12,386 Hits in 4.6 sec

An Ontology Design Pattern for Describing Personal Data in Privacy Policies

Harshvardhan J. Pandit, Declan O'Sullivan, Dave Lewis
2018 Zenodo  
We present an ontology design pattern to aid these efforts in representing and modelling information related to personal data within a privacy policy.  ...  A privacy policy is a document that provides information for legal compliance onhow personal data is collected, used, stored, and shared, which is essential for understanding their privacy implications  ...  Acknowledgements This work is supported by the ADAPT Centre for Digital Content Technology which is funded under the SFI Research Centres Programme (Grant 13/RC/2106) and is co-funded under the European  ... 
doi:10.5281/zenodo.3246482 fatcat:igpuzzw22rhj5e5pkk3bm53yne

Modeling Privacy Aware Health Information Exchange Systems

Andras Nadas, Mark E. Frisse, Janos Sztipanovits
2014 Social Science Research Network  
Enforcement of these policies is equally problematic. In this paper we present a novel approach that may simplify policy creation, interpretation, and implementation in health information systems.  ...  Privacy and care management policies at the federal, state, and institutional level lead to a confusing array of potentially contradictory or subjective policy interpretations.  ...  The graphical model describing the pattern for an institutional policy is presented on Figure 4 .  ... 
doi:10.2139/ssrn.2458008 fatcat:rkrvysndavbpblzag4fbdrfp2i

Privacy Verification Using Ontologies

Martin Kost, Johann-Christoph Freytag, Frank Kargl, Antonio Kung
2011 2011 Sixth International Conference on Availability, Reliability and Security  
This paper extends current design methods by additional (formal) steps which take advantage of ontologies.  ...  The proposed extensions result in a systematic approach that better protects privacy in future information systems.  ...  This cycle involves two types of stakeholders, those with an interest in privacy protection, and those responsible for design and implementation.  ... 
doi:10.1109/ares.2011.97 dblp:conf/IEEEares/KostFKK11 fatcat:tj7old7uqrgc3n57ryj64pmbau

Crafting a balance between big data utility and protection in the semantic data cloud

Yuh-Jong Hu, Kua-Ping Cheng, Ya-Ling Huang
2013 Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics - WIMS '13  
Data Releasing Policy (DRP) describes what are available SDC methods with de-identifiable PII are disclosed for analysis but data privacy is preserved. 1 Semantics-enabled policies are composed of ontologies  ...  Ontology for Data Releasing Policy (DRP)(Conti.)  ... 
doi:10.1145/2479787.2479806 dblp:conf/wims/HuCH13 fatcat:qbcrvycxzvcztgqvxvtahi5vdm

DSAP: Data Sharing Agreement Privacy Ontology

Mingyuan Li, Reza Samavi
2018 Figshare  
In this paper we propose a flexible and extensible ontology for expressing and enforcing privacy policies described in medical research data sharing agreements (DSA).  ...  We demonstrate that our ontology is capable of supporting the DSA in a collaborative health research data sharing scenario through providing the appropriate vocabulary and structure to log privacy events  ...  DSAP Ontology Design The key objective in designing the DSAP ontology is to support transparency and accountability with respect to the treatment of personal data when multiple stakeholders (participants  ... 
doi:10.6084/m9.figshare.7322420.v1 fatcat:sjqrjsd5ebe65pukfufqr63jd4

Privacy analysis using ontologies

Martin Kost, Johann Christoph Freytag
2012 Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12  
This paper introduces a formal approach for technically evaluating an information system with respect to its designed or implemented privacy protection.  ...  In particular, we introduce a system model that describes various system aspects such as its information flow. We define the semantics of this system model by using ontologies.  ...  The process of describing and evaluating applications regarding privacy is done by designing and evaluating P3P policies in combination with the proposed privacy ontology.  ... 
doi:10.1145/2133601.2133627 dblp:conf/codaspy/KostF12 fatcat:dekj5lbtsrampefofggd4vlz7u

An Ontology for Enforcing Security and Privacy Policies on Mobile Devices

Brian Krupp, Nigamanth Sridhar, Wenbing Zhao
2014 Proceedings of the International Conference on Knowledge Engineering and Ontology Development  
In this paper we define an ontology that can be utilized as a foundation for enforcing security and privacy policies across all mobile devices, and use the ontology to define policies and to model knowledge  ...  These devices have also become troves of security and privacy data of the consumers that utilize them.  ...  In Section 3, we provide an overview of our ontology, and describe it in detail in Sections 4, 5, and 6.  ... 
doi:10.5220/0005081502880295 dblp:conf/ic3k/KruppS014 fatcat:uupk2vp7lfgw3kwfgfx7e6jvvu

Synthesising Privacy by Design Knowledge Towards Explainable Internet of Things Application Designing in Healthcare [article]

Lamya Alkhariji, Nada Alhirabi, Mansour Naser Alraja, Mahmoud Barhamgi, Omer Rana, Charith Perera
2020 arXiv   pre-print
A vision is to develop an intelligent privacy assistant to whom developers can easily ask questions in order to learn how to incorporate different privacy-preserving ideas into their IoT application designs  ...  Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little  ...  ACKNOWLEDGMENTS Charith Perera's work is partially supported by PETRAS2: National Centre of Excellence for IoT Systems Cyber Security (EP/S035362/1) and Quarriable Smart City Data Markets (EP/T517203/1  ... 
arXiv:2011.03747v1 fatcat:qy3csg343zgrll4zat36cgxt6u

Automating Privacy Compliance Using Policy Integrated Blockchain

Karuna Pande Joshi, Agniva Banerjee
2019 Cryptography  
In this paper, we describe this framework along with the comprehensive semantically rich knowledge graph that we have developed to capture rules embedded in data privacy policy documents.  ...  that enforces users' data privacy policies while sharing their data with third parties.  ...  Acknowledgments: The authors wish to thank Anupam Joshi and Tim Finin for their valuable advice to this project. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/cryptography3010007 fatcat:xq46kdnhd5addhn4wcthb6thiy

PrOnto: Privacy Ontology for Legal Reasoning [chapter]

Monica Palmirani, Michele Martoni, Arianna Rossi, Cesare Bartolini, Livio Robaldo
2018 Lecture Notes in Computer Science  
In this light, this paper presents a first draft of a legal ontology on the GDPR, called PrOnto, that has the goal of providing a legal knowledge modelling of the privacy agents, data types, types of processing  ...  The methodology used here is based on legal theory analysis joined with ontological patterns.  ...  (TVC) is an ontology pattern that allows to describe scenarios in which someone (e.g., a person) has a value (e.g., a particular role) during a particular time and for a particular context.  ... 
doi:10.1007/978-3-319-98349-3_11 fatcat:cxbylxwn6bfabg3xq5gckjcnwu

Technical Enforcement of European Privacy Legislation: An Access Control Approach

Kheira Bekara, Maryline Laurent, Than Ha Nguyen
2012 2012 5th International Conference on New Technologies, Mobility and Security (NTMS)  
For proof of concept, we describe our proposed privacy semantic information model by means of privacy ontology.  ...  Until today, the protection of personal data is mainly left to the legislation by means of guidelines.  ...  To do so, this section describes a semantic information model formalizing the legal requirements presented in section III. As such, sub section A designs our privacy ontology.  ... 
doi:10.1109/ntms.2012.6208724 dblp:conf/ntms/BekaraLN12 fatcat:forsx2om3vf3tdro6hxibpblbi

PrivOnto: A semantic framework for the analysis of privacy policies

Alessandro Oltramari, Dhivya Piraviperumal, Florian Schaub, Shomir Wilson, Sushain Cherivirala, Thomas B. Norton, N. Cameron Russell, Peter Story, Joel Reidenberg, Norman Sadeh, Mathieu d'Aquin, Sabrina Kirrane (+4 others)
2018 Semantic Web Journal  
Finally, we outline future research and open challenges in using semantic technologies for privacy policy analysis.  ...  researchers and regulators in the analysis of privacy policies at scale.  ...  The authors would like to acknowledge the entire Usable Privacy Policy Project team for its dedicated work; and especially thank Pedro Giovanni Leon, Mads Schaarup Andersen, and Aswarth Dara for their  ... 
doi:10.3233/sw-170283 fatcat:s2xxw6i6g5ax7ittoltji63lji

Semantic Legal Policies for Data Exchange and Protection across Super-Peer Domains in the Cloud

Yuh-Jong Hu, Win-Nan Wu, Kua-Ping Cheng, Ya-Ling Huang
2012 Future Internet  
Semantic legal policies in compliance with the law are enforced at the super-peer within an SPD to enable Law-as-a-Service (LaaS) for cloud service providers.  ...  An agent at the super-peer is a unique law-aware guardian that provides protected data integration services for its peers within an SPD.  ...  A preliminary version of this paper appeared in the International Conference on Web Intelligence, Mining and Semantics (WIMS'12) [7] with the ACM DOI 10.1145/2254129.2254162 shown in the ACM digital  ... 
doi:10.3390/fi4040929 fatcat:t5olvm2f35a7ricvgnreqpi4a4

The Need for Machine-Processable Agreements in Health Data Management

George Konstantinidis, Adriane Chapman, Mark J. Weal, Ahmed Alzubaidi, Lisa M. Ballard, Anneke M. Lucassen
2020 Algorithms  
In this paper, we study the problem of health data sharing and we advocate the need for individuals to describe their personal contract of data usage in a formal, machine-processable language.  ...  We develop an application for sharing patient genomic information and test results, and use interactions with patients and clinicians in order to identify the particular peculiarities a privacy/policy/  ...  Acknowledgments: The authors thank Don Cruickshank, Tasneem Bawendi, Liberty Gamble, Andreea Ghita, James Lister, Daniel Lockyer, Oana Paul, Luke Pullman and Maksim Romanovich for their development and  ... 
doi:10.3390/a13040087 fatcat:yutuvhaunzevnb2m6btpsvao7y


Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu
2016 Proceedings of the International Workshop on Mobile Software Engineering and Systems - MOBILESoft '16  
In this paper, we present PVDetector, an automatic tool that analyzes Android apps to detect privacy-policy violations, i.e., inconsistencies between an app's data collection code and the corresponding  ...  description in its privacy policy.  ...  Acknowledgement The authors are supported in part by NSF Awards CNS-0964710, CNS-1330596, CCF-1464425, NSA Grant on Science of Security, and DHS grant DHS-14-ST-062-001.  ... 
doi:10.1145/2897073.2897720 dblp:conf/icse/SlavinWHHKBBN16a fatcat:yesnrhs73fcbjalgbsj2ydc4ny
« Previous Showing results 1 — 15 out of 12,386 results