2011
DOI: 10.1007/978-3-642-25560-1_1
|View full text |Cite
|
Sign up to set email alerts
|

Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms

Abstract: Abstract. Privacy has become a significant concern in modern society as personal information about individuals is increasingly collected, used, and shared, often using digital technologies, by a wide range of organizations. Certain information handling practices of organizations that monitor individuals' activities on the Web, data aggregation companies that compile massive databases of personal information, cell phone companies that collect and use location data about individuals, online social networks and s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 24 publications
(17 citation statements)
references
References 46 publications
0
17
0
Order By: Relevance
“…Previous work by DeYoung et al has studied audit policy specification for medical (HIPAA) and business (GLBA) processes [20,19].This work illustrates the effectiveness and generality of a temporal logic foundation for audit policy specification, which is well-founded in a general theory of privacy [18]. Their auditing system has also been implemented in a tool similar to an interactive theorem prover [24].…”
Section: Related Workmentioning
confidence: 88%
See 2 more Smart Citations
“…Previous work by DeYoung et al has studied audit policy specification for medical (HIPAA) and business (GLBA) processes [20,19].This work illustrates the effectiveness and generality of a temporal logic foundation for audit policy specification, which is well-founded in a general theory of privacy [18]. Their auditing system has also been implemented in a tool similar to an interactive theorem prover [24].…”
Section: Related Workmentioning
confidence: 88%
“…That is the focus of this paper. Other work has focused on formalisms for querying logs [39,18], however these works presuppose correctness of audit logs for true accountability.…”
Section: A Motivating Example From Practicementioning
confidence: 99%
See 1 more Smart Citation
“…Their model overcomes traditional issues caused by separation of the rights and obligation notions that enables representing contracts with equal semantics in the same syntax. Datta et al, [26] proposed formal semantics and a model to represent privacy as a contextoriented right to appropriate flows of personal information and use it to model US Health and Human Services (HIPAA) [27].…”
Section: B Modeling Privacy Policies and Investigation Warrantsmentioning
confidence: 99%
“…To begin with, a number of languages have been proposed to express privacy policies [16,15] and can be used to verify the consistency of policies or to check whether a system complies with a certain policy via static techniques such as model checking [15,13], on-the-fly using monitoring, or through audit procedures [7,2].…”
Section: Related Workmentioning
confidence: 99%