This paper addresses the problem of monitoring the compliance of privacy agreement that spells out a consumer's privacy rights and how consumer private information must be handled by the service provider. A state machine based model is proposed to describe the Private Data Use Flow (PDUF) toward monitoring which can be used by privacy analyst to observe the flow and capture privacy vulnerabilities that may lead to non-compliance. The model is built on top of (i) properties and timed-related privacy requirements to be monitored that are specified using LTL (Linear Temporal logic) (ii) a set of identified privacy misuses. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Benbernou, S., Meziane, H., & Hacid, M. S. (2007). Run-time monitoring for privacy-agreement compliance. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4749 LNCS, pp. 353–364). Springer Verlag. https://doi.org/10.1007/978-3-540-74974-5_29
Mendeley helps you to discover research relevant for your work.