Other Legal Frameworks. Applying and adapting
the different proposals to other legal requirements,
such as the new coming ePrivacy regulation as well
as to the eIDAS regulation, seems to be an interesting
future development.
ACKNOWLEDGEMENTS
This work is partially supported by the following
research projects: CyberSec4Europe H2020 Grant
Agreement No. 830929, BIECO H2020 Grant Agree-
ment No. 952702, and COVR H2020 Agreement No.
779966.
REFERENCES
Arfelt, E., Basin, D., and Debois, S. (2019). Monitoring the
gdpr. In European Symposium on Research in Com-
puter Security, pages 681–699. Springer.
Barsocchi, P., Calabr
`
o, A., Crivello, A., Daoudagh, S.,
Furfari, F., Girolami, M., and Marchetti, E. (2021).
COVID-19 & privacy: Enhancing of indoor localiza-
tion architectures towards effective social distancing.
Array, 9:100051.
Bartolini, C., Daoudagh, S., Lenzini, G., and Marchetti, E.
(2019a). Gdpr-based user stories in the access control
perspective. In Quality of Information and Communi-
cations Technology - 12th International Conference,
QUATIC 2019, Ciudad Real, Spain, September 11-13,
2019, Proceedings, pages 3–17.
Bartolini, C., Daoudagh, S., Lenzini, G., and Marchetti,
E. (2019b). Towards a lawful authorized access: A
preliminary gdpr-based authorized access. In 14th In-
ternational Conference on Software Technologies (IC-
SOFT 2019), Prague, Czech Republic, July 26-28,
2019., pages 331–338.
Basin, D., Debois, S., and Hildebrandt, T. (2018). On pur-
pose and by necessity. In Proceedings of the Twenty-
Second International Conference on Financial Cryp-
tography and Data Security (FC).
Calabr
`
o, A., Daoudagh, S., and Marchetti, E. (2019). Inte-
grating access control and business process for GDPR
compliance: A preliminary study. In Proceedings of
the Third Italian Conference on Cyber Security, Pisa,
Italy, February 13-15, 2019.
Chowdhury, O., Chen, H., Niu, J., Li, N., and Bertino, E.
(2012). On xacml’s adequacy to specify and to enforce
hipaa. In Proceedings of the 3rd USENIX Conference
on Health Security and Privacy, HealthSec’12, pages
11–11, Berkeley, CA, USA. USENIX Association.
Daoudagh, S. (2021). The GDPR Compliance Through
Access Control Systems. [PhD Dissertation, Univer-
sity of Pisa]. https://etd.adm.unipi.it/theses/available/
etd-07112021-124810/.
Daoudagh, S., Lonetti, F., and Marchetti, E. (2020a). As-
sessing testing strategies for access control systems:
A controlled experiment. In Proceedings of ICISSP
2020, Valletta, Malta, February 25-27, 2020.
Daoudagh, S., Lonetti, F., and Marchetti, E. (2020b).
XACMET: XACML testing & modeling. Softw. Qual.
J., 28(1):249–282.
Daoudagh, S. and Marchetti, E. (2020a). Defining con-
trolled experiments inside the access control environ-
ment. In Hammoudi, S., Pires, L. F., and Selic, B., ed-
itors, Proceedings of the 8th International Conference
on Model-Driven Engineering and Software Develop-
ment, MODELSWARD 2020, Valletta, Malta, Febru-
ary 25-27, 2020, pages 167–176. SCITEPRESS.
Daoudagh, S. and Marchetti, E. (2020b). A life cycle for
authorization systems development in the GDPR per-
spective. In Loreti, M. and Spalazzi, L., editors, Pro-
ceedings of the Fourth Italian Conference on Cyber
Security, Ancona, Italy, February 4th to 7th, 2020,
volume 2597 of CEUR Workshop Proceedings, pages
128–140. CEUR-WS.org.
Daoudagh, S. and Marchetti, E. (2021). Graduation: A
gdpr-based mutation methodology. In Quality of In-
formation and Communications Technology - 14th In-
ternational Conference, QUATIC 2021, Faro, Portu-
gal, September 8-11, 2021, Proceedings, pages –.
Daoudagh, S., Marchetti, E., Savarino, V., Bernabe, J. B.,
Garc
´
ıa-Rodr
´
ıguez, J., Moreno, R. T., Martinez, J. A.,
and Skarmeta, A. F. (2021). Data protection by design
in the context of smart cities: A consent and access
control proposal. Sensors, 21(21).
Davari, M. and Bertino, E. (2019). Access control model
extensions to support data privacy protection based on
gdpr. In 2019 IEEE International Conference on Big
Data (Big Data), pages 4017–4024.
Dernaika, F., Cuppens-Boulahia, N., Cuppens, F., and Ray-
naud, O. (2020). Accountability in the A posteriori
access control: A requirement and a mechanism. In
Quality of Information and Communications Technol-
ogy - 13th International Conference, QUATIC 2020,
Faro, Portugal, September 9-11, 2020, Proceedings,
volume 1266 of Communications in Computer and In-
formation Science, pages 332–342. Springer.
Douglas Teodoro, Emilie Pasche, P. R. and Morley-
Fletcher, E. (2017). Deliverable 1.1 initial list of
main requirements. http://www.myhealthmydata.eu/
wp-content/themes/Parallax-One/deliverables/D1.
1 Initial-List-of-Main-Requirements.pdf.
European Union (2016). Regulation (EU) 2016/679 of the
European Parliament and of the Council of 27 April
2016 (General Data Protection Regulation). Official
Journal of the European Union, L119:1–88.
Felderer, M., B
¨
uchler, M., Johns, M., Brucker, A. D., Breu,
R., and Pretschner, A. (2016). Chapter one - security
testing: A survey. volume 101 of Advances in Com-
puters, pages 1–51. Elsevier.
Group., K. I. C. . I. S. W. (2018). Consent
receipt specification 1.1.0. kantara initia-
tive technical specification recommendation.
https://kantarainitiative.org/file-downloads/
consent-receipt-specification-v1-1-0/.
Kalapodi, A. and Sklavos, N. (2021). The concerns of per-
sonal data privacy, on calling and messaging, network-
The GDPR Compliance and Access Control Systems: Challenges and Research Opportunities
577