Improving the Specification and Analysis of Privacy Policies - The RSLingo4Privacy Approach

نویسندگان

  • Alberto Rodrigues da Silva
  • João Caramujo
  • Shaghayegh Monfared
  • Pável Calado
  • Travis D. Breaux
چکیده

The common operation of popular web and mobile information systems involves the collection and retention of personal information and sensitive information about their users. This information needs to remain private and each system should show a privacy policy that describes in-depth how the users' information is managed and disclosed. However, the lack of a clear understanding and of a precise mechanism to enforce the statements described in the policy can constraint the development and adoption of these requirements. RSLingo4Privacy is a multi-language approach that intends to improve the specification and analysis of such policies, and which includes several processes with respective tools, namely: (P1) automatic classification and extraction of statements and text snippets from original policies into equivalent and logically consistent specifications (based on a privacy-aware specific language); (P2) visualization and authoring these statements in a consistent and rigorous way based on that privacy-aware specific language; (P3) automatic analysis and validation of the quality of these specifications; and finally (P4) policies (re)publishing. This paper presents and discusses the first two processes (P1 and P2). Despite having been evaluated against the policies of the most popular systems, for the sake of briefness, we just consider the Facebook policy for supporting the presentation and discussion of current results of the proposed approach.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A model for specification, composition and verification of access control policies and its application to web services

Despite significant advances in the access control domain, requirements of new computational environments like web services still raise new challenges. Lack of appropriate method for specification of access control policies (ACPs), composition, verification and analysis of them have all made the access control in the composition of web services a complicated problem. In this paper, a new indepe...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Analysis the privacy statement of the American Public Libraries and provide privacy statement for public libraries in Iran

Aim: The purpose of this study was to review the privacy statement of the American top public libraries and provide privacy statement for users of public libraries in Iran. Method: The research method is a combination of descriptive survey and Delphi library. The research community consisted of 25 American public libraries based on the rankings of the American Library Association's libraries. T...

متن کامل

The “Hot Potato” of Mental Health App Regulation: A Critical Case Study of the Australian Policy Arena

Background Health apps are a booming, yet under-regulated market, with potential consumer harms in privacy and health safety. Regulation of the health app market tends to be siloed, with no single sector holding comprehensive oversight. We sought to explore this phenomenon by critically analysing how the problem of health app regulation is being presented and addressed in the policy arena...

متن کامل

Requirement Elicitation Based on Goals with Security and Privacy Policies in Electronic Commerce

This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method integrates the UWA approach [18] with the GBRAM method [3] for developing requirements policies for secure electronic commerce systems. The resulting method has the objective to guarantee that existing security and priva...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016