Abstract
This paper explores the possibility to represent the privacy policies of an individual, as well as the processing steps of those who (concurrently) process the data, using a simple process algebra, FSP. The approach leads to the identification of two major classes of privacy policies: aggregation policies and quantitative policies. Automated analysis (with the LTSA tool) of such policies, in combination with the actions of parties that process personal information allows the automated discovery of possible breaches of privacy.
It is demonstrated that addressing the breaches often involves tradeoffs, such discontinuing interaction with some parties, so that policies are no longer violated.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
S. B. Adler, E. F. Bangerter, K. A. Bohrer, J. Brown, N. Howard, J. Camenisch, A. M. Gilbert, D. Kesdogan, M. P. Leonard, X. Liu, M. R. McCullough, A. C. Nelson, C. C. Palmer, C. S. Powers, M. Schnyder, E. Schonberg, M. Schunter, E. van Herreweghen, and M. Waidner. Using an object model to improve handling of personally identifiable information. United States Patent Application 20030004734, January 2003.
R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu. Hippocratic databases. In 28th Int’l Conf. on Very Large Databases (VLDB). Hong Kong, 2002.
P. Ashley, S. Hada, G. Karjoth, and M. Schunter. E-P3P privacy policies and privacy authorization. In Proceedings of the ACM workshop on Privacy in the Electronic Society, pages 103–109. ACM Press, 2003.
D. Brin. The Transparent Society — Will Technology Force us to Choose between Privacy and Freedom? Perseus Books, Reading, MA, 1998.
M. A. Caloyannides. Encryption wars: Shifting tactics. IEEE Spectrum, 37(5):46–51, 2000.
D. Chadwick, M. S. Olivier, P. Samarati, E. Sharpston, and B. Thuraishingham. Privacy and civil liberties. In E. Gudes and S. Shenoi, editors, Research Directions in Database and Application Security, pages 331–346. Kluwer, 2003.
G. T. Duncan and S. Mukherjee. Microdata disclosure limitation in statistical databases: Query size and random sample query control. In IEEE Computer Society Symposium on Research in Security and Privacy, pages 278–287, Oakland, CA, USA, May 1991.
A. Etzioni. The Limits of Privacy. Basic Books, New York, NY, 1999.
A. Etzioni. Medical records — enhancing privacy, preserving the common good. Hastings Center Report, 23(2): 14–23, 1999.
S. Fischer-Hübner and A. Ott. From a formal privacy model to its implementation. In 21st National Information Systems Security Conference, Arlington, VA, USA, October 1998.
E. Gabber, P. B. Gibbons, D. M. Kristol, Y. Matias, and A. Mayer. Consistent, yet anonymous, web access with LPWA. Communications of the ACM, 42(2):42–47, February 1999.
S. Garfinkel. PGP: Pretty Good Privacy. O’Reilly, 1995.
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Onion routing. Communications of the ACM, 42(2):39–41, February 1999.
S. Hunt. Market overview: Privacy management technologies. Giga Information Group, February 2003.
IBM. Enterprise privacy architecture: Securing returns on e-business. Executive brief, IBM, 2001.
IBM. Privacy in a connected world. White paper, IBM, May 2002.
IDcide. IDcide introduces corporate privacy compliance software. Press release, February 2001. http://www.idcide.com/pages/press_releas.htm#6.
D. G. Johnson. Computer Ethics. Prentice Hall, third edition, 2001.
G. Karjoth, M. Schunter, and M. Waidner. Privacy-enabled services for enterprises. Research Report RZ 3391 (# 93437), IBM Research, 2002.
G. Karjoth, M. Schunter, and M. Waidner. Platform for Enterprise Privacy Practices: Privacy-enabled management of customer data. In R. Dingledine and P. Syverson, editors, Privacy Enhancing Technologies: Second International Workshop, PET2002, San Francisco, CA, USA, April 14–15, 2002, Revised Papers. Springer, 2003.
G. Lawton. Is technology meeting the privacy challenge? IEEE Computer, 34(9):16–18, 2001.
J. Magee and J. Kramer. Concurrency — State Models & Java Programs. Wiley, 1999.
M. S. Olivier. Database privacy. SIGKDD Explorations, 4(2):20–27, 2003.
M. S. Olivier. A layered architecture for privacy-enhancing technologies. In J. H. P. Eloff, H. S. Venter, L. Labuschagne, and M. M. Eloff, editors, Proceedings of the Third Annual Information Security South Africa Conference (ISSA2003), pages 113–126, Sandton, South Africa, July 2003.
M. S. Olivier. Privacy under conditions of concurrent interaction with multiple parties. In S. de Capitani di Vimercati, I. Ray, and I. Ray, editors, Proceedings of the Seventeenth Anual IFIP WG11.3 Working Conference on Database and Application Security, pages 103–117, Estes Park, Colorado, USA, August 2003 (Preproceedings).
M. S. Olivier. Using organisational safeguards to make justifiable decisions when processing personal data. In J. H. P. Eloff, P. Kotzé, A. P. Engelbrecht, and M. M. Eloff, editors, IT Research in Developing Countries (SAICSIT 2003), pages 275–284, Sandton, South Africa, September 2003.
E. F. Paul, F. D. Miller, and J. Paul, editors. The Right to Privacy. Cambridge University Press, Cambridge, 2000.
PrivacyRight. Control of personal information — the economic benefits of adopting an enterprise-wide permissions management platform. White Paper, 2001. http://www.privacyright.com/info/economic.html.
J. Reagle and L. F. Cranor. The platform for privacy preferences. Communications of the ACM, 42(2):48–55, February 1999.
M. K. Reiter and A. D. Rubin. Anonymous web transactions with Crowds. Communications of the ACM, 42(2):32–48, February 1999.
A. Rosenberg. Privacy as a matter of taste and right. In E. F. Paul, F. D. Miller, and J. Paul, editors, The Right to Privacy, pages 68–90, Cambridge, 2000. Cambridge University Press.
P. Ryan, S. Schneider, M. Goldsmith, G. Lowe, B. Roscoe, and G. Lower. Modelling and Analysis of Security Protocols. Addison Wesley, 2000.
P. Samarati. Protecting respondents’ identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6): 1010–1027, 2001.
S. Schneider and A. Sidiropoulos. CSP and anonymity. In Proceedings of European Symposium on Research in Computer Security, number 1146 in Lecture Notes in Computer Science, pages 198–218. Springer-Verlag, 1996.
D. Stamate, H. Luchian, and B. Paechter. A general model for the answer-perturbation techniques. In Seventh International Working Conference on Scientific and Statistical Database Management, pages 90–96, Charlottesville, VA, USA, Sep 1994. IEEE.
L. Sweeney. Datafly: A system for providing anonymity in medical data. InT.Y. Lin and S. Qian, editors, Database Security XI: Status and Prospects, pages 356–381. Chapman & Hall, 1998.
W. Teepe, R. P. van de Riet, and M. S. Olivier. Workflow analyzed for security and privacy in using databases. In B. Thuraisingham, R. P. van de Riet, K. R. Dittrich, and Z. Tari, editors, Data and Applications Security — Developments and Directions, pages 271–282. Kluwer, 2001.
Tivoli Software. Enable your applications for privacy with IBM Tivoli Privacy Manager for e-business. Technical discussion, IBM, July 2002.
Tivoli Software. IBM Tivoli Privacy Manager for e-business. Commercial brochure, IBM, 2002.
R. Whitaker. The End of Privacy — How Total Surveillance is Becoming a Reality. New Press, New York, NY, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer Science + Business Media, Inc.
About this chapter
Cite this chapter
Olivier, M.S. (2004). Privacy Under Conditions of Concurrent Interaction with Multiple Parties. In: De Capitani di Vimercati, S., Ray, I., Ray, I. (eds) Data and Applications Security XVII. IFIP International Federation for Information Processing, vol 142. Springer, Boston, MA. https://doi.org/10.1007/1-4020-8070-0_8
Download citation
DOI: https://doi.org/10.1007/1-4020-8070-0_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4020-8069-2
Online ISBN: 978-1-4020-8070-8
eBook Packages: Springer Book Archive