 
Your organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & securityYour organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & security
 
IIR 2017, Lugano Switzerland
IIR 2017, Lugano SwitzerlandIIR 2017, Lugano Switzerland
IIR 2017, Lugano Switzerland
 

Más de Javier Canovas

Más de Javier Canovas (20)

On the Analysis of Non-Coding Roles in Open Source Development
On the Analysis of Non-Coding Roles in Open Source DevelopmentOn the Analysis of Non-Coding Roles in Open Source Development
On the Analysis of Non-Coding Roles in Open Source Development
 
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
 
A Model-based Chatbot Generation Approach to Converse with Open Data Sources
A Model-based Chatbot Generation Approach to Converse with Open Data SourcesA Model-based Chatbot Generation Approach to Converse with Open Data Sources
A Model-based Chatbot Generation Approach to Converse with Open Data Sources
 
Chatbots to Democratize the Access to Information and Internet Services
Chatbots to Democratize the Access to Information and Internet ServicesChatbots to Democratize the Access to Information and Internet Services
Chatbots to Democratize the Access to Information and Internet Services
 
Analysis and Modeling of the Governance in General Programming Languages
Analysis and Modeling of the Governance in General Programming LanguagesAnalysis and Modeling of the Governance in General Programming Languages
Analysis and Modeling of the Governance in General Programming Languages
 
Automatic Generation of Test Cases for REST APIs: a Specification-Based Approach
Automatic Generation of Test Cases for REST APIs: a Specification-Based ApproachAutomatic Generation of Test Cases for REST APIs: a Specification-Based Approach
Automatic Generation of Test Cases for REST APIs: a Specification-Based Approach
 
The Role of Foundations in Open Source Projects
The Role of Foundations in Open Source ProjectsThe Role of Foundations in Open Source Projects
The Role of Foundations in Open Source Projects
 
An Empirical Study on the Maturity of the Eclipse Modeling Ecosystem
An Empirical Study on the Maturity of the Eclipse Modeling EcosystemAn Empirical Study on the Maturity of the Eclipse Modeling Ecosystem
An Empirical Study on the Maturity of the Eclipse Modeling Ecosystem
 
Example-driven Web API Specification Discovery
Example-driven Web API Specification DiscoveryExample-driven Web API Specification Discovery
Example-driven Web API Specification Discovery
 
Software Modernization Revisited: Challenges and Prospects
Software Modernization Revisited:Challenges and ProspectsSoftware Modernization Revisited:Challenges and Prospects
Software Modernization Revisited: Challenges and Prospects
 
Findings from GitHub. Methods, Datasets and Limitations
Findings from GitHub. Methods, Datasets and LimitationsFindings from GitHub. Methods, Datasets and Limitations
Findings from GitHub. Methods, Datasets and Limitations
 
Enabling the Definition and Enforcement of Governance Rules in Open Source Sy...
Enabling the Definition and Enforcement of Governance Rules in Open Source Sy...Enabling the Definition and Enforcement of Governance Rules in Open Source Sy...
Enabling the Definition and Enforcement of Governance Rules in Open Source Sy...
 
Exploring the Use of Labels to Categorize Issues in Open-Source Software Pro...
Exploring the Use of Labels to Categorize Issues in Open-Source Software Pro...Exploring the Use of Labels to Categorize Issues in Open-Source Software Pro...
Exploring the Use of Labels to Categorize Issues in Open-Source Software Pro...
 
Composing JSON-based Web APIs
Composing JSON-based Web APIsComposing JSON-based Web APIs
Composing JSON-based Web APIs
 
Retos Actuales en el Desarrollo de Lenguajes Específicos del Dominio
Retos Actuales en el Desarrollo de Lenguajes Específicos del DominioRetos Actuales en el Desarrollo de Lenguajes Específicos del Dominio
Retos Actuales en el Desarrollo de Lenguajes Específicos del Dominio
 
Discovering Implicit Schemas in JSON Data
Discovering Implicit Schemas in JSON DataDiscovering Implicit Schemas in JSON Data
Discovering Implicit Schemas in JSON Data
 
Enabling the Collaborative Definition of DSMLs
Enabling the Collaborative Definition of DSMLsEnabling the Collaborative Definition of DSMLs
Enabling the Collaborative Definition of DSMLs
 
Domain-Specific Languages
Domain-Specific LanguagesDomain-Specific Languages
Domain-Specific Languages
 
Modernization in Eclipse
Modernization in EclipseModernization in Eclipse
Modernization in Eclipse
 
Software Modernization
Software ModernizationSoftware Modernization
Software Modernization
 

Último

Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
PirithiRaju
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
Areesha Ahmad
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
PirithiRaju
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
levieagacer
 

Último (20)

FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
Introduction to Viruses
Introduction to VirusesIntroduction to Viruses
Introduction to Viruses
 
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
High Class Escorts in Hyderabad ₹7.5k Pick Up & Drop With Cash Payment 969456...
 
GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)GBSN - Microbiology (Unit 3)
GBSN - Microbiology (Unit 3)
 
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit flypumpkin fruit fly, water melon fruit fly, cucumber fruit fly
pumpkin fruit fly, water melon fruit fly, cucumber fruit fly
 
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICESAMASTIPUR CALL GIRL 7857803690  LOW PRICE  ESCORT SERVICE
SAMASTIPUR CALL GIRL 7857803690 LOW PRICE ESCORT SERVICE
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdfPests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
Pests of cotton_Borer_Pests_Binomics_Dr.UPR.pdf
 
Bacterial Identification and Classifications
Bacterial Identification and ClassificationsBacterial Identification and Classifications
Bacterial Identification and Classifications
 
Pests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdfPests of mustard_Identification_Management_Dr.UPR.pdf
Pests of mustard_Identification_Management_Dr.UPR.pdf
 
Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.Proteomics: types, protein profiling steps etc.
Proteomics: types, protein profiling steps etc.
 
Grade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its FunctionsGrade 7 - Lesson 1 - Microscope and Its Functions
Grade 7 - Lesson 1 - Microscope and Its Functions
 
Clean In Place(CIP).pptx .
Clean In Place(CIP).pptx                 .Clean In Place(CIP).pptx                 .
Clean In Place(CIP).pptx .
 
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceuticsPulmonary drug delivery system M.pharm -2nd sem P'ceutics
Pulmonary drug delivery system M.pharm -2nd sem P'ceutics
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate ProfessorThyroid Physiology_Dr.E. Muralinath_ Associate Professor
Thyroid Physiology_Dr.E. Muralinath_ Associate Professor
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Zoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdfZoology 5th semester notes( Sumit_yadav).pdf
Zoology 5th semester notes( Sumit_yadav).pdf
 
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
Locating and isolating a gene, FISH, GISH, Chromosome walking and jumping, te...
 
GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)GBSN - Microbiology (Unit 2)
GBSN - Microbiology (Unit 2)
 

A UML Profile for Privacy Enforcement

  • 1. A UML Profile for Privacy Enforcement Javier L. Cánovas Izquierdo, Julián Salas unsplash/matthew-henry
  • 4. Data is key User Information Email, social security number, passport… Geolocation, videos, pictures, routines…Personal Data
  • 5. Data is key User Information Email, social security number, passport… Geolocation, videos, pictures, routines…Personal Data Composite information Route to go to work… Places to pass the night…
  • 6. Data is key User Information Data is the new currency Email, social security number, passport… Geolocation, videos, pictures, routines…Personal Data Composite information Route to go to work… Places to pass the night…
  • 7. Data is key User Information Data is the new currency Email, social security number, passport… Geolocation, videos, pictures, routines…Personal Data Composite information Route to go to work… Places to pass the night…
  • 8. The Open Data Movement Data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other mechanisms of control
  • 9. The Open Data Movement Data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other mechanisms of control •Geographic, geopolitical and financial data Statistics Election results Legal acts Data on crime, health, the environment, transport and scientific research
  • 10. The Open Data Movement Data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other mechanisms of control •Geographic, geopolitical and financial data Statistics Election results Legal acts Data on crime, health, the environment, transport and scientific research BUT…
  • 11. Let’s not forget to mention… …harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy…
  • 13. How is it treated currently?
  • 14. How is it treated currently?…in MDE?
  • 15. How is it treated currently?…in MDE?
  • 16. How is it treated currently?…in MDE? Privacy and security at high-level Methodological approaches Access control policy solutions Mont, M.C., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with Consent and Revocation Requirements Allison, D.S., Yamany, H.F.E., Capretz, M.A.M.: Metamodel for privacy policies within SOA Busch, M.: Evaluating & engineering: an approach for the development of secure web applications Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications Ahmadian, A.S., Peldszus, S., Ramadan, Q., Jürjens, J.: Model-based privacy and security analysis with carisma Ahmadian, A.S., Strüber, D., Riediger, V., Jürjens, J.: Model-based privacy analysis in industrial ecosystems Alshammari, M., Simpson, A.: A UML profile for privacy-aware data lifecycle models XACML, PRBAC, UMLSec, Ponder
  • 20. A profile for privacy enforcement
  • 21. A profile for privacy enforcement
  • 22. A profile for privacy enforcement
  • 23. A profile for privacy enforcement
  • 24. A profile for privacy enforcement
  • 25. A profile for privacy enforcement
  • 26. A profile for privacy enforcement
  • 27. Example with our profile
  • 28. Conclusion • Profile to specify privacy • Models annotated with the profile can promote privacy enforcement What we have shown What we want to do next Application to specific fields Promoting Open Data
  • 30. How to add this information to existing methodologies? …how we can leverage existing model-based approaches? …how hard would it be? #1 #2 How to convince organizations to annotate their data? …are they actually concerned? …would they see it as beneficial? #3 Is it posible to automatically annotate existing models with privacy information? …are there some guidelines? #4 How to mix data with different privacy enforcement definitions? …how to deal with UML Class associations? …what happens when dealing with other UML diagrams?
  • 31. Except where otherwise noted, content on this presentation is licensed under a Creative Commons Attribution 4.0 International license. Thanks! Javier L. Cánovas Izquierdo jcanovasi@uoc.edu @jlcanovas Julian Salas jsalapi@uoc.edu