Guaranteeing Privacy-Observing Data Exchange

Christian W. Probst

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

147 Downloads (Pure)


Privacy is a major concern in large of parts of the world when exchanging information. Ideally, we would like to be able to have fine-grained control about how information that we deem sensitive can be propagated and used. While privacy policy languages exist, it is not possible to control whether the entity that receives data is living up to its own policy specification. In this work we present our initial work on an approach that empowers data owners to specify their privacy preferences, and data consumers to specify their data needs. Using a static analysis of the two specifications, our approach then finds a communication scheme that complies with these preferences and needs. While applicable to online transactions, the same techniques can be used in development of IT systems dealing with sensitive data. To the best of our knowledge, no existing privacy policy languages supports negotiation of policies, but only yes/no answers. We also discuss how the same approach can be used to identify a qualitative level of sharing, where data may be shared according to, e.g., the level of trust to another entity.
Original languageEnglish
Title of host publicationProceedings of the 7th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation - Foundational Techniques (ISoLA 2016) : Part I
Publication date2016
ISBN (Print)978-3-319-47165-5
ISBN (Electronic)978-3-319-47166-2
Publication statusPublished - 2016
Event7th International Symposium On Leveraging Applications Of Formal Methods, Verification And Validation - Corfu, Greece
Duration: 10 Oct 201614 Oct 2016
Conference number: 7


Conference7th International Symposium On Leveraging Applications Of Formal Methods, Verification And Validation
SeriesLecture Notes in Computer Science

Fingerprint Dive into the research topics of 'Guaranteeing Privacy-Observing Data Exchange'. Together they form a unique fingerprint.

Cite this