2014
DOI: 10.21236/ada609113
|View full text |Cite
|
Sign up to set email alerts
|

Temporal Mode-Checking for Runtime Monitoring of Privacy Policies

Abstract: Abstract. Fragments of first-order temporal logic are useful for representing many practical privacy and security policies. Past work has proposed two strategies for checking event trace (audit log) compliance with policies: online monitoring and offline audit. Although online monitoring is space-and time-efficient, existing techniques insist that satisfying instances of all subformulas of the policy be amenable to caching, which limits expressiveness when some subformulas have infinite support. In contrast, o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Going beyond formalism of privacy regulations, recent research also explores techniques to enforce these formalised privacy regulations in real-world data processing systems. Chowdhury et al [31] propose to use temporal model-checking for run-time monitoring of privacy policies. While Chowdhury demonstrates the effectiveness of this approach in online monitoring of privacy policies, it does not provide the capability of static analysis to decide if a analytic program satisfies a privacy policy and can only report privacy violation after it happens.…”
Section: Related Workmentioning
confidence: 99%
“…Going beyond formalism of privacy regulations, recent research also explores techniques to enforce these formalised privacy regulations in real-world data processing systems. Chowdhury et al [31] propose to use temporal model-checking for run-time monitoring of privacy policies. While Chowdhury demonstrates the effectiveness of this approach in online monitoring of privacy policies, it does not provide the capability of static analysis to decide if a analytic program satisfies a privacy policy and can only report privacy violation after it happens.…”
Section: Related Workmentioning
confidence: 99%
“…The paper proves correctness, termination, time and space complexity results of reduce. Chowdhury et al [8] outlines an approach to temporal mode-checking for run-time monitoring of privacy policies by checking online event trace compliance from caching satisfying instances when it can and fall back to brute force checking when it cannot.…”
Section: Related Workmentioning
confidence: 99%
“…It is used to describe contextual informational norms, to detect infractions of these norms, and in approaches to accountability and enforcement [13,44]. Much of the prior work in this space has focused on sophisticated formal logics for describing CI norms that involve complex temporal properties of sequences of information flows such as those involved in HIPAA [45][46][47][48]. However, these logics are typically too expressive to serve as a suitable foundation for tools that mechanize reasoning about privacy norms in real-world systems.…”
Section: Content-based Approachesmentioning
confidence: 99%