Abstract
The emerging next generation Web technologies offer tremendous opportunities for automating information management in a variety of application domains including office tasks, travel, and digital government. One of the main challenges facing effective automation is privacy. Verifying the correct usage of collected personal data is a major concern for both individuals and organizations. In this paper, we present a framework for reasoning about privacy models including provider’s privacy policies and user’s privacy preferences. More specifically, we use a Description Logic (DL) based notation to specify privacy abstractions. We provide a formalization of matching user’s privacy preferences against provider’s privacy policies using DLs’ reasoning mechanisms. We have implemented a Privacy Match Engine(PME) which is based on RACER.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Benatallah, B., Hacid, M.-S., Leger, A., Rey, C., Toumani, F.: On Automating Service Discovery. VLDB Journal (to appear)
Baïna, K., Benatallah, B., Paik, H.-y., Toumani, F., Rey, C., Rutkowska, A., Harianto, B.: WS-CatalogNet: An Infrastructure for Creating, Peering, and Querying e-Catalog Communities, Demonstration. In: Proceedings of the 30th VLDB Conference, Toronto, Canada (2004)
Alonso, G., Casati, F., Kuno, H., Machiraju, V.: Web Services: Concepts, Architectures, and Applications. Springer, Heidelberg (2004)
Benatallah, B., Casati, F., Toumani, F.: Analysis and Management of Web Services Protocols. In: Atzeni, P., Chu, W., Lu, H., Zhou, S., Ling, T.-W. (eds.) ER 2004. LNCS, vol. 3288, pp. 524–541. Springer, Heidelberg (2004)
Rezgui, A., Bouguettaya, A., Eltoweissy, M.: SemWebDL: A privacy-preserving Semantic Web infrastructure for digital libraries. International Journal on Digital Libraries 4(3), 171–184 (2004)
Rezgui, A., Bouguettaya, A., Eltoweissy, M.: A Reputation-Based Approach to Preserving Privacy in Web Services. In: Benatallah, B., Shan, M.-C. (eds.) TES 2003. LNCS, vol. 2819, pp. 91–103. Springer, Heidelberg (2003)
Bernstein, P.A.: Applying Model Management to Classical Meta Data Problems. In: Proc. CIDR 2003, pp. 209–220 (2003)
Donini, F.M., Lenzerin, M., Nardi, D., Schaerf, A.: Reasoning in Description Logics, pp. 191–236. (CSLI) Publications, Stanford (1996)
Horrocks, I.: Reasoning with Expressive Description Logics: Theory and Practices. In: Voronkov, A. (ed.) CADE 2002. LNCS (LNAI), vol. 2392, p. 1. Springer, Heidelberg (2002)
Schmidt-Schau, M., Smolka, G.: Attributive concept descriptions with complements. Articial Intelligence 48(1), 1–26 (1991)
Badder, F., Calvanese, D., McGuinness, D., Nardi, D., Patel-Schneider, P. (eds.): The Description Logic Handbook. Theory, Implementation and Applications. Cambridge University Press, Cambridge (2003)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Implementing P3P Using Database Technology. In: Proc. of the 19th Int’l. Conference on Data Engineering, Bangalore, India (March 2003)
Cranor, L., Langheinrich, M., Marchirio, M.: A P3P Preference Exchange Language 1.0, w3C working draft (Feburary 2001)
Cranor, L., Langheinrich, M., Marchirio, M.: The Platform for Privacy Preference 1.0 Specification, W3C Recommendation (April 2002)
Stufflebeam, W., Anton, A.I., He, Q., Jain, N.: Specifying privacy policies with P3P and EPAL: Lessons Learned. In: 3rd ACM Workshop on privacy in Eletronic Society (October 2004)
Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-P3P Privacy Policies and Privacy Authorization. In: Proc. of the workshop on Privacy in the Electronic Society (WPES 2002), Washington D.C, Novermver 21 (2001)
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL 1.1) Specification, IBM Research Report, http://www.zurich.ibm.com/security/enterprise-privacy/epal
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: From Privacy Promises to Privacy Management: A New Approach for Enforcing Privacy Throughout an Enterprise. In: Proc. of the ACM New Security Paradigms Workshop (2002)
Anton, A.I., Bertino, E., Li, N., Yu, T.: A Roadmap for Comprehensive Online Privacy Policy, CERIAS Tech. Report 2004-47
Bohrer, K., Levy, S., Liu, X., Schonberg, E.: Individualized Privacy Policy Based Access Control
Bechhofer, S.: The DIG Description Logic Interface: DIG/1.1
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Y.H., Benbernou, S. (2005). Representing and Reasoning About Privacy Abstractions. In: Ngu, A.H.H., Kitsuregawa, M., Neuhold, E.J., Chung, JY., Sheng, Q.Z. (eds) Web Information Systems Engineering – WISE 2005. WISE 2005. Lecture Notes in Computer Science, vol 3806. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11581062_29
Download citation
DOI: https://doi.org/10.1007/11581062_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30017-5
Online ISBN: 978-3-540-32286-3
eBook Packages: Computer ScienceComputer Science (R0)