2011 IEEE 13th International Symposium on High-Assurance Systems Engineering 2011
DOI: 10.1109/hase.2011.51
|View full text |Cite
|
Sign up to set email alerts
|

Transforming Privacy Policies to Auditing Specifications

Abstract: With more and more personal data being collected and stored by service providers, there is an increasing need to ensure that their usage is compliant with privacy regulations. We consider the specific scenario where policies are defined in metric temporal logic and audited against the database usage logs. Previous works have shown that this can indeed be achieved in an efficient manner for a very expressive set of policies. One of the main ingredients of such an auditing process is the availability of sufficie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Finally, regarding Auditing process, Biswas and Niemi [29] proposes a solution to streamline the log generation by deriving the auditing specifications directly from the policies to be audited.…”
Section: Feasibilitymentioning
confidence: 99%
“…Finally, regarding Auditing process, Biswas and Niemi [29] proposes a solution to streamline the log generation by deriving the auditing specifications directly from the policies to be audited.…”
Section: Feasibilitymentioning
confidence: 99%
“…Regulations and codes of conduct We find tools to define and enforce privacy policies [45], privacy-friendly access control protocols to ensure that data are only accessed by authorized parties [8], and audit tools to verify that no inappropriate access has taken place [5]. For example, Kumari et al [31] propose usage control mechanisms for data shared by smart meters.…”
Section: Related Workmentioning
confidence: 99%
“…A widespread solution is Shibboleth (Shibboleth, 2014), whose emphasis is on the privacy of user attributes, based on privacy policies and the user's personal preferences. Finally, regarding auditing process, Biswas and Niemi (2011) propose a solution to streamline the log generation process by deriving the auditing specifications directly from the policies to be audited.…”
Section: Privacy Protection Toolsmentioning
confidence: 99%