This paper shows a new method which promotes ownership of data by people about whom the data was collected. The data owner may preclude the data from being used for some purposes, and allow it to be used for other purposes. We show an approach, based on checking the proofs of program properties, which implements this idea and provides a tool for a verifiable implementation of the Use Limitation Principle. The paper discusses in detail a scheme which implements data privacy following the proposed approach, presents the technical components of the solution, and shows a detailed example. We also discuss a mechanism by which the proposed method could be introduced in industrial practice. © 2002 Springer-Verlag Berlin Heidelberg.
CITATION STYLE
Felty, A., & Matwin, S. (2002). Privacy-oriented data mining by proof checking. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2431 LNAI, pp. 138–149). Springer Verlag. https://doi.org/10.1007/3-540-45681-3_12
Mendeley helps you to discover research relevant for your work.