Skip to main content

Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 7304))

Abstract

The increase in use of Smart mobile devices has allowed for an ever growing market for services providers. These services are increasingly used to connect to users’ on-line private information through social networking sites that share and personalise on-line information. This leads to the problem of privacy leaks stemming from an application’s non-adherence to a predefined set of privacy policies. This paper presents a formal methods tool to reliably restrict the access to content in on-line social network services. The Poporo tool builds upon a previous work in which we provided a predicate calculus definition for social networking in B that models social-network content, privacy policies, and social-network friendship relations. This paper presents the implementation and the functionality of our Poporo tool through a running example in the domain of social networking sites.

Sorren Hanvey and Néestor Cataño have been funded by the Portuguese Research Agency FCT through the R&D Project WeSP, PT/SE/0028/2008.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Appel, A.W.: Foundational proof-carrying code. In: LCS (2001)

    Google Scholar 

  2. Backes, M., Bagga, W., Karjoth, G., Schunter, M.: Efficient Comparison of Enterprise Privacy Policies. IBM Research, Zurich Research Laboratory (September 2003)

    Google Scholar 

  3. Barthe, G., Crégut, P., Grégoire, B., Jensen, T., Pichardie, D.: The MOBIUS Proof Carrying Code Infrastructure. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2007. LNCS, vol. 5382, pp. 1–24. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  4. Breunesse, C., Cataño, N., Huisman, M., Jacobs, B.: Formal methods for smart cards: An experience report. Science of Computer Programming 55(1-3), 53–80 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  5. Cataño, N., Rueda, C.: Matelas: A Predicate Calculus Common Formal Definition for Social Networking. In: Frappier, M., Glässer, U., Khurshid, S., Laleau, R., Reeves, S. (eds.) ABZ 2010. LNCS, vol. 5977, pp. 259–272. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  6. Cataño, N., Rueda, C., Hanvey, S.: The Poporo tool (2011), http://poporo.uma.pt/~ncatano/Projects/wespfm/Poporo/poporo.php

  7. Cataño, N., Rueda, C., Hanvey, S.: Verification of jml generic types with yices. In: CCC (2011)

    Google Scholar 

  8. Cataño, N., Wahls, T., Rueda, C., Rivera, V., Yu, D.: Translating B machines to JML specifications. In: SAC-SVT (to appear, 2012)

    Google Scholar 

  9. Dijkstra, E.W.: A Discipline of Programming. Prentice Hall, Inc. (October 1976)

    Google Scholar 

  10. Duterte, B., de Moura, L.: The Yices SMT solver. Technical report, Computer Science Laboratory, SRI International (2006)

    Google Scholar 

  11. Dutertre, B., de Moura, L.: A Fast Linear-Arithmetic Solver for DPLL(T). In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 81–94. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  12. Leavens, G.T., Baker, A.L., Ruby, C.: Preliminary design of JML: A behavioral interface specification language for Java. ACM SIGSOFT 31(3), 1–38 (2006)

    Article  Google Scholar 

  13. Moses, T.: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS (2005)

    Google Scholar 

  14. Sadeh, N., Gandon, F.: Semantic web technologies to reconcile privacy and context awareness. Journal of Web Semantics 1 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Cataño, N., Hanvey, S., Rueda, C. (2012). Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies. In: Furia, C.A., Nanz, S. (eds) Objects, Models, Components, Patterns. TOOLS 2012. Lecture Notes in Computer Science, vol 7304. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30561-0_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-30561-0_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-30560-3

  • Online ISBN: 978-3-642-30561-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics