2020
DOI: 10.1007/978-3-030-42504-3_10
|View full text |Cite
|
Sign up to set email alerts
|

Language-Based Mechanisms for Privacy-by-Design

Abstract: The privacy by design principle has been applied in system engineering. In this paper, we follow this principle, by integrating necessary safeguards into the program system design. These safeguards are then used in the processing of personal information. In particular, we use a formal language-based approach with static analysis to enforce privacy requirements. To make a general solution, we consider a high-level modeling language for distributed service-oriented systems, building on the paradigm of active obj… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1
1

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(12 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…Additionally, to overcome security-critical situations that are one of the most challenging areas today, we aim to customize and extend CSDP to mitigate the attacks impact on the system, for example, by considering access control violation in the underlying modeling language [41]. Moreover, to prevent security vulnerabilities in software systems, we intend to investigate the CSDP effectiveness in secure software development to provide security by design to practically enforce GDPR [42].…”
Section: Discussionmentioning
confidence: 99%
“…Additionally, to overcome security-critical situations that are one of the most challenging areas today, we aim to customize and extend CSDP to mitigate the attacks impact on the system, for example, by considering access control violation in the underlying modeling language [41]. Moreover, to prevent security vulnerabilities in software systems, we intend to investigate the CSDP effectiveness in secure software development to provide security by design to practically enforce GDPR [42].…”
Section: Discussionmentioning
confidence: 99%
“…Then, a data inventory tool GROK maps data types in code to high-level policy concepts, and the compliance checking then reduces to a form of information flow analysis. This is similar to our approach in [4] where we associate policy with the types carrying sensitive information, but the difference is that the type-policy mapping is integrated in the language. The policy specification language in [11] has some similarities with our work: the semantics of policies is compositional and policies are expressed as lists of positive and negative policies.…”
Section: Related Workmentioning
confidence: 98%
“…The runtime checking uses two special notions: The current purpose, denoted R current , is the purpose of the enclosing method, which we assume is statically specified, as in [4]. (Alternatively one could take the purpose defined in some other way, for instance by data-flow graphs as in [7].)…”
Section: Runtime Tagging Of Valuesmentioning
confidence: 99%
See 1 more Smart Citation
“…Belli et al (2017), Hansen et al (2008), Makri and Lambrinoudakis (2015), Ringmann et al (2018), Romanou (2018), andSchneider (2018) discuss and compare existing PbD principles. Tamburri (2020) and Tokas et al (2020) formalize the PbD principles included in the GDPR. Several other papers (Ahmadian et al, 2019;Alshammari & Simpson, 2017;Baldassarre et al, 2019;Bier et al, 2014;Cavoukian, 2020;Colesky et al, 2016;Finneran Dennedy et al, 2014;Drozd, 2016;Martín & Del Álamo, 2017;Mayfield, 2016;Suphakul & Senivongse, 2017) refine or implement PbD principles proposed by others.…”
Section: Privacy By Design Principlesmentioning
confidence: 99%