The temporal logic of reactive and concurrent systems
The temporal logic of reactive and concurrent systems
Privacy Policy Compliance for Web Services
ICWS '04 Proceedings of the IEEE International Conference on Web Services
Associating assertions with business processes and monitoring their execution
Proceedings of the 2nd international conference on Service oriented computing
Smart monitors for composed services
Proceedings of the 2nd international conference on Service oriented computing
ICWS '05 Proceedings of the IEEE International Conference on Web Services
Representation, Verification, and Computation of Timed Properties in Web
ICWS '06 Proceedings of the IEEE International Conference on Web Services
Run-Time Monitoring of Instances and Classes of Web Service Compositions
ICWS '06 Proceedings of the IEEE International Conference on Web Services
Visualization for privacy compliance
Proceedings of the 3rd international workshop on Visualization for computer security
Towards dynamic monitoring of WS-BPEL processes
ICSOC'05 Proceedings of the Third international conference on Service-Oriented Computing
A systematic approach to privacy enforcement and policy compliance checking in enterprises
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Service research challenges and solutions for the future internet
PPPDM - a privacy-preserving platform for data mashup
International Journal of Grid and Utility Computing
Hi-index | 0.00 |
This paper addresses the problem of monitoring the compliance of privacy agreement that spells out a consumer's privacy rights and how consumer private information must be handled by the service provider. A state machine based model is proposed to describe the Private Data Use Flow (PDUF) toward monitoring which can be used by privacy analyst to observe the flow and capture privacy vulnerabilities that may lead to non-compliance. The model is built on top of (i) properties and timed-related privacy requirements to be monitored that are specified using LTL (Linear Temporal logic) (ii) a set of identified privacy misuses.