منابع مشابه
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies
Fragments of first-order temporal logic are useful for representing many practical privacy and security policies. Past work has proposed two strategies for checking event trace (audit log) compliance with policies: online monitoring and offline audit. Although online monitoring is spaceand time-efficient, existing techniques insist that satisfying instances of all subformulas of the policy be a...
متن کاملType Checking Privacy Policies in the π-calculus
In this paper we propose a formal framework for studying privacy. Our framework is based on the π-calculus with groups [6] accompanied by a type system for capturing privacy-related notions. The typing system we propose combines a number of concepts from the literature: it includes the use of groups to enable reasoning about information collection, it builds on read/write capabilities to contro...
متن کاملRefinement for Administrative Policies
Flexibility of management is an important requisite for access control systems as it allows users to adapt the access control system in accordance with practical requirements. This paper builds on earlier work where we defined administrative policies for a general class of RBAC models. We present a formal definition of administrative refinement and we show that there is an ordering for administ...
متن کاملAutomatic Refinement Checking for B
While refinement is at the heart of the B Method so far no automatic refinement checker has been developed for it. In this paper we present a refinement checking algorithm and implementation for B. It is based on using an operational semantics of B, obtained in practice by the ProB animator. The refinement checker has been integrated into ProB toolset and we present various case studies and emp...
متن کاملPolicy Refinement Checking ( Extended
We introduce refinement checking for privacy policies expressed in P3P and XACML. Our method involves a translation of privacy policies to a set of process specifications in CSP, which describe how the privacy policy is enforced. The technique is described through an example involving medical data collected by a biobank.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science of Computer Programming
سال: 2012
ISSN: 0167-6423
DOI: 10.1016/j.scico.2011.07.009