In this paper we propose a formal framework for studying privacy ininformation systems. The proposal follows a two-axes schema where the firstaxis considers privacy as a taxonomy of rights and the second axis involves theways an information system stores and manipulates information. We develop acorrespondence between the above schema and an associated model of computation.In particular, we propose the \Pcalc, a calculus based on the $\pi$-calculuswith groups extended with constructs for reasoning about private data. Theprivacy requirements of an information system are captured via a privacy policylanguage. The correspondence between the privacy model and the \Pcalc semanticsis established using a type system for the calculus and a satisfiab...
Privacy of information is becoming more and more important as we start trusting unknown computers, s...
International audienceThe verification of systems for protecting sensitive and confidential informat...
Abstract. In this paper ∗ we illustrate a privacy framework named Indistinguishable † Privacy. In-di...
In this paper we propose a formal framework for studying privacy. Our framework is based on the π-ca...
Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is...
Abstract. Formally specifying privacy goals is not trivial. The most widely used approach in formal ...
We want assurances that sensitive information will not be disclosed when aggregate data derived from...
Abstract. The verification of systems for protecting sensitive and confidential information is becom...
There is now an incredible wealth of data about individuals, businesses and organisations. This data...
Web of Linked Data introduces common format and principles for publishing and linking data on the We...
The increasing prevalence of large-scale data collection in modern society represents a potential th...
Part 2: Privacy MetricsInternational audienceDescribing complex ideas requires clear and concise lan...
We introduce a notion of controlled information release for a typed version of the pi-calculus exten...
AbstractWe add an operation of group creation to the typed pi-calculus, where a group is a type for ...
We introduce a notion of controlled information release for a typed version of the pi-calculus exten...
Privacy of information is becoming more and more important as we start trusting unknown computers, s...
International audienceThe verification of systems for protecting sensitive and confidential informat...
Abstract. In this paper ∗ we illustrate a privacy framework named Indistinguishable † Privacy. In-di...
In this paper we propose a formal framework for studying privacy. Our framework is based on the π-ca...
Formally specifying privacy goals is not trivial. The most widely used approach in formal methods is...
Abstract. Formally specifying privacy goals is not trivial. The most widely used approach in formal ...
We want assurances that sensitive information will not be disclosed when aggregate data derived from...
Abstract. The verification of systems for protecting sensitive and confidential information is becom...
There is now an incredible wealth of data about individuals, businesses and organisations. This data...
Web of Linked Data introduces common format and principles for publishing and linking data on the We...
The increasing prevalence of large-scale data collection in modern society represents a potential th...
Part 2: Privacy MetricsInternational audienceDescribing complex ideas requires clear and concise lan...
We introduce a notion of controlled information release for a typed version of the pi-calculus exten...
AbstractWe add an operation of group creation to the typed pi-calculus, where a group is a type for ...
We introduce a notion of controlled information release for a typed version of the pi-calculus exten...
Privacy of information is becoming more and more important as we start trusting unknown computers, s...
International audienceThe verification of systems for protecting sensitive and confidential informat...
Abstract. In this paper ∗ we illustrate a privacy framework named Indistinguishable † Privacy. In-di...