DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures

نویسندگان

چکیده

Abstract Privacy and data protection by design are relevant parts of the General Data Protection Regulation (GDPR), in which businesses organisations encouraged to implement measures at an early stage system phase fulfil requirements. This paper addresses policy architecture propose two variants privacy language description language, respectively, for specifying verifying In addition, we develop a fully automated algorithm based on logic, three types conformance relations (privacy, protection, functional conformance) between specified our languages’ variants. Compared related works, this approach supports more systematic fine-grained analysis privacy, properties system. Our theoretical methods then implemented as software tool called DataProVe its feasibility is demonstrated centralised decentralised approaches COVID-19 contact tracing applications.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Conformance Verification of Privacy Policies

Web applications are both the consumers and providers of information. To increase customer confidence, many websites choose to publish their privacy protection policies. However, policy conformance is often neglected. We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application. A first order extension of computatio...

متن کامل

Automated Verification of Access Control Policies

Managing access control policies in modern computer systems can be challenging and error-prone, especially when multiple access policies are combined to form new policies, possibly introducing unintended consequences. In this paper we present a framework for automated verification of access control policies. We introduce a formal model for systematically specifying access to resources. We show ...

متن کامل

Privacy by Design: On the Conformance Between Protocols and Architectures

In systems design, we generally distinguish the architecture and the protocol levels. In the context of privacy by design, in the first case, we talk about privacy architectures, which define the privacy goals and the main features of the system at high level. In the latter case, we consider the underlying concrete protocols and privacy enhancing technologies that implement the architectures. I...

متن کامل

Verification of Automated Vehicle Protection Systems

We apply speciication and veriication techniques based on the timed I/O automaton model of Lynch and Vaandrager to a case study in the area of automated transit. The case study models and veriies selected safety properties for automated Personal Rapid Transit (PRT) systems such as PRT 2000 TM , a system currently being developed at Raytheon. Due to their safety critical nature, PRT 2000 TM and ...

متن کامل

Automated Vehicle Verification System

Objective: To Automate the system of vehicle verification on roads and to take punitive measures without human intervention. Providing the police and the government a powerful tool to keep a track of registered vehicles, their drivers and validity has been a daunting task. Manned police checkpoints are placed to establish the validity of a vehicles registration, and driver’s license. This proce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings on Privacy Enhancing Technologies

سال: 2021

ISSN: ['2299-0984']

DOI: https://doi.org/10.2478/popets-2022-0028