Conformance checking of processes based on monitoring real behavior
Information Systems
Composing abstractions of coloured Petri nets
ICATPN'00 Proceedings of the 21st international conference on Application and theory of petri nets
Purpose control: did you process the data for the intended purpose?
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
Conformance Checking Using Cost-Based Fitness Analysis
EDOC '11 Proceedings of the 2011 IEEE 15th International Enterprise Distributed Object Computing Conference
Measuring Privacy Compliance with Process Specifications
METRISEC '11 Proceedings of the 2011 Third International Workshop on Security Measurements and Metrics
Hi-index | 0.00 |
Nowadays, repurposing of personal data is a major privacy issue. Detection of data repurposing requires posteriori mechanisms able to determine how data have been processed. However, current a posteriori solutions for privacy compliance are often manual, leading infringements to remain undetected. In this paper, we propose a privacy compliance technique for detecting privacy infringements and measuring their severity. The approach quantifies infringements by considering a number of deviations from specifications (i.e., insertion, suppression, replacement, and re-ordering).