SlideShare a Scribd company logo
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
PDP4E-Req tool
demonstration
Patrick Tessier (CEA)
Gabriel Pedroza (CEA)
Nicolás E. Díaz Ferreyra (UDE)
Maritta Heisel (UDE)
Requirements Engineering Tool and Method
(WP4)
11/06/2021 PDP4E
PDP4E Privacy Req. Engineering Method
Tool
Requirement Information
Deduction
ProPAn Artefacts
PDP Goal
Requirement
Metamodel
Data Protection
Principle
Hansen
Generation of Privacy
Requirement Candidates
Semantic Template
Adjust Privacy
Requirements
Validate Privacy
Requirements
Requirement Information
Privacy Requirement Candidates
Adjusted Privacy Requirements
Validated Privacy Requirements
Method Step
External Input
Internal Input/output
P-DFD
ProPAn
Taxonomy
PDP Metamodel
External Input (new)
X
PDP4E Req
WP4
Overall process to elicit GDPR
requirements
Assist Engineers to
manage GDPR
Requirements including
upward and downward
traceability
PDP4E 3
11/06/2021 WP4
1. Specify Functional requirements
Goal: Specify functional requirements focusing on processing activities
Example for Smart Grid
R05-02: Data Scientist shall perform analysis on data available in the data sharing
platform. For example, studying grid response to some events in specific locations.
 PDP4E-Req tool support: Dedicated extension of Papyrus Req
Feature 1: create SysML Requirements
Feature 2: ensure Requirements management including traceability
WP4 PDP4E 4
11/06/2021
Functional requirements overview
 Functional requirements model
WP4 PDP4E 5
11/06/2021
2. Transformation into RDFD
• Goal: Functional requirements are translated into RDFD elements:
PDP4E 6
• Data Record Requirement (DRR): Collection of data records (e.g. personal data)
• Data Process Requirement (DPR): Activities that are performed over data records.
• Data Flow Requirement (DFR): Exchange of information between DRR and DPR.
PDP4E-Req tool support: Activity-like Diagram to support RDFD models
Feature 1: dedicated profile implementing GDPR fundamental notions
Feature 2: traceability between RDFDs and functional Requirements ensured
11/06/2021 WP4
2. RDFD model overview
02/12/2019 15 PDP4E 7
2. Transformation into RDFD -
Personal Information Diagram
Goal: Specify data involved in processing activities and relate high-level concepts
which are necessary when analyzing :
Aggregation of data,
Availability of data to different stakeholders,
Classify/separate personal -and non personal- Data
PDP4E-Req tool support: Dedicated Class-like diagram to support PIDs.
Feature 1: dedicated profile based upon GDPR and added privacy notions
Feature 2: stereotype to identify personal (non-personal) data
PDP4E 8
11/06/2021 WP4
2. PID model overview
WP4 PDP4E 9
11/06/2021
3. Validation of RDFD model
 Provide a correct-by-construction RDFD
 Model should be in compliance with GDPR meta-model (and respective provisions)
 Each error/warning raises an alert for the requirement engineer to consider
 For example, for personal data
 Who is the DataSubject?
 Who is the responsible for processing (i.e., the controller)?
PDP4E-Req tool support: Integrated validation at a click of a button
Feature 1: implemented validation rules based on the GDPR profile
Feature 2: rules for model completeness validation (e.g., missing elements)
Feature 3: rules for model correctness validation (e.g., wrong stereotypes)
WP4 PDP4E 10
11/06/2021
3. Validation outcomes overview
WP4 PDP4E 11
11/06/2021
Errors/Warnings and concerned model elements 
Error/warning markers on the model elements 
4. GDPR Requirements
generation
PDP4E 12
 Goal: Generate the GDPR requirements a system should satisfy
 Several categories of requirements can be generated
 According to GDPR principles/aspects: lawfulness, transparency, safeguards
 According to privacy concerns: anonymity, confidentiality
PDP4E-Req tool support: automatic generation of GDPR requirements
 Feature 1: generation based upon GDPR profile
 Feature 2: automatic model structuring to ease requirements exploration
 Feature 3: dedicated package to store generated requirements
 Feature 4: traceability between functional (system-to-be) and GDPR requirements
 Feature 5: interactive help in case model information is missing prior to generation
 Feature 6: dedicated interface to ease upwards and downwards requirement search
11/06/2021 WP4
4. Overview of PDP4E-Req interface
WP4 PDP4E 13
11/06/2021
Selection of GDPR category  GDPR requirements generated 
4. Upwards and downwards
traceability and search
Support for req. engineering tasks:
 Find/show functional Requirements containing GDPR requirements
 Show GDPR requirements structure (as a tree)
 Help to explore and understand GDPR requirements structure (parents, children)
 Model explorer customization to display:
 Sub requirements even if there are not in the same package
 Display the number of GDPR requirements in the sub-tree
 Dedicated view to display set of requirements that should be satisfied.
 Color code: blue for GDPR requirements, black for functional requirements
 Possibility to filter requirements
WP4 PDP4E 14
11/06/2021
4. Upwards and downwards
traceability and search overviews
WP4 PDP4E 15
11/06/2021
Functional and GDPR requirements associated  GDPR Requirements View 
Summary of achievements
 PDP4E-Req released as open-source (EPL-2):
https://git.eclipse.org/c/papyrus/org.eclipse.papyrus-privacydesigner.git/
 PDP4E-Req site to facilitate installation:
https://ci.eclipse.org/papyrus/view/privacydesigner/job/privacydesigner-2020-06/
PDP4E-Req implements the methodology for RE targeting PDP:
 DFD for requirements (RDFD)
 Structuration of data and personal data (PID)
 Support for model validation (correctness)
 Automatic generation of GDPR and data protection requirements
 Dedicated GUI to search and navigate into the requirements structure
PDP4E 16
11/06/2021 WP4
Acknowledgements
29/06/2021
This project has received funding from the European Union’s Horizon 2020 research and innovation
programme under grant agreement No 787034.
Purpose and IPR Notice: the material in this support has been mostly prepared by CEA in the scope of PDP4E for explanatory
and training purposes. Any partial or full usage of this material in a different context requires written and explicit consent from
the respective partners. The property of the contents herein referred (including methods, tools and trademarks) belongs to the
respective IPR and copyright holders.
PDP4E 17
WP4
Methods and Tools for GDPR Compliance through
Privacy and Data
Protection 4 Engineering
For more information, visit:
www.pdp4e-project.org
Thank you for your attention
Questions?
WP Leader: CEA
gabriel.pedroza@cea.fr
patrick.tessier@cea.fr

More Related Content

What's hot

Wp6 public
Wp6 publicWp6 public
Beawre pitch
Beawre pitchBeawre pitch
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4EPrivacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineering
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
Privacy Data Protection for Engineering
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
Privacy Data Protection for Engineering
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
Elsa Prieto
 
Kontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia NetworksKontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia Networks
kontakt.io
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
Ulf Mattsson
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
Ulf Mattsson
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
DEFeND Project
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Travis Greene
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Csaba Krasznay
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
Ulf Mattsson
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
Ulf Mattsson
 
Secure access to biomedical data sources for legal data sharing-kuchinke
Secure access to biomedical data sources for legal data sharing-kuchinkeSecure access to biomedical data sources for legal data sharing-kuchinke
Secure access to biomedical data sources for legal data sharing-kuchinke
Wolfgang Kuchinke
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
Ulf Mattsson
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
Ulf Mattsson
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
Ulf Mattsson
 

What's hot (20)

Wp6 public
Wp6 publicWp6 public
Wp6 public
 
Beawre pitch
Beawre pitchBeawre pitch
Beawre pitch
 
Privacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4EPrivacy Data Protection for Engineers - PDP4E
Privacy Data Protection for Engineers - PDP4E
 
Pdp4e IPEN-2019
Pdp4e  IPEN-2019Pdp4e  IPEN-2019
Pdp4e IPEN-2019
 
Pdp4 e privacy engineering toolkit ipen 2019
Pdp4 e privacy engineering toolkit   ipen 2019Pdp4 e privacy engineering toolkit   ipen 2019
Pdp4 e privacy engineering toolkit ipen 2019
 
Granular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra RuizGranular or holistic approaches 210126 Alejandra Ruiz
Granular or holistic approaches 210126 Alejandra Ruiz
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Kontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia NetworksKontakt.io webinar with Cassia Networks
Kontakt.io webinar with Cassia Networks
 
Privacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computationPrivacy preserving computing and secure multi party computation
Privacy preserving computing and secure multi party computation
 
ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...ISACA Houston - How to de-classify data and rethink transfer of data between ...
ISACA Houston - How to de-classify data and rethink transfer of data between ...
 
Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project Mcis 2018 DEFeND Project
Mcis 2018 DEFeND Project
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral ResearchersAdjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
Adjusting to the GDPR: The Impact on Data Scientists and Behavioral Researchers
 
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
Hungarian Electronic Public Administration Interoperability Framework (MEKIK)...
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Secure access to biomedical data sources for legal data sharing-kuchinke
Secure access to biomedical data sources for legal data sharing-kuchinkeSecure access to biomedical data sources for legal data sharing-kuchinke
Secure access to biomedical data sources for legal data sharing-kuchinke
 
Unlock the potential of data security 2020
Unlock the potential of data security 2020Unlock the potential of data security 2020
Unlock the potential of data security 2020
 
Evolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technologyEvolving regulations are changing the way we think about tools and technology
Evolving regulations are changing the way we think about tools and technology
 
ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 

Similar to Wp4 tool demonstration_v1

Format preserving encryption bachelor thesis
Format preserving encryption bachelor thesisFormat preserving encryption bachelor thesis
Format preserving encryption bachelor thesis
at MicroFocus Italy ❖✔
 
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
EUDAT
 
Data Discoverability and Persistent Identifiers - EUDAT Summer School (Chris...
Data Discoverability and Persistent Identifiers - EUDAT Summer School  (Chris...Data Discoverability and Persistent Identifiers - EUDAT Summer School  (Chris...
Data Discoverability and Persistent Identifiers - EUDAT Summer School (Chris...
EUDAT
 
Refactoring legacy code: step-by-step examples
Refactoring legacy code: step-by-step examplesRefactoring legacy code: step-by-step examples
Refactoring legacy code: step-by-step examples
Endava
 
UML Representation of NPOESS Data Products in HDF5
UML Representation of NPOESS Data Products in HDF5UML Representation of NPOESS Data Products in HDF5
UML Representation of NPOESS Data Products in HDF5
The HDF-EOS Tools and Information Center
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
DEFeND Project
 
Unit 4.pptx
Unit 4.pptxUnit 4.pptx
Unit 4.pptx
SREESARAN5
 
Computer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringComputer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineering
university of sust.
 
Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...
Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...
Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...
Denodo
 
Paper
PaperPaper
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET Journal
 
Petroleum Data Models for spatial data
Petroleum Data Models for spatial dataPetroleum Data Models for spatial data
Petroleum Data Models for spatial data
absvis
 
OpenDDR
OpenDDROpenDDR
OpenDDR
Werner Keil
 
H2020 data pilot openaire
H2020 data pilot openaireH2020 data pilot openaire
H2020 data pilot openaire
Sarah Jones
 
The Horizon 2020 Open Data Pilot - OpenAIRE webinar (Oct. 21 2014) by Sarah J...
The Horizon 2020 Open Data Pilot - OpenAIRE webinar (Oct. 21 2014) by Sarah J...The Horizon 2020 Open Data Pilot - OpenAIRE webinar (Oct. 21 2014) by Sarah J...
The Horizon 2020 Open Data Pilot - OpenAIRE webinar (Oct. 21 2014) by Sarah J...
OpenAIRE
 
FIWARE Global Summit - BDVA / Boost 4.0 Big Data Reference Architecture
FIWARE Global Summit - BDVA / Boost 4.0 Big Data Reference ArchitectureFIWARE Global Summit - BDVA / Boost 4.0 Big Data Reference Architecture
FIWARE Global Summit - BDVA / Boost 4.0 Big Data Reference Architecture
FIWARE
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
VMUG IT
 
PyModESt: A Python Framework for Staging of Geo-referenced Data on the Coll...
PyModESt: A Python Framework for Staging of Geo-referenced Data on the Coll...PyModESt: A Python Framework for Staging of Geo-referenced Data on the Coll...
PyModESt: A Python Framework for Staging of Geo-referenced Data on the Coll...
Andreas Schreiber
 
Big Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark DataBig Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark Data
Hitachi Vantara
 
Open-DO: Towards a Lean Approach for Certification (Cyrille Comar)
Open-DO: Towards a Lean Approach for Certification  (Cyrille Comar)Open-DO: Towards a Lean Approach for Certification  (Cyrille Comar)
Open-DO: Towards a Lean Approach for Certification (Cyrille Comar)
AdaCore
 

Similar to Wp4 tool demonstration_v1 (20)

Format preserving encryption bachelor thesis
Format preserving encryption bachelor thesisFormat preserving encryption bachelor thesis
Format preserving encryption bachelor thesis
 
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
Linking HPC to Data Management - EUDAT Summer School (Giuseppe Fiameni, CINECA)
 
Data Discoverability and Persistent Identifiers - EUDAT Summer School (Chris...
Data Discoverability and Persistent Identifiers - EUDAT Summer School  (Chris...Data Discoverability and Persistent Identifiers - EUDAT Summer School  (Chris...
Data Discoverability and Persistent Identifiers - EUDAT Summer School (Chris...
 
Refactoring legacy code: step-by-step examples
Refactoring legacy code: step-by-step examplesRefactoring legacy code: step-by-step examples
Refactoring legacy code: step-by-step examples
 
UML Representation of NPOESS Data Products in HDF5
UML Representation of NPOESS Data Products in HDF5UML Representation of NPOESS Data Products in HDF5
UML Representation of NPOESS Data Products in HDF5
 
DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018DEFeND Project Presentation - July 2018
DEFeND Project Presentation - July 2018
 
Unit 4.pptx
Unit 4.pptxUnit 4.pptx
Unit 4.pptx
 
Computer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringComputer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineering
 
Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...
Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...
Data Catalog in Denodo Platform 7.0: Creating a Data Marketplace with Data Vi...
 
Paper
PaperPaper
Paper
 
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
IRJET- Usage of Multiple Clouds for Storing and Securing Data through Identit...
 
Petroleum Data Models for spatial data
Petroleum Data Models for spatial dataPetroleum Data Models for spatial data
Petroleum Data Models for spatial data
 
OpenDDR
OpenDDROpenDDR
OpenDDR
 
H2020 data pilot openaire
H2020 data pilot openaireH2020 data pilot openaire
H2020 data pilot openaire
 
The Horizon 2020 Open Data Pilot - OpenAIRE webinar (Oct. 21 2014) by Sarah J...
The Horizon 2020 Open Data Pilot - OpenAIRE webinar (Oct. 21 2014) by Sarah J...The Horizon 2020 Open Data Pilot - OpenAIRE webinar (Oct. 21 2014) by Sarah J...
The Horizon 2020 Open Data Pilot - OpenAIRE webinar (Oct. 21 2014) by Sarah J...
 
FIWARE Global Summit - BDVA / Boost 4.0 Big Data Reference Architecture
FIWARE Global Summit - BDVA / Boost 4.0 Big Data Reference ArchitectureFIWARE Global Summit - BDVA / Boost 4.0 Big Data Reference Architecture
FIWARE Global Summit - BDVA / Boost 4.0 Big Data Reference Architecture
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
PyModESt: A Python Framework for Staging of Geo-referenced Data on the Coll...
PyModESt: A Python Framework for Staging of Geo-referenced Data on the Coll...PyModESt: A Python Framework for Staging of Geo-referenced Data on the Coll...
PyModESt: A Python Framework for Staging of Geo-referenced Data on the Coll...
 
Big Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark DataBig Data – Shining the Light on Enterprise Dark Data
Big Data – Shining the Light on Enterprise Dark Data
 
Open-DO: Towards a Lean Approach for Certification (Cyrille Comar)
Open-DO: Towards a Lean Approach for Certification  (Cyrille Comar)Open-DO: Towards a Lean Approach for Certification  (Cyrille Comar)
Open-DO: Towards a Lean Approach for Certification (Cyrille Comar)
 

More from Privacy Data Protection for Engineering

Long term security evolution of ai and data protection antonio kung trialog...
Long term security evolution of ai and data protection   antonio kung trialog...Long term security evolution of ai and data protection   antonio kung trialog...
Long term security evolution of ai and data protection antonio kung trialog...
Privacy Data Protection for Engineering
 
Granular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio KungGranular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio Kung
Privacy Data Protection for Engineering
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
Privacy Data Protection for Engineering
 
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
Privacy Data Protection for Engineering
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
Privacy Data Protection for Engineering
 
Ipen2018
Ipen2018Ipen2018

More from Privacy Data Protection for Engineering (6)

Long term security evolution of ai and data protection antonio kung trialog...
Long term security evolution of ai and data protection   antonio kung trialog...Long term security evolution of ai and data protection   antonio kung trialog...
Long term security evolution of ai and data protection antonio kung trialog...
 
Granular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio KungGranular or holistic approaches - Antonio Kung
Granular or holistic approaches - Antonio Kung
 
Antonio kung impact of ai on privacy sept 10
Antonio kung impact of ai on privacy   sept 10Antonio kung impact of ai on privacy   sept 10
Antonio kung impact of ai on privacy sept 10
 
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2Antonio kung - pdp4e privacy engineering oxford   sept 9 - v2
Antonio kung - pdp4e privacy engineering oxford sept 9 - v2
 
Ipen 2019 roma status of privacy engineering standardisation v2
Ipen 2019 roma   status of privacy engineering standardisation v2Ipen 2019 roma   status of privacy engineering standardisation v2
Ipen 2019 roma status of privacy engineering standardisation v2
 
Ipen2018
Ipen2018Ipen2018
Ipen2018
 

Recently uploaded

LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
TheSMSPoint
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
Google
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
Gerardo Pardo-Castellote
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 

Recently uploaded (20)

LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Transform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR SolutionsTransform Your Communication with Cloud-Based IVR Solutions
Transform Your Communication with Cloud-Based IVR Solutions
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI AppAI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
AI Fusion Buddy Review: Brand New, Groundbreaking Gemini-Powered AI App
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
DDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systemsDDS-Security 1.2 - What's New? Stronger security for long-running systems
DDS-Security 1.2 - What's New? Stronger security for long-running systems
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 

Wp4 tool demonstration_v1

  • 1. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering PDP4E-Req tool demonstration Patrick Tessier (CEA) Gabriel Pedroza (CEA) Nicolás E. Díaz Ferreyra (UDE) Maritta Heisel (UDE) Requirements Engineering Tool and Method (WP4)
  • 2. 11/06/2021 PDP4E PDP4E Privacy Req. Engineering Method Tool Requirement Information Deduction ProPAn Artefacts PDP Goal Requirement Metamodel Data Protection Principle Hansen Generation of Privacy Requirement Candidates Semantic Template Adjust Privacy Requirements Validate Privacy Requirements Requirement Information Privacy Requirement Candidates Adjusted Privacy Requirements Validated Privacy Requirements Method Step External Input Internal Input/output P-DFD ProPAn Taxonomy PDP Metamodel External Input (new) X PDP4E Req WP4
  • 3. Overall process to elicit GDPR requirements Assist Engineers to manage GDPR Requirements including upward and downward traceability PDP4E 3 11/06/2021 WP4
  • 4. 1. Specify Functional requirements Goal: Specify functional requirements focusing on processing activities Example for Smart Grid R05-02: Data Scientist shall perform analysis on data available in the data sharing platform. For example, studying grid response to some events in specific locations.  PDP4E-Req tool support: Dedicated extension of Papyrus Req Feature 1: create SysML Requirements Feature 2: ensure Requirements management including traceability WP4 PDP4E 4 11/06/2021
  • 5. Functional requirements overview  Functional requirements model WP4 PDP4E 5 11/06/2021
  • 6. 2. Transformation into RDFD • Goal: Functional requirements are translated into RDFD elements: PDP4E 6 • Data Record Requirement (DRR): Collection of data records (e.g. personal data) • Data Process Requirement (DPR): Activities that are performed over data records. • Data Flow Requirement (DFR): Exchange of information between DRR and DPR. PDP4E-Req tool support: Activity-like Diagram to support RDFD models Feature 1: dedicated profile implementing GDPR fundamental notions Feature 2: traceability between RDFDs and functional Requirements ensured 11/06/2021 WP4
  • 7. 2. RDFD model overview 02/12/2019 15 PDP4E 7
  • 8. 2. Transformation into RDFD - Personal Information Diagram Goal: Specify data involved in processing activities and relate high-level concepts which are necessary when analyzing : Aggregation of data, Availability of data to different stakeholders, Classify/separate personal -and non personal- Data PDP4E-Req tool support: Dedicated Class-like diagram to support PIDs. Feature 1: dedicated profile based upon GDPR and added privacy notions Feature 2: stereotype to identify personal (non-personal) data PDP4E 8 11/06/2021 WP4
  • 9. 2. PID model overview WP4 PDP4E 9 11/06/2021
  • 10. 3. Validation of RDFD model  Provide a correct-by-construction RDFD  Model should be in compliance with GDPR meta-model (and respective provisions)  Each error/warning raises an alert for the requirement engineer to consider  For example, for personal data  Who is the DataSubject?  Who is the responsible for processing (i.e., the controller)? PDP4E-Req tool support: Integrated validation at a click of a button Feature 1: implemented validation rules based on the GDPR profile Feature 2: rules for model completeness validation (e.g., missing elements) Feature 3: rules for model correctness validation (e.g., wrong stereotypes) WP4 PDP4E 10 11/06/2021
  • 11. 3. Validation outcomes overview WP4 PDP4E 11 11/06/2021 Errors/Warnings and concerned model elements  Error/warning markers on the model elements 
  • 12. 4. GDPR Requirements generation PDP4E 12  Goal: Generate the GDPR requirements a system should satisfy  Several categories of requirements can be generated  According to GDPR principles/aspects: lawfulness, transparency, safeguards  According to privacy concerns: anonymity, confidentiality PDP4E-Req tool support: automatic generation of GDPR requirements  Feature 1: generation based upon GDPR profile  Feature 2: automatic model structuring to ease requirements exploration  Feature 3: dedicated package to store generated requirements  Feature 4: traceability between functional (system-to-be) and GDPR requirements  Feature 5: interactive help in case model information is missing prior to generation  Feature 6: dedicated interface to ease upwards and downwards requirement search 11/06/2021 WP4
  • 13. 4. Overview of PDP4E-Req interface WP4 PDP4E 13 11/06/2021 Selection of GDPR category  GDPR requirements generated 
  • 14. 4. Upwards and downwards traceability and search Support for req. engineering tasks:  Find/show functional Requirements containing GDPR requirements  Show GDPR requirements structure (as a tree)  Help to explore and understand GDPR requirements structure (parents, children)  Model explorer customization to display:  Sub requirements even if there are not in the same package  Display the number of GDPR requirements in the sub-tree  Dedicated view to display set of requirements that should be satisfied.  Color code: blue for GDPR requirements, black for functional requirements  Possibility to filter requirements WP4 PDP4E 14 11/06/2021
  • 15. 4. Upwards and downwards traceability and search overviews WP4 PDP4E 15 11/06/2021 Functional and GDPR requirements associated  GDPR Requirements View 
  • 16. Summary of achievements  PDP4E-Req released as open-source (EPL-2): https://git.eclipse.org/c/papyrus/org.eclipse.papyrus-privacydesigner.git/  PDP4E-Req site to facilitate installation: https://ci.eclipse.org/papyrus/view/privacydesigner/job/privacydesigner-2020-06/ PDP4E-Req implements the methodology for RE targeting PDP:  DFD for requirements (RDFD)  Structuration of data and personal data (PID)  Support for model validation (correctness)  Automatic generation of GDPR and data protection requirements  Dedicated GUI to search and navigate into the requirements structure PDP4E 16 11/06/2021 WP4
  • 17. Acknowledgements 29/06/2021 This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 787034. Purpose and IPR Notice: the material in this support has been mostly prepared by CEA in the scope of PDP4E for explanatory and training purposes. Any partial or full usage of this material in a different context requires written and explicit consent from the respective partners. The property of the contents herein referred (including methods, tools and trademarks) belongs to the respective IPR and copyright holders. PDP4E 17 WP4
  • 18. Methods and Tools for GDPR Compliance through Privacy and Data Protection 4 Engineering For more information, visit: www.pdp4e-project.org Thank you for your attention Questions? WP Leader: CEA gabriel.pedroza@cea.fr patrick.tessier@cea.fr