DataProVe: Fully Automated Conformance Verification Between Data Protection Policies and System Architectures
نویسندگان
چکیده
Abstract Privacy and data protection by design are relevant parts of the General Data Protection Regulation (GDPR), in which businesses organisations encouraged to implement measures at an early stage system phase fulfil requirements. This paper addresses policy architecture propose two variants privacy language description language, respectively, for specifying verifying In addition, we develop a fully automated algorithm based on logic, three types conformance relations (privacy, protection, functional conformance) between specified our languages’ variants. Compared related works, this approach supports more systematic fine-grained analysis privacy, properties system. Our theoretical methods then implemented as software tool called DataProVe its feasibility is demonstrated centralised decentralised approaches COVID-19 contact tracing applications.
منابع مشابه
Conformance Verification of Privacy Policies
Web applications are both the consumers and providers of information. To increase customer confidence, many websites choose to publish their privacy protection policies. However, policy conformance is often neglected. We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application. A first order extension of computatio...
متن کاملAutomated Verification of Access Control Policies
Managing access control policies in modern computer systems can be challenging and error-prone, especially when multiple access policies are combined to form new policies, possibly introducing unintended consequences. In this paper we present a framework for automated verification of access control policies. We introduce a formal model for systematically specifying access to resources. We show ...
متن کاملPrivacy by Design: On the Conformance Between Protocols and Architectures
In systems design, we generally distinguish the architecture and the protocol levels. In the context of privacy by design, in the first case, we talk about privacy architectures, which define the privacy goals and the main features of the system at high level. In the latter case, we consider the underlying concrete protocols and privacy enhancing technologies that implement the architectures. I...
متن کاملVerification of Automated Vehicle Protection Systems
We apply speciication and veriication techniques based on the timed I/O automaton model of Lynch and Vaandrager to a case study in the area of automated transit. The case study models and veriies selected safety properties for automated Personal Rapid Transit (PRT) systems such as PRT 2000 TM , a system currently being developed at Raytheon. Due to their safety critical nature, PRT 2000 TM and ...
متن کاملAutomated Vehicle Verification System
Objective: To Automate the system of vehicle verification on roads and to take punitive measures without human intervention. Providing the police and the government a powerful tool to keep a track of registered vehicles, their drivers and validity has been a daunting task. Manned police checkpoints are placed to establish the validity of a vehicles registration, and driver’s license. This proce...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2021
ISSN: ['2299-0984']
DOI: https://doi.org/10.2478/popets-2022-0028