2007
DOI: 10.1109/csf.2007.26
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Utility in Business Processes

Abstract: We propose an abstract model of business processes for the purpose of (i) evaluating privacy policy in light of the goals of the process and (ii) developing automated support for privacy policy compliance and audit. In our model, agents that send and receive tagged personal information are assigned organizational roles and responsibilities. We present approaches and algorithms for determining whether a business process design simultaneously achieves privacy and the goals of the organization (utility). The mode… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
78
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 81 publications
(78 citation statements)
references
References 21 publications
0
78
0
Order By: Relevance
“…This differs from purpose restrictions, which do not require the amount of information used to be minimal and often involve purposes that are never fully achieved (e.g., more marketing is always possible). Thus, unlike works on minimal disclosure [28,29], we model purposes as being satisfied to varying degrees. Furthermore, we model probabilistic failures of the agent's plan, which allows us to identify when information use is for a purpose despite not increasing the purpose's satisfaction.…”
Section: Prior Workmentioning
confidence: 99%
“…This differs from purpose restrictions, which do not require the amount of information used to be minimal and often involve purposes that are never fully achieved (e.g., more marketing is always possible). Thus, unlike works on minimal disclosure [28,29], we model purposes as being satisfied to varying degrees. Furthermore, we model probabilistic failures of the agent's plan, which allows us to identify when information use is for a purpose despite not increasing the purpose's satisfaction.…”
Section: Prior Workmentioning
confidence: 99%
“…We motivate our results by modeling a simple online health system described in [2], which allows patients to interact with their doctors and other healthcare professionals using a web-based message passing system. In the system, users have different roles, such as Patient, Secretary, and Doctor.…”
Section: Examplementioning
confidence: 99%
“…The example MyHealth Portal is described in [2]. We checked if the provenance of a variable is always in the regular language Patient (Secretary + ε) Nurse Doctor + + ε.…”
Section: Case Studies: Message Passing Benchmarksmentioning
confidence: 99%
“…For example, Abdallah and Khayat [1] provide a set-theoretic semantics in a formal specification language, and Barth et al [4] briefly mentions a parameterized role extension to a temporal logic for reasoning about privacy. We adapt a variant of these generalized RBAC models to an object-oriented language, provide a static type system for enforcing access control, and have implemented and validated the approach in Java.…”
Section: Related Workmentioning
confidence: 99%
“…The emphasis in some prior work [1,15,4] is on clarifying the formal semantics of a parameterized access control model. For example, Abdallah and Khayat [1] provide a set-theoretic semantics in a formal specification language, and Barth et al [4] briefly mentions a parameterized role extension to a temporal logic for reasoning about privacy.…”
Section: Related Workmentioning
confidence: 99%