2019
DOI: 10.1007/978-3-030-23597-0_11
|View full text |Cite
|
Sign up to set email alerts
|

Who Leaks My Privacy: Towards Automatic and Association Detection with GDPR Compliance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…user consent). Some recent works rely on the apps' privacy policies [10], [40] or prevailing standards or regulations [12], [13], [41]- [44] as the source for extracting the appropriate or inappropriate personal data flows in terms of the aforementioned elements. These are used as ground truth to analyze their alignment with the personal data flows carried out by apps, and then detect whether a potential privacy violation occurs.…”
Section: A Privacy Analysis In Android Appsmentioning
confidence: 99%
See 3 more Smart Citations
“…user consent). Some recent works rely on the apps' privacy policies [10], [40] or prevailing standards or regulations [12], [13], [41]- [44] as the source for extracting the appropriate or inappropriate personal data flows in terms of the aforementioned elements. These are used as ground truth to analyze their alignment with the personal data flows carried out by apps, and then detect whether a potential privacy violation occurs.…”
Section: A Privacy Analysis In Android Appsmentioning
confidence: 99%
“…They relied on static code analysis to detect any disclosure of personal information, although the specific GDPR requirements that are covered are blurred. Jia et al [13] propose a method to detect personal data disclosures in network traffic based on association mining. Leveraging the fact that the application's network packet payload is represented as a set of key-value pairs, they used a catalogue of key-value pairs related to personal data to search for any of them and then detect personal data disclosures without the user's consent.…”
Section: B Gdpr Analysis In Android Appsmentioning
confidence: 99%
See 2 more Smart Citations
“…The research was undertaken to understand the dynamics of the employees at the office. The data were aggregated and anonymized in compliance with the principles outlined in the GDPR regulations, and the study was performed in accordance with the principles outlined in the Declaration of Helsinki; all participants gave written informed consent [56][57][58].…”
Section: Pilot Studymentioning
confidence: 99%