SlideShare a Scribd company logo
A UML Profile for Privacy
Enforcement
Javier L. Cánovas Izquierdo, Julián Salas
unsplash/matthew-henry
flickr/clark-tibbs
Motivation
Data is key
Data is key
User Information Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Data is key
User Information Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
Data is key
User Information
Data is the new currency
Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
Data is key
User Information
Data is the new currency
Email, social security number, passport…
Geolocation, videos, pictures, routines…Personal Data
Composite information
Route to go to work…
Places to pass the night…
The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
•Geographic,
geopolitical
and financial
data
Statistics
Election results Legal acts
Data on crime, health, the
environment, transport
and scientific research
The Open Data Movement
Data should be freely available to everyone
to use and republish as they wish, without
restrictions from copyright, patents or other
mechanisms of control
•Geographic,
geopolitical
and financial
data
Statistics
Election results Legal acts
Data on crime, health, the
environment, transport
and scientific research
BUT…
Let’s not forget to mention…
…harmonize data privacy laws across Europe, to protect and
empower all EU citizens data privacy and to reshape the way
organizations across the region approach data privacy…
KEEP
CALM
AND
COMPLY WITH
GDPR
How is it treated currently?
How is it treated currently?…in MDE?
How is it treated currently?…in MDE?
How is it treated currently?…in MDE?
Privacy and security at high-level
Methodological approaches
Access control policy solutions
Mont, M.C., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with
Consent and Revocation Requirements
Allison, D.S., Yamany, H.F.E., Capretz, M.A.M.: Metamodel for privacy policies within SOA
Busch, M.: Evaluating & engineering: an approach for the development of secure web applications
Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications
Ahmadian, A.S., Peldszus, S., Ramadan, Q., Jürjens, J.: Model-based privacy and security analysis with carisma
Ahmadian, A.S., Strüber, D., Riediger, V., Jürjens, J.: Model-based privacy analysis in industrial ecosystems
Alshammari, M., Simpson, A.: A UML profile for privacy-aware data lifecycle models
XACML, PRBAC, UMLSec, Ponder
Unsplash/david-iskander
Our Proposal
Example
Example
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
A profile for privacy enforcement
Example with our profile
Conclusion
• Profile to specify privacy
• Models annotated with the profile
can promote privacy enforcement
What we have shown
What we want to do next
Application to specific fields
Promoting Open Data
Challenges
Flickr/TimPainter
How to add this information to existing methodologies?
…how we can leverage existing model-based approaches?
…how hard would it be?
#1
#2
How to convince organizations to annotate their data?
…are they actually concerned?
…would they see it as beneficial?
#3
Is it posible to automatically annotate existing models with privacy
information?
…are there some guidelines?
#4
How to mix data with different privacy enforcement definitions?
…how to deal with UML Class associations?
…what happens when dealing with other UML diagrams?
Except where otherwise noted, content on this presentation is licensed under a Creative Commons Attribution 4.0 International license.
Thanks!
Javier L. Cánovas Izquierdo
jcanovasi@uoc.edu
@jlcanovas
Julian Salas
jsalapi@uoc.edu

More Related Content

PDF
Data Analytics and Artificial Intelligence in the era of Digital Transformation
PDF
Petascale Analytics Largescale Machine Learning In The Earth Sciences 1st Edi...
PDF
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
ODP
Recognition Markets and Visual Privacy
PDF
Computational Intelligent Data Analysis For Sustainable Development Ting Yu
PPTX
High accuracy ML & AI over sensitive data
PPTX
Your organization and Big Data: Managing, access, privacy, & security
PPTX
Your organization and Big Data: Managing access, privacy, and security
Data Analytics and Artificial Intelligence in the era of Digital Transformation
Petascale Analytics Largescale Machine Learning In The Earth Sciences 1st Edi...
Mobile Devices: Systemisation of Knowledge about Privacy Invasion Tactics and...
Recognition Markets and Visual Privacy
Computational Intelligent Data Analysis For Sustainable Development Ting Yu
High accuracy ML & AI over sensitive data
Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing access, privacy, and security

Similar to A UML Profile for Privacy Enforcement (20)

PDF
Data Clustering Algorithms and Applications First Edition Charu C. Aggarwal
PPTX
Ethics and Politics of Big Data
DOCX
Jackie Rees
PDF
Data Clustering Algorithms and Applications First Edition Charu C. Aggarwal
PPT
Norman Sadeh's Presentation
PPTX
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
PPTX
Oz!a 2009 sna v0.2
PPTX
Ethics and information architecture - The 6th Academics and Practitioners Rou...
PDF
Data Clustering Algorithms and Applications First Edition Charu C. Aggarwal
PDF
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
PPTX
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
PDF
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
PDF
Data Clustering Algorithms and Applications First Edition Charu C. Aggarwal
PDF
Managing and publishing sensitive data in the social sciences - Webinar trans...
PPTX
UN Global Pulse Privacy Framing
PPTX
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
PPTX
Technology for everyone - AI ethics and Bias
PPT
hel29999999999999999999999999999999999999999999.ppt
PDF
The Science Of Quantitative Information Flow Mário S. Alvim
PPTX
OpenSourceIntelligence-OSINT.pptx
Data Clustering Algorithms and Applications First Edition Charu C. Aggarwal
Ethics and Politics of Big Data
Jackie Rees
Data Clustering Algorithms and Applications First Edition Charu C. Aggarwal
Norman Sadeh's Presentation
Privacy-preserving Data Mining in Industry (WSDM 2019 Tutorial)
Oz!a 2009 sna v0.2
Ethics and information architecture - The 6th Academics and Practitioners Rou...
Data Clustering Algorithms and Applications First Edition Charu C. Aggarwal
Who Watches the Watchers Metrics for Security Strategy - BsidesLV 2015 - Roytman
Privacy-preserving Data Mining in Industry (WWW 2019 Tutorial)
Revisiting Digital Media and Internet Research Ethics. A Process Oriented App...
Data Clustering Algorithms and Applications First Edition Charu C. Aggarwal
Managing and publishing sensitive data in the social sciences - Webinar trans...
UN Global Pulse Privacy Framing
AICHROTH Systemaic evaluation and decentralisation for a (bit more) trusted AI
Technology for everyone - AI ethics and Bias
hel29999999999999999999999999999999999999999999.ppt
The Science Of Quantitative Information Flow Mário S. Alvim
OpenSourceIntelligence-OSINT.pptx
Ad

More from Javier Canovas (20)

PDF
On the Analysis of Non-Coding Roles in Open Source Development
PDF
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
PDF
A Model-based Chatbot Generation Approach to Converse with Open Data Sources
PPTX
Chatbots to Democratize the Access to Information and Internet Services
PPTX
Analysis and Modeling of the Governance in General Programming Languages
PPTX
Automatic Generation of Test Cases for REST APIs: a Specification-Based Approach
PPTX
The Role of Foundations in Open Source Projects
PPTX
An Empirical Study on the Maturity of the Eclipse Modeling Ecosystem
PPTX
Example-driven Web API Specification Discovery
PPTX
Software Modernization Revisited: Challenges and Prospects
PPTX
Findings from GitHub. Methods, Datasets and Limitations
PPTX
Enabling the Definition and Enforcement of Governance Rules in Open Source Sy...
PPTX
Exploring the Use of Labels to Categorize Issues in Open-Source Software Pro...
PPTX
Composing JSON-based Web APIs
PPTX
Retos Actuales en el Desarrollo de Lenguajes Específicos del Dominio
PPTX
Discovering Implicit Schemas in JSON Data
PPTX
Enabling the Collaborative Definition of DSMLs
PPTX
Domain-Specific Languages
PDF
Modernization in Eclipse
PDF
Software Modernization
On the Analysis of Non-Coding Roles in Open Source Development
Open Source Software Governance Guide: Developing a Matrix of Leading Questio...
A Model-based Chatbot Generation Approach to Converse with Open Data Sources
Chatbots to Democratize the Access to Information and Internet Services
Analysis and Modeling of the Governance in General Programming Languages
Automatic Generation of Test Cases for REST APIs: a Specification-Based Approach
The Role of Foundations in Open Source Projects
An Empirical Study on the Maturity of the Eclipse Modeling Ecosystem
Example-driven Web API Specification Discovery
Software Modernization Revisited: Challenges and Prospects
Findings from GitHub. Methods, Datasets and Limitations
Enabling the Definition and Enforcement of Governance Rules in Open Source Sy...
Exploring the Use of Labels to Categorize Issues in Open-Source Software Pro...
Composing JSON-based Web APIs
Retos Actuales en el Desarrollo de Lenguajes Específicos del Dominio
Discovering Implicit Schemas in JSON Data
Enabling the Collaborative Definition of DSMLs
Domain-Specific Languages
Modernization in Eclipse
Software Modernization
Ad

Recently uploaded (20)

PDF
Is Earendel a Star Cluster?: Metal-poor Globular Cluster Progenitors at z ∼ 6
PDF
lecture 2026 of Sjogren's syndrome l .pdf
PPTX
Overview of calcium in human muscles.pptx
PPTX
Introcution to Microbes Burton's Biology for the Health
PPTX
The Minerals for Earth and Life Science SHS.pptx
PPTX
BIOMOLECULES PPT........................
PPTX
TOTAL hIP ARTHROPLASTY Presentation.pptx
PDF
Sciences of Europe No 170 (2025)
PDF
Looking into the jet cone of the neutrino-associated very high-energy blazar ...
PPTX
Introduction to Cardiovascular system_structure and functions-1
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PDF
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
PDF
Placing the Near-Earth Object Impact Probability in Context
PDF
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
PDF
An interstellar mission to test astrophysical black holes
PDF
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
PPTX
Fluid dynamics vivavoce presentation of prakash
PPT
Heredity-grade-9 Heredity-grade-9. Heredity-grade-9.
PPTX
Hypertension_Training_materials_English_2024[1] (1).pptx
Is Earendel a Star Cluster?: Metal-poor Globular Cluster Progenitors at z ∼ 6
lecture 2026 of Sjogren's syndrome l .pdf
Overview of calcium in human muscles.pptx
Introcution to Microbes Burton's Biology for the Health
The Minerals for Earth and Life Science SHS.pptx
BIOMOLECULES PPT........................
TOTAL hIP ARTHROPLASTY Presentation.pptx
Sciences of Europe No 170 (2025)
Looking into the jet cone of the neutrino-associated very high-energy blazar ...
Introduction to Cardiovascular system_structure and functions-1
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
Phytochemical Investigation of Miliusa longipes.pdf
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
Placing the Near-Earth Object Impact Probability in Context
ELS_Q1_Module-11_Formation-of-Rock-Layers_v2.pdf
An interstellar mission to test astrophysical black holes
Unveiling a 36 billion solar mass black hole at the centre of the Cosmic Hors...
Fluid dynamics vivavoce presentation of prakash
Heredity-grade-9 Heredity-grade-9. Heredity-grade-9.
Hypertension_Training_materials_English_2024[1] (1).pptx

A UML Profile for Privacy Enforcement

  • 1. A UML Profile for Privacy Enforcement Javier L. Cánovas Izquierdo, Julián Salas unsplash/matthew-henry
  • 4. Data is key User Information Email, social security number, passport… Geolocation, videos, pictures, routines…Personal Data
  • 5. Data is key User Information Email, social security number, passport… Geolocation, videos, pictures, routines…Personal Data Composite information Route to go to work… Places to pass the night…
  • 6. Data is key User Information Data is the new currency Email, social security number, passport… Geolocation, videos, pictures, routines…Personal Data Composite information Route to go to work… Places to pass the night…
  • 7. Data is key User Information Data is the new currency Email, social security number, passport… Geolocation, videos, pictures, routines…Personal Data Composite information Route to go to work… Places to pass the night…
  • 8. The Open Data Movement Data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other mechanisms of control
  • 9. The Open Data Movement Data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other mechanisms of control •Geographic, geopolitical and financial data Statistics Election results Legal acts Data on crime, health, the environment, transport and scientific research
  • 10. The Open Data Movement Data should be freely available to everyone to use and republish as they wish, without restrictions from copyright, patents or other mechanisms of control •Geographic, geopolitical and financial data Statistics Election results Legal acts Data on crime, health, the environment, transport and scientific research BUT…
  • 11. Let’s not forget to mention… …harmonize data privacy laws across Europe, to protect and empower all EU citizens data privacy and to reshape the way organizations across the region approach data privacy…
  • 13. How is it treated currently?
  • 14. How is it treated currently?…in MDE?
  • 15. How is it treated currently?…in MDE?
  • 16. How is it treated currently?…in MDE? Privacy and security at high-level Methodological approaches Access control policy solutions Mont, M.C., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with Consent and Revocation Requirements Allison, D.S., Yamany, H.F.E., Capretz, M.A.M.: Metamodel for privacy policies within SOA Busch, M.: Evaluating & engineering: an approach for the development of secure web applications Basso, T., Montecchi, L., Moraes, R., Jino, M., Bondavalli, A.: Towards a UML profile for privacy-aware applications Ahmadian, A.S., Peldszus, S., Ramadan, Q., Jürjens, J.: Model-based privacy and security analysis with carisma Ahmadian, A.S., Strüber, D., Riediger, V., Jürjens, J.: Model-based privacy analysis in industrial ecosystems Alshammari, M., Simpson, A.: A UML profile for privacy-aware data lifecycle models XACML, PRBAC, UMLSec, Ponder
  • 20. A profile for privacy enforcement
  • 21. A profile for privacy enforcement
  • 22. A profile for privacy enforcement
  • 23. A profile for privacy enforcement
  • 24. A profile for privacy enforcement
  • 25. A profile for privacy enforcement
  • 26. A profile for privacy enforcement
  • 27. Example with our profile
  • 28. Conclusion • Profile to specify privacy • Models annotated with the profile can promote privacy enforcement What we have shown What we want to do next Application to specific fields Promoting Open Data
  • 30. How to add this information to existing methodologies? …how we can leverage existing model-based approaches? …how hard would it be? #1 #2 How to convince organizations to annotate their data? …are they actually concerned? …would they see it as beneficial? #3 Is it posible to automatically annotate existing models with privacy information? …are there some guidelines? #4 How to mix data with different privacy enforcement definitions? …how to deal with UML Class associations? …what happens when dealing with other UML diagrams?
  • 31. Except where otherwise noted, content on this presentation is licensed under a Creative Commons Attribution 4.0 International license. Thanks! Javier L. Cánovas Izquierdo jcanovasi@uoc.edu @jlcanovas Julian Salas jsalapi@uoc.edu