Run-time monitoring for privacy-agreement compliance

N/ACitations
Citations of this article
19Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper addresses the problem of monitoring the compliance of privacy agreement that spells out a consumer's privacy rights and how consumer private information must be handled by the service provider. A state machine based model is proposed to describe the Private Data Use Flow (PDUF) toward monitoring which can be used by privacy analyst to observe the flow and capture privacy vulnerabilities that may lead to non-compliance. The model is built on top of (i) properties and timed-related privacy requirements to be monitored that are specified using LTL (Linear Temporal logic) (ii) a set of identified privacy misuses. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Benbernou, S., Meziane, H., & Hacid, M. S. (2007). Run-time monitoring for privacy-agreement compliance. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4749 LNCS, pp. 353–364). Springer Verlag. https://doi.org/10.1007/978-3-540-74974-5_29

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free