2011
DOI: 10.1007/978-3-642-20769-3_22
|View full text |Cite
|
Sign up to set email alerts
|

Applying Formal Methods to Detect and Resolve Ambiguities in Privacy Requirements

Abstract: Abstract. In this paper, we demonstrate how formal methods can be used to unambiguously express privacy requirements. We focus on requirements for consent and revocation controls in a real world case study that has emerged within the EnCoRe project. We analyse the ambiguities and issues that arise when requirements expressed in natural language are transformed into a formal notation, and propose solutions to address these issues. These ambiguities were brought to our attention only through the use of a formal … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 7 publications
0
14
0
Order By: Relevance
“…The approach is currently being used in the PROTECTIVE 9 project, a research and development project in cyber-threat intelligence sharing among public Computer Security Incident Response Teams (CSIRTs), with the project asking questions related to the challenges in ethics and law of cyber-threat intelligence sharing in a National Education Research Network (NREN) space. In the project we are identifying instances in which cyber threat intelligence may also include personal data, and what efforts are necessary to identify and anonymise personal data about to be shared between NRENs as well as identifying sharing of data that may otherwise breach the GDPR or other NDAs.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The approach is currently being used in the PROTECTIVE 9 project, a research and development project in cyber-threat intelligence sharing among public Computer Security Incident Response Teams (CSIRTs), with the project asking questions related to the challenges in ethics and law of cyber-threat intelligence sharing in a National Education Research Network (NREN) space. In the project we are identifying instances in which cyber threat intelligence may also include personal data, and what efforts are necessary to identify and anonymise personal data about to be shared between NRENs as well as identifying sharing of data that may otherwise breach the GDPR or other NDAs.…”
Section: Discussionmentioning
confidence: 99%
“…The Ensuring Consent and Revocation (EnCoRe) [9] project proposed several approaches to formalise rulesets to ensure consent and revocation of personal data by service providers.…”
Section: Engineering Frameworkmentioning
confidence: 99%
“…Their model provides an operational framework to characterize and estimate privacy violations in relational database systems. Agrafiotis et al, [31] applied formal methods to express privacy policies requirements and detect ambiguities and issues that are raised when mapping human-defined requirements into a formal notation.…”
Section: B Modeling Privacy Policies and Investigation Warrantsmentioning
confidence: 99%
“…In a previous publication we applied the simple version of the logic to an Employee case study [2]. That exercise resulted in an enriched version of the logic, expressive enough to address ambiguities created either by the complex notion of privacy or by the translation of natural into formal language [2].…”
Section: Logic For Candrmentioning
confidence: 99%
“…In this paper we present and apply the novelties of the logic that occurred from addressing the ambiguities created when formal methods are applied for verification of the privacy properties of a system [2] and our aim is to verify that no more ambiguities are created when applying the logic on a different context. We formalise the requirements of the EnCoRe system operating in a Biobank environment, using a logic for consent and revocation [3].…”
Section: Introductionmentioning
confidence: 99%