Privacy Injector - Automated Privacy Enforcement Through Aspects

نویسندگان

  • Chris Vanden Berghe
  • Matthias Schunter
چکیده

Protection of personal data is essential for customer acceptance. Even though existing privacy policies can describe how data shall be handled, privacy enforcement remains a challenge. Especially for existing applications, it is unclear how one can effectively ensure correct data handling without completely redesigning the applications. In this paper we introduce Privacy Injector, which allows us to add privacy enforcement to existing applications. Conceptually Privacy Injector consists of two complementary parts, namely, a privacy metadata tracking and a privacy policy enforcement part. We show how Privacy Injector protects the complete life cycle of personal data by providing us with a practical implementation of the “sticky policy paradigm.” Throughout the collection, transformation, disclosure and deletion of personal data, Privacy Injector will automatically assign, preserve and update privacy metadata as well as enforce the privacy policy. As our approach is policy-agnostic, we can enforce any policy language that describes which actions may be performed on which data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Right to Prisoners’ Privacy: Dimensions, Effects and Indicators.

 The right to privacy is subject was defined by Shariah and law and it refer to exploration prohibition and kind of human life aspects which are called positivism area. Article constitution is known as one of the most important rights for people in community closely linked to the right to privacy. The authors, considering that the prisoners are also human and his conviction should not deprive h...

متن کامل

A Systemic Approach to Automate Privacy Policy Enforcement in Enterprises

It is common practice for enterprises and other organisations to ask people to disclose their personal data in order to grant them access to services and engage in transactions. This practice is not going to disappear, at least in the foreseeable future. Most enterprises need personal information to run their businesses and provide the required services, many of whom have turned to identity man...

متن کامل

Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography

 Towards Natural-Language Understanding and Automated Enforcement of Privacy Rules and Regulations in the Cloud: Survey and Bibliography Nick Papanikolaou, Siani Pearson, Marco Casassa Mont

متن کامل

Language-Based Enforcement of Privacy Policies

We develop a language-based approach for modeling and verifying aspects of privacy policies. Our approach relies on information-flow control. Concretely, we use the programming language Jif, an extension of Java with information-flow types. We address basic leaks of private information and also consider other aspects of privacy policies supported by the Platform for Privacy Preferences (P3P) an...

متن کامل

Linked Data for a Privacy-aware Smart Grid

Recent developments around the Smart Grid promise more efficient power generation and distribution. In contrast to the current design of the electricity grid, the Smart Grid is heavily based on IT for managing communication flows. Given the large number of market participants, data exchanged should be marked up in a way that facilitates flexible modelling, extension and integration. In addition...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006