Privacy policies are often defined in terms of permitted messages. Instead, in this paper we derive dynamically the permitted messages from static privacy policies defined in terms of permitted and obligatory knowledge. With this new approach, we do not have to specify the permissions and prohibitions of all message combinations explicitly. To specify and reason about such privacy policies, we extend a multi-modal logic introduced by Cuppens and Demolombe with update operators modeling the dynamics of both knowledge and privacy policies. We show also how to determine the obligatory messages, how to express epistemic norms, and how to check whether a situation is compliant with respect to a privacy policy.We axiomatize and prove the decidabi...
In this paper we propose a formal framework for studying privacy. Our framework is based on the π-ca...
6 pagesInternational audienceThe aim of the Coprelobri project (standing for " Computers and privacy...
We consider the problem of developing an abstract meta-model of access control in terms of which pol...
peer reviewedPrivacy policies are often defined in terms of permitted messages. Instead, in this pap...
International audienceKnowledge based privacy policies are more declarative than traditional action ...
Knowledge based privacy policies are more declarative than traditional action based ones, because th...
In this presentation I first review new developments of deontic logic in computer science, then I di...
Epistemic logic has previously been used to specify confidentiality security properties [1, 2]. In t...
Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is...
Online Social Networks are ubiquitous, bringing not only numerous new possibilities but also big thr...
Abstract. Formally specifying privacy goals is not trivial. The most widely used approach in formal ...
There is now an incredible wealth of data about individuals, businesses and organizations. This data...
In this paper we propose a formal framework for studying privacy ininformation systems. The proposal...
Abstract. In this paper, we propose a taxonomy of privacy-related information-hiding/disclosure prop...
We define a semantic model for purpose, based on which purpose-based privacy policies can be meaning...
In this paper we propose a formal framework for studying privacy. Our framework is based on the π-ca...
6 pagesInternational audienceThe aim of the Coprelobri project (standing for " Computers and privacy...
We consider the problem of developing an abstract meta-model of access control in terms of which pol...
peer reviewedPrivacy policies are often defined in terms of permitted messages. Instead, in this pap...
International audienceKnowledge based privacy policies are more declarative than traditional action ...
Knowledge based privacy policies are more declarative than traditional action based ones, because th...
In this presentation I first review new developments of deontic logic in computer science, then I di...
Epistemic logic has previously been used to specify confidentiality security properties [1, 2]. In t...
Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is...
Online Social Networks are ubiquitous, bringing not only numerous new possibilities but also big thr...
Abstract. Formally specifying privacy goals is not trivial. The most widely used approach in formal ...
There is now an incredible wealth of data about individuals, businesses and organizations. This data...
In this paper we propose a formal framework for studying privacy ininformation systems. The proposal...
Abstract. In this paper, we propose a taxonomy of privacy-related information-hiding/disclosure prop...
We define a semantic model for purpose, based on which purpose-based privacy policies can be meaning...
In this paper we propose a formal framework for studying privacy. Our framework is based on the π-ca...
6 pagesInternational audienceThe aim of the Coprelobri project (standing for " Computers and privacy...
We consider the problem of developing an abstract meta-model of access control in terms of which pol...