Towards Formal Modeling of Privacy Policies of Enterprises

被引:0
|
作者
Manna, Asmita [1 ]
Sengupta, Anirban [2 ]
Mazumdar, Chandan [2 ]
机构
[1] Jadavpur Univ, Dept Comp Sci & Engn, Kolkata, India
[2] Jadavpur Univ, Ctr Distributed Comp, Kolkata, India
关键词
privacy requirement; privacy policy; privacy clause; formal representation;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Collection, storage and processing of personally identifiable information and other sensitive information by enterprises are leading to privacy concerns for individuals, in particular, and society, in general. As privacy has been declared as a fundamental right in many countries, authorities are implementing privacy laws and guidelines to be followed by enterprises. Similarly, enterprises are also designing their own privacy policies to assure their clients about privacy concerns. In this paper, privacy has been considered as a business requirement rather than security requirement, and a methodology for formal representation of privacy policies has been presented. Privacy policies of different types of enterprises have been analysed and common privacy clauses have been identified from those policies. The related vocabularies have been defined and clauses have been expressed using a formal language. Finally, a case study has been presented to illustrate the usefulness of this approach.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Modeling Privacy Aware Information Sharing Systems: A Formal and General Approach
    Martinelli, Fabio
    Saracino, Andrea
    Sheikhalishahi, Mina
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 767 - 774
  • [32] Towards a Similarity Metric for Comparing Machine-Readable Privacy Policies
    Tondel, Inger Anne
    Nyre, Asmund Ahlmann
    OPEN PROBLEMS IN NETWORK SECURITY, 2012, 7039 : 89 - 103
  • [33] Towards a formal framework for reuse in business process modeling
    Markovic, Ivan
    Pereira, Alessandro Costa
    BUSINESS PROCESS MANAGEMENT WORKSHOPS, 2008, 4928 : 484 - 495
  • [34] Towards a formal framework for the specification of hybrid fuzzy modeling
    Valdés, M
    Botía, JA
    Gómez-Skarmeta, AF
    PROCEEDINGS OF THE 12TH IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1 AND 2, 2003, : 1014 - 1019
  • [35] Policies on Privacy
    Bellovin, Steven M.
    IEEE SECURITY & PRIVACY, 2020, 18 (02) : 75 - 75
  • [36] From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling
    Dimova, Yana
    Kode, Mrunmayee
    Kalantari, Shirin
    Wuyts, Kim
    Joosen, Wouter
    Muhlberg, Jan Tobias
    PROCEEDINGS OF THE 22ND WORKSHOP ON PRIVACY IN THE ELECTRONIC SOCIETY, WPES 2023, 2023, : 17 - 29
  • [37] Towards conflicts prevention among privacy policies: A comparative study of major privacy laws and regulations for healthcare
    Sadki, Souad
    El Bakkali, Hanan
    Akhattab, Mohammed
    PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), 2017, : 286 - 292
  • [38] Towards the modeling of personal privacy in ubiquitous computing environments
    Babbitt, Ryan
    Wong, Johnny
    Chang, Carl
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL II, PROCEEDINGS, 2007, : 695 - +
  • [39] Formal Methods for Privacy
    Tschantz, Michael Carl
    Wing, Jeannette M.
    FM 2009: FORMAL METHODS, PROCEEDINGS, 2009, 5850 : 1 - 15
  • [40] Formal modeling and automatic enforcement of Bring Your Own Device policies
    Armando, Alessandro
    Costa, Gabriele
    Merlo, Alessio
    Verderame, Luca
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (02) : 123 - 140