2013 IEEE Security and Privacy Workshops 2013
DOI: 10.1109/spw.2013.26
|View full text |Cite
|
Sign up to set email alerts
|

Log Design for Accountability

Abstract: International audienceThe position put forward in this paper is that accountability is a requirement to be taken into account from the initial design phase of a system because of its strong impact on log architecture implementation. As an illustration, the logs we consider here record actions by data controllers handling personally identifiable information to deliver services to data subjects. The structures of those logs seldom take into account requirements for accountability, preventing effective dispute re… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(16 citation statements)
references
References 15 publications
0
16
0
Order By: Relevance
“…Le Métayer et al [3,2,7,6] have described several languages for describing architectures and deciding privacy-related properties over them. Barth et al [4] also give a formal definition of architectures, and show how to decide properties defined in temporal logic.…”
Section: Related Workmentioning
confidence: 99%
“…Le Métayer et al [3,2,7,6] have described several languages for describing architectures and deciding privacy-related properties over them. Barth et al [4] also give a formal definition of architectures, and show how to decide properties defined in temporal logic.…”
Section: Related Workmentioning
confidence: 99%
“…Actually, one of the arguments against the use of accountability of practice is that the logs required to implement it could in fact represent an additional source of risks for personal data. As illustrated in our work [4], designing the contents of the logs is therefore far from obvious: intuitive solutions typically include too much data or omit information necessary for effective compliance. -A clear definition of the accountability process has to be provided, showing how accounts are built and analyzed.…”
Section: Context and Motivationmentioning
confidence: 99%
“…The format of the logs is a key design choice for an accountability architecture. As discussed in [4], this choice is far from obvious. In our framework, it is guided by two factors: the privacy policies which have to be verified and the aforementioned data minimization principle.…”
Section: Log Eventsmentioning
confidence: 99%
See 1 more Smart Citation
“…Available means to achieve this accountability of practice include privacy policy languages such as EPAL [7] or PPL [20], which allow the precise specification of (technical) data handling policies. These standardised policies can then be used to analyze system operation traces (audit logs) through a posteriori technical compliance control [8,11].…”
Section: Existing Work On Privacy and Video Surveillancementioning
confidence: 99%