respond asynchronously  to requests by  either  grant- 
ing  or  denying  it.  Before  issuing  this  consent,  both 
data  owner  and  IdP  needs  some  assurance  that  the 
right owner has received the request, to do this a se- 
cured secret key generation process is initiated using 
the Diffie Hellman public key exchange discussed in 
Section 4.1, with which they both generate common 
secured key to confirm their identities. Once both par- 
ties are able to confirm their identities and establish a 
common secured key, the data owner drafts a delega- 
tion policy with the client application using the PAP, 
and forwards a response to the IdP. The IdP computes 
an  authorisation  code  with  query  parameters  in  the 
URL and sends it to the user via the adapter. To access 
the resources the user presents the authorisation code 
to  the  SP  in  exchange  for  a  digitally  signed  OAuth 
JSON Web access Token (JWT) and ID token at the 
IdP, that is only understood by the RS but opaque to 
client application  and  user. The  RS  submits  the  au- 
thorisation code directly to the IdP for confirmation 
of code, users authorisation process and scope of ac- 
cess. IdP then responds with the access, refresh and 
ID  token.  The  access  token  is  used  to  invoke  RS 
forthe  protected  resources.  While  the  ID  token 
contain set of claims about the authentication session 
such  as  user,  IdP  and  client  application  ID,  and 
validity of  the token.  In other to protect an attacker 
from overcoming IdP’s security, data owner issues an 
access  token  that  contains  policy  and  scope,  which 
determines  access  lifetime,  purpose,  method, 
location,  usage  and ability to revoke the token (both 
refresh and access). With access token a user is able 
to further invoke the RS for  the  purported service at 
the same instance, while a refresh token is used to 
access  the  same  resource  within  the  lifetime  of  the 
access token. 
5  CONCLUSIONS AND FUTURE 
WORK 
This  paper  introduces  a  user  centred  access 
delegation  framework.  It  foresees  a  method  that 
secures users privacy and ensure data confidentiality 
by  authenticating a  requestor, and  granting only  an 
authorized  requestor  access  to  data  via  a  revocable 
token.  This  manifestation  has  detached  the  need  to 
trust an external IdP residing at the SP or controlled 
by third parties and vice versa. 
Being part of a work in progress, we strongly rely 
on already implemented IdMs, client applications and 
Government  owned  registers  for  integrating  the 
method.  For  future  development,  we  plan  to 
implement  our  framework  within  the  health  care, 
education  and  other  social  services  to  support 
seamless  interoperability  of  citizens  data.  This  we 
believe will further support EU digital single market. 
ACKNOWLEDGEMENTS 
This  work  is  partially  financed  by  National  Funds 
through  the Portuguese funding agency, FCT  - Fun- 
dação para  a Ciência  e  a Tecnologia, within  project 
UIDB/50014/2020.” 
REFERENCES 
Ausanka-Crues, R. (2001). Methods for access control: ad-
 
vances and limitations. Harvey Mudd College, 301:20.
 
Dash,    P.,    Rabensteiner,    C.,    Hörandner,    F.,    and  
Roth,  S.  (2017).    Towards  privacy-preserving  and 
user-centric  identity  management  as  a  service.  Open 
Identity Sum-  mit 2017. 
Directive, E.  (1995). 95/46/ec of the  european parliament 
and  of  the  council  of  24  october  1995  on  the  protec- 
tion  of  individuals  with  regard  to  the  processing  of 
personal data and on the free movement of such data. 
Official Journal of the EC, 23(6). 
Falcão-Reis,  F.  and  Correia,  M.  E.  (2010).  Patient 
empowerment  by  the  means  of  citizen-managed elec- 
tronic health records.  Medical and Care Compunetics, 
6:214–228. 
Gates, C. (2007). Access control requirements for web 2.0 
security and privacy. IEEE Web, 2(0). 
Hankerson,  D.,  Menezes,  A.  J.,  and  Vanstone,  S.  (2006). 
Guide to elliptic curve cryptography.  Springer  Sci- 
ence & Business Media. 
Hu, V. C., Ferraiolo, D., Kuhn, R., Schnitzer, A., Sandlin, 
K.,  Miller,  R.,  and  Scarfone,  K.  (2014).  Guide  to  at- 
tribute based access control (abac) definition and con- 
siderations. NIST Special Publication, 800:162. 
Jin,  X.,  Krishnan,  R.,  and  Sandhu,  R.  (2012).  A  unified 
attribute-based  access  control  model  covering  dac, 
mac and rbac. In IFIP Annual Conference on Data and 
Applications Security and Privacy,  pages  41–55. 
Springer. 
Kuegler,  D.  and  Sheffer,  Y.  (2012).  Password  authenti- 
cated  connection  establishment  with  the  internet  key 
exchange protocol version 2 (ikev2). IETF RFC 6631. 
Leitold,  H.,  Lioy,  A.,  and  Ribeiro,  C.  (2014).  Stork  2.0: 
Breaking  new  grounds  on  eid  and  mandates.  In  Pro- 
ceedings of ID World International Congress,  pages 
1–8. . 
NIST, N. (1995). An introduction to computer security: The 
nist  handbook.  NIST Special Publication,  pages  800– 
12. 
Regulation, E. (2016). 2016/679 of the european parliament 
and of the council of 27 april 2016 on the protection of 
natural  persons  with  regard  to  the  processing  of  per- 
sonal data and on the free movement of such data, and