We show how complex privacy requirements can be represented and processed by an extended model of Attribute Based Access Control (ABAC), working with a simple database applications pattern. During application model development, most likely based on UML (e.g. Use Case, Class Diagrams), the analyst and possibly the end user specifies ABAC permissions, and then verifies their effect by running queries on the target data. The ABAC model supports positive and negative permissions, “break glass” overrides of negative permissions, and message/alert generation. The permissions combining algorithms are based on relational database optimisation, and permissions processing is implemented by query modification, producing structurally-optimised queries in an SQL-like language; the queries can then be processed by many database and big data systems. The method and models have been implemented in a prototype Privacy Preferences Tool in collaboration with a large medical records development, and we discuss experiences with focus group evaluations of this tool.
|Title of host publication
|Subtitle of host publication
|2019 13th International Symposium on Theoretical Aspects of Software Engineering
|Institute of Electrical and Electronics Engineers Inc.
|33 - 40
|Number of pages
|Published - 29 Jul 2019
|The 13th International Symposium on Theoretical Aspects of Software Engineering - Guilin, China
Duration: 29 Jul 2019 → 1 Aug 2019
|The 13th International Symposium on Theoretical Aspects of Software Engineering
|29/07/19 → 1/08/19