Abstract
Privacy is a major concern regarding acceptance of technology. Although, general concepts, privacy languages, and technology to implement privacy exist, these aspects are considered rather independently yet. We propose a logic based qualitative privacy description language (QPDL), which allows for an integrated view of these three perspectives and system analysis based on policy formalizations, e.g., system conformance or policy conflicts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
These are languages whose authors stated that the aim was to address security issues. However, we acknowledge that these languages are very similar to privacy policy languages.
- 2.
We restrict ourselves to this literature and languages as they provide representations interpretable by computers. However, we acknowledge that their also exists a vast amount of privacy policy languages in other fields, e.g., humanities and social sciences.
- 3.
We acknowledge that XML and RDF are two separate formalisms with different properties. However, these differences are not essential for the presented work and thus are neglected.
- 4.
In general relations with any arity are possible.
- 5.
For an overview of tools we refer to https://en.wikipedia.org/wiki/List_of_model_checking_tools.
- 6.
We note that these are only categories of systems and do not address specific implementations.
- 7.
Depending on the implementation this can be a very general alert or a specific listing of all current (and possibly all previous) violations.
- 8.
A straight forward method to implement this behavior would be to delete all available knowledge when a violation is detected. However, this would most likely result in a system that is not very useful.
- 9.
The temporal horizon (when a violation has to be resolved) can be changed, e.g., to ensure the violation is resolved in the next world after its appearance: \(\Box \;(violated(\varPi )\rightarrow \circ \;\lnot violated(\varPi ))\). The same holds also for the temporal horizons used in privacy projecting and privacy conserving systems.
- 10.
QPDL allows to represent all aspects of privacy (concepts, policies, and privacy-enhancing technologies) and as a result we are confident that QPDL is expressive enough to model all reviewed privacy policy languages.
References
Görlach, A., Heinemann, A., Terpstra, W.W.: Survey on location privacy in pervasive computing. In: Robinson, P., Vogt, H., Wagealla, W. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing. The International Series in Engineering and Computer Science, vol. 780, pp. 23–34. Springer, Heidelberg (2005)
Nissenbaum, H.: Privacy as contextual integrity. Washington Law Rev. 79, 119 (2004)
Schaub, F., Könings, B., Weber, M.: Context-adaptive privacy: leveraging context awareness to support privacy decision making. IEEE Pervasive Comput. 14(1), 34–43 (2015)
Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge (2008)
Raab, C.D., Bennett, C.J.: Taking the measure of privacy: can data protection be evaluated? Int. Rev. Adm. Sci. 62(4), 535–556 (1996)
Langheinrich, M.: A privacy awareness system for ubiquitous computing environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol. 2498, pp. 237–245. Springer, Heidelberg (2002)
Könings, B., Schaub, F.: Territorial privacy in ubiquitous computing. In: Eighth International Conference on Wireless On-Demand Network Systems and Services (WONS), pp. 104–108. IEEE (2011)
Könings, B., Schaub, F., Weber, M., Kargl, F.: Towards territorial privacy in smart environments. In: Intelligent Information Privacy Management, Papers from the 2010 AAAI Spring Symposium, Technical report SS-10-05, Stanford, California, USA, 22–24 March 2010. AAAI (2010)
Könings, B., Schaub, F., Weber, M.: Who, how, and why? Enhancing privacy awareness in ubiquitous computing. In: 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM 2013 Workshops, San Diego, CA, USA, 18–22 March 2013, pp. 364–367. IEEE (2013)
Wernke, M., Skvortsov, P., Dürr, F., Rothermel, K.: A classification of location privacy attacks and approaches. Pers. Ubiquit. Comput. 18(1), 163–175 (2014)
Kumaraguru, P., Cranor, L., Lobo, J., Calo, S.: A survey of privacy policy languages. In: SOUPS 2007: Proceedings of the 3rd Symposium on Usable Privacy and Security (2007)
Kasem-Madani, S., Meier, M.: Security and privacy policy languages: a survey, categorization and gap identification. CoRR abs/1512.00201 (2015)
Matheus, A., Herrmann, J.: Geospatial eXtensible Access Control Markup Language (GeoXACML) - Version 1 Corrigendum. Open Geospatial Consortium Inc., OGC (2011)
Herrmann, J.: Administration of (geo)xacml policies for spatial data infrastructures. In: Bertino, E., Damiani, M.L., Ghinita, G. (eds.) Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2011, November 1st, 2011, pp. 53–59. ACM, Chicago (2011)
Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: IEEE Symposium on Security and Privacy (S&P 2006), 21–24 May 2006, Berkeley, California, USA, pp. 184–198. IEEE Computer Society (2006)
Barth, A., Mitchell, J.C., Datta, A., Sundaram, S.: Privacy and utility in business processes. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 279–294. IEEE Computer Society (2007)
Dillaway, B., Hogg, J.: Security policy assertion language (SecPal) specification, version 1.0. Microsoft Research, 15 February 2007
Becker, M.Y., Fournet, C., Gordon, A.D.: Design and semantics of a decentralized authorization language. In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 3–15. IEEE Computer Society (2007)
Becker, M.Y., Fournet, C., Gordon, A.D.: SecPal: design and semantics of a decentralized authorization language. J. Comput. Secur. 18(4), 619–665 (2010)
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: Lotz, V., Thuraisingham, B.M. (eds.) SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies Proceedings, Sophia Antipolis, France, 20–22 June 2007, pp. 41–50. ACM (2007)
Ni, Q., Bertino, E., Lobo, J., Brodie, C., Karat, C.-M., Karat, J., Trombetta, A.: Privacy-aware role-based access control. ACM Trans. Inf. Syst. Secur. 13(3) (2010)
Becker, M.Y., Malkis, A., Bussard, L.: A framework for privacy preferences and data-handling policies. Technical report, Microsoft Research Cambridge Technical Report, MSR-TR-2009-128 (2009)
Azraoui, M., Elkhiyaoui, K., Önen, M., Bernsmed, K., De Oliveira, A.S., Sendor, J.: A-PPL: an accountability policy language. In: Garcia-Alfaro, J., Herrera-JoancomartÃ, J., Lupu, E., Posegga, J., Aldini, A., Martinelli, F., Suri, N. (eds.) DPM/SETOP/QASA 2014. LNCS, vol. 8872, pp. 319–326. Springer, Heidelberg (2015)
Benghabrit, W., Grall, H., Royer, J., Sellami, M., Azraoui, M., Elkhiyaoui, K., Önen, M., de Oliveira, A.S., Bernsmed, K.: A cloud accountability policy representation framework. In: Helfert, M., Desprez, F., Ferguson, D., Leymann, F., Muñoz, V.M., eds.: CLOSER 2014 - Proceedings of the 4th International Conference on Cloud Computing and Services Science, Barcelona, Spain, 3–5 April 2014, pp. 489–498. SciTePress (2014)
Reiff-Marganiec, S., Turner, K., Blair, L., Campbell, G., Wang, F.: Appel: An adaptable and programmable policy environment and language. Technical report, Technical report CSM-161, Department of Computing Science and Mathematics, University of Stirling, UK (2014)
Langheinrich, M.: A P3P preference exchange language (APPEL). W3C Working Draft (2001)
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: XPref: a preference language for P3P. Comput. Netw. 48(5), 809–827 (2005)
Iyilade, J., Vassileva, J.: P2U: A privacy policy specification language for secondary data sharing and usage. In: 35 IEEE Security and Privacy Workshops, SPW 2014, San Jose, CA, USA, 17–18 May 2014, pp. 18–22. IEEE Computer Society (2014)
Chowdhury, O., Jia, L., Garg, D., Datta, A.: Temporal mode-checking for runtime monitoring of privacy policies. In: Biere, A., Bloem, R. (eds.) CAV 2014. LNCS, vol. 8559, pp. 131–149. Springer, Heidelberg (2014)
Chowdhury, O., Gampe, A., Niu, J., von Ronne, J., Bennatt, J., Datta, A., Jia, L., Winsborough, W.H.: Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. In: Conti, M., Vaidya, J., Schaad, A. (eds.) 18th ACM Symposium on Access Control Models and Technologies, SACMAT 2013, Amsterdam, The Netherlands, 12–14 June 2013, pp. 3–14. ACM (2013)
Hada, S., Kudo, M.: XML access control language: provisional authorization for XML documents. Language Specification (2000)
Damianou, N., Dulay, N., Lupu, E., Sloman, M.: A language for specifying security and management policies for distributed systems. Technical report 20, Department of Computing, Imperial College, London (2000)
Damianou, N., Dulay, N., Lupu, E.C., Sloman, M.: The ponder policy specification language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, p. 18. Springer, Heidelberg (2001)
Erlingsson, Ú., Schneider, F.B.: IRM enforcement of Java stack inspection. In: IEEE Symposium on Security and Privacy, Berkeley, California, USA, 14–17 May 2000, pp. 246–255. IEEE Computer Society (2000)
Hallam-Baker, P.: Security assertions markup language, 1–24, May 14 2001
Hughes, J., Maler, E.: Security assertion markup language (SAML) v2. 0 technical overview. OASIS SSTC Working Draft sstc-saml-tech-overview-2.0-draft-08 (2005)
Lalana, K.: Rei: A policy language for the me-centric project. Technical report, TechReport, HP Labs (2002)
Bauer, L., Ligatti, J., Walker, D.: A language and system for composing security policies. Technical report, Princeton University (2004)
OASIS Standard: eXtensible Access Control Markup Language (XACML)version 2.0 (2005). http://docs.oasisopen.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf
Aktug, I., Naliuka, K.: ConSpec - a formal language for policy specification. Electr. Notes Theor. Comput. Sci. 197(1), 45–58 (2008)
von Oheimb, D., Mödersheim, S.: ASLan++ — a formal security specification language for distributed systems. In: Aichernig, B.K., de Boer, F.S., Bonsangue, M.M. (eds.) Formal Methods for Components and Objects. LNCS, vol. 6957, pp. 1–22. Springer, Heidelberg (2011)
Reagle, J., Cranor, L.F.: The platform for privacy preferences. Commun. ACM 42(2), 48–55 (1999)
Cranor, L., Langheinrich, M., Marchiori, M., Reagle, J.: The platform for privacy preferences 1.0 (P3P1.0) specification. W3C Recommendation, April 2002
Bohrer, K., Holland, B.: Customer profile exchange (CPExchange) specification. public document
Karjoth, G., Schunter, M., Waidner, M.: Platform for enterprise privacy practices: privacy-enabled management of customer data. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 69–84. Springer, Heidelberg (2003)
Ashley, P., Hada, S., Karjoth, G., Schunter, M.: E-P3P privacy policies and privacy authorization. In: Jajodia, S., Samarati, P., (eds.) Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, 21 November 2002, pp. 103–109. ACM (2002)
Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise privacy authorization language (EPAL 1.2). Submission to W3C (2003)
May, M.J., Gunter, C.A., Lee, I.: Privacy APIs: access control techniques to analyze and verify legal privacy policies. In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5–7 July 2006, Venice, Italy, pp. 85–97. IEEE Computer Society (2006)
Vimercati, G., Paraboschi, S., Pedrini, E., Preiss, F.S., Raggett, D., Samarati, P., Trabelsi, S., Verdicchio, M.: Primelife policy language (2009)
Trabelsi, S., Sendor, J., Reinicke, S.: PPL: primelife privacy policy engine. In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6–8 June 2011, pp. 184–185. IEEE Computer Society (2011)
DeYoung, H., Garg, D., Jia, L., Kaynar, D.K., Datta, A.: Experiences in the logical specification of the HIPAA and GLBA privacy laws. In: Al-Shaer, E., Frikken, K.B. (eds.) Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, WPES 2010, Chicago, Illinois, USA, 4 October 2010, pp. 73–82. ACM (2010)
Khandelwal, A., Bao, J., Kagal, L., Jacobi, I., Ding, L., Hendler, J.: Analyzing the AIR language: a semantic web (production) rule language. In: Hitzler, P., Lukasiewicz, T. (eds.) RR 2010. LNCS, vol. 6333, pp. 58–72. Springer, Heidelberg (2010)
Becker, M.Y., Malkis, A., Bussard, L.: A practical generic privacy language. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 125–139. Springer, Heidelberg (2010)
Yang, J., Yessenov, K., Solar-Lezama, A.: A language for automatically enforcing privacy policies. In: Field, J., Hicks, M. (eds.) Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, 22–28 January 2012, pp. 85–96. ACM (2012)
Senicar, V., Jerman-Blazic, B., Klobucar, T.: Privacy-enhancing technologies - approaches and development. Comput. Stand. Interfaces 25(2), 147–158 (2003)
Hafiz, M.: A pattern language for developing privacy enhancing technologies. Softw. Pract. Exper. 43(7), 769–787 (2013)
Cherrueau, R., Douence, R., Südholt, M.: A language for the composition of privacy-enforcement techniques. In: IEEE TrustCom/BigDataSE/ISPA, Helsinki, Finland, 20–22 August 2015, vol. 1, pp. 1037–1044. IEEE (2015)
Fischer-Hübner, S.: Privacy and security at risk in the global information society. Inf. Commun. Soc. 1(4), 420–441 (1998)
Goldberg, I.: Privacy-enhancing technologies for the internet, II: five years later. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 1–12. Springer, Heidelberg (2003)
Goldberg, I., Wagner, D., Brewer, E.: Privacy-enhancing technologies for the internet. In: Proceedings, COMPCON 1997, pp. 103–109. IEEE, February 1997
Kuipers, B.: Qualitative Reasoning: Modeling and Simulation with Incomplete Knowledge. The MIT Press, Cambridge (1994)
Cohn, A.G., Hazarika, S.M.: Qualitative spatial representation and reasoning: an overview. Fundamenta Informaticae 46(1–2), 1–29 (2001)
Renz, J., Nebel, B.: Qualitative spatial reasoning using constraint calculi. In: Handbook of Spatial Logics, pp. 161–215 (2007)
Renz, J., Rauh, R., Knauff, M.: Towards cognitive adequacy of topological spatial relations. In: Habel, C., Brauer, W., Freksa, C., Wender, K.F. (eds.) Spatial Cognition 2000. LNCS (LNAI), vol. 1849, pp. 184–197. Springer, Heidelberg (2000)
Cohn, A.G., Bennett, B., Gooday, J.M., Gotts, N.: RCC: a calculus for region based qualitative spatial reasoning. GeoInformatica 1, 275–316 (1997)
Pnueli, A.: The temporal logic of programs. In: Proceeding of FOCS, pp. 46–57 (1977)
Sistla, A.P.: Safety, liveness and fairness in temporal logic. Formal Aspects Comput. 6(5), 495–511 (1994)
Dylla, F., Kreutzmann, A., Wolter, D.: A qualitative representation of social conventions for application in robotics. In: AAAI Spring Symposium Series (2014)
Wolter, D., Wallgrün, J.O.: Qualitative spatial reasoning for applications: new challenges and the SparQ toolbox. In: Hazarika, S.M. (ed.) Qualitative Spatio-Temporal Representation and Reasoning: Trends and Future Directions. IGI Global, Hershey (2011)
van de Ven, J., Dylla, F.: Privacy classification for ambient intelligence. In: Aarts, E., de Ruyter, B., Markopoulos, P., van Loenen, E., Wichert, R., Schouten, B., Terken, J., Van Kranenburg, R., Ouden, E.D., O’Hare, G. (eds.) AmI 2014. LNCS, vol. 8850, pp. 328–343. Springer, Heidelberg (2014)
Acknowledgement
We acknowledge German Research Foundation (DFG) funding for project SOCIAL (FR 806/15-1). We thank the anonymous reviewers for their thoughtful and constructive comments.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
van de Ven, J., Dylla, F. (2016). Qualitative Privacy Description Language. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds) Privacy Technologies and Policy. APF 2016. Lecture Notes in Computer Science(), vol 9857. Springer, Cham. https://doi.org/10.1007/978-3-319-44760-5_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-44760-5_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44759-9
Online ISBN: 978-3-319-44760-5
eBook Packages: Computer ScienceComputer Science (R0)