A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
An Ontology Design Pattern for Describing Personal Data in Privacy Policies
2018
Zenodo
We present an ontology design pattern to aid these efforts in representing and modelling information related to personal data within a privacy policy. ...
A privacy policy is a document that provides information for legal compliance onhow personal data is collected, used, stored, and shared, which is essential for understanding their privacy implications ...
Acknowledgements This work is supported by the ADAPT Centre for Digital Content Technology which is funded under the SFI Research Centres Programme (Grant 13/RC/2106) and is co-funded under the European ...
doi:10.5281/zenodo.3246482
fatcat:igpuzzw22rhj5e5pkk3bm53yne
Modeling Privacy Aware Health Information Exchange Systems
2014
Social Science Research Network
Enforcement of these policies is equally problematic. In this paper we present a novel approach that may simplify policy creation, interpretation, and implementation in health information systems. ...
Privacy and care management policies at the federal, state, and institutional level lead to a confusing array of potentially contradictory or subjective policy interpretations. ...
The graphical model describing the pattern for an institutional policy is presented on Figure 4 . ...
doi:10.2139/ssrn.2458008
fatcat:rkrvysndavbpblzag4fbdrfp2i
Privacy Verification Using Ontologies
2011
2011 Sixth International Conference on Availability, Reliability and Security
This paper extends current design methods by additional (formal) steps which take advantage of ontologies. ...
The proposed extensions result in a systematic approach that better protects privacy in future information systems. ...
This cycle involves two types of stakeholders, those with an interest in privacy protection, and those responsible for design and implementation. ...
doi:10.1109/ares.2011.97
dblp:conf/IEEEares/KostFKK11
fatcat:tj7old7uqrgc3n57ryj64pmbau
Crafting a balance between big data utility and protection in the semantic data cloud
2013
Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics - WIMS '13
Data Releasing Policy (DRP) describes what are available SDC methods with de-identifiable PII are disclosed for analysis but data privacy is preserved. 1 Semantics-enabled policies are composed of ontologies ...
Ontology for Data Releasing Policy (DRP)(Conti.) ...
doi:10.1145/2479787.2479806
dblp:conf/wims/HuCH13
fatcat:qbcrvycxzvcztgqvxvtahi5vdm
DSAP: Data Sharing Agreement Privacy Ontology
2018
Figshare
In this paper we propose a flexible and extensible ontology for expressing and enforcing privacy policies described in medical research data sharing agreements (DSA). ...
We demonstrate that our ontology is capable of supporting the DSA in a collaborative health research data sharing scenario through providing the appropriate vocabulary and structure to log privacy events ...
DSAP Ontology Design The key objective in designing the DSAP ontology is to support transparency and accountability with respect to the treatment of personal data when multiple stakeholders (participants ...
doi:10.6084/m9.figshare.7322420.v1
fatcat:sjqrjsd5ebe65pukfufqr63jd4
Privacy analysis using ontologies
2012
Proceedings of the second ACM conference on Data and Application Security and Privacy - CODASKY '12
This paper introduces a formal approach for technically evaluating an information system with respect to its designed or implemented privacy protection. ...
In particular, we introduce a system model that describes various system aspects such as its information flow. We define the semantics of this system model by using ontologies. ...
The process of describing and evaluating applications regarding privacy is done by designing and evaluating P3P policies in combination with the proposed privacy ontology. ...
doi:10.1145/2133601.2133627
dblp:conf/codaspy/KostF12
fatcat:dekj5lbtsrampefofggd4vlz7u
An Ontology for Enforcing Security and Privacy Policies on Mobile Devices
2014
Proceedings of the International Conference on Knowledge Engineering and Ontology Development
In this paper we define an ontology that can be utilized as a foundation for enforcing security and privacy policies across all mobile devices, and use the ontology to define policies and to model knowledge ...
These devices have also become troves of security and privacy data of the consumers that utilize them. ...
In Section 3, we provide an overview of our ontology, and describe it in detail in Sections 4, 5, and 6. ...
doi:10.5220/0005081502880295
dblp:conf/ic3k/KruppS014
fatcat:uupk2vp7lfgw3kwfgfx7e6jvvu
Synthesising Privacy by Design Knowledge Towards Explainable Internet of Things Application Designing in Healthcare
[article]
2020
arXiv
pre-print
A vision is to develop an intelligent privacy assistant to whom developers can easily ask questions in order to learn how to incorporate different privacy-preserving ideas into their IoT application designs ...
Privacy by Design (PbD) is the most common approach followed by software developers who aim to reduce risks within their application designs, yet it remains commonplace for developers to retain little ...
ACKNOWLEDGMENTS Charith Perera's work is partially supported by PETRAS2: National Centre of Excellence for IoT Systems Cyber Security (EP/S035362/1) and Quarriable Smart City Data Markets (EP/T517203/1 ...
arXiv:2011.03747v1
fatcat:qy3csg343zgrll4zat36cgxt6u
Automating Privacy Compliance Using Policy Integrated Blockchain
2019
Cryptography
In this paper, we describe this framework along with the comprehensive semantically rich knowledge graph that we have developed to capture rules embedded in data privacy policy documents. ...
that enforces users' data privacy policies while sharing their data with third parties. ...
Acknowledgments: The authors wish to thank Anupam Joshi and Tim Finin for their valuable advice to this project.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/cryptography3010007
fatcat:xq46kdnhd5addhn4wcthb6thiy
PrOnto: Privacy Ontology for Legal Reasoning
[chapter]
2018
Lecture Notes in Computer Science
In this light, this paper presents a first draft of a legal ontology on the GDPR, called PrOnto, that has the goal of providing a legal knowledge modelling of the privacy agents, data types, types of processing ...
The methodology used here is based on legal theory analysis joined with ontological patterns. ...
(TVC) is an ontology pattern that allows to describe scenarios in which someone (e.g., a person) has a value (e.g., a particular role) during a particular time and for a particular context. ...
doi:10.1007/978-3-319-98349-3_11
fatcat:cxbylxwn6bfabg3xq5gckjcnwu
Technical Enforcement of European Privacy Legislation: An Access Control Approach
2012
2012 5th International Conference on New Technologies, Mobility and Security (NTMS)
For proof of concept, we describe our proposed privacy semantic information model by means of privacy ontology. ...
Until today, the protection of personal data is mainly left to the legislation by means of guidelines. ...
To do so, this section describes a semantic information model formalizing the legal requirements presented in section III. As such, sub section A designs our privacy ontology. ...
doi:10.1109/ntms.2012.6208724
dblp:conf/ntms/BekaraLN12
fatcat:forsx2om3vf3tdro6hxibpblbi
PrivOnto: A semantic framework for the analysis of privacy policies
2018
Semantic Web Journal
Finally, we outline future research and open challenges in using semantic technologies for privacy policy analysis. ...
researchers and regulators in the analysis of privacy policies at scale. ...
The authors would like to acknowledge the entire Usable Privacy Policy Project team for its dedicated work; and especially thank Pedro Giovanni Leon, Mads Schaarup Andersen, and Aswarth Dara for their ...
doi:10.3233/sw-170283
fatcat:s2xxw6i6g5ax7ittoltji63lji
Semantic Legal Policies for Data Exchange and Protection across Super-Peer Domains in the Cloud
2012
Future Internet
Semantic legal policies in compliance with the law are enforced at the super-peer within an SPD to enable Law-as-a-Service (LaaS) for cloud service providers. ...
An agent at the super-peer is a unique law-aware guardian that provides protected data integration services for its peers within an SPD. ...
A preliminary version of this paper appeared in the International Conference on Web Intelligence, Mining and Semantics (WIMS'12) [7] with the ACM DOI 10.1145/2254129.2254162 shown in the ACM digital ...
doi:10.3390/fi4040929
fatcat:t5olvm2f35a7ricvgnreqpi4a4
The Need for Machine-Processable Agreements in Health Data Management
2020
Algorithms
In this paper, we study the problem of health data sharing and we advocate the need for individuals to describe their personal contract of data usage in a formal, machine-processable language. ...
We develop an application for sharing patient genomic information and test results, and use interactions with patients and clinicians in order to identify the particular peculiarities a privacy/policy/ ...
Acknowledgments: The authors thank Don Cruickshank, Tasneem Bawendi, Liberty Gamble, Andreea Ghita, James Lister, Daniel Lockyer, Oana Paul, Luke Pullman and Maksim Romanovich for their development and ...
doi:10.3390/a13040087
fatcat:yutuvhaunzevnb2m6btpsvao7y
PVDetector
2016
Proceedings of the International Workshop on Mobile Software Engineering and Systems - MOBILESoft '16
In this paper, we present PVDetector, an automatic tool that analyzes Android apps to detect privacy-policy violations, i.e., inconsistencies between an app's data collection code and the corresponding ...
description in its privacy policy. ...
Acknowledgement The authors are supported in part by NSF Awards CNS-0964710, CNS-1330596, CCF-1464425, NSA Grant on Science of Security, and DHS grant DHS-14-ST-062-001. ...
doi:10.1145/2897073.2897720
dblp:conf/icse/SlavinWHHKBBN16a
fatcat:yesnrhs73fcbjalgbsj2ydc4ny
« Previous
Showing results 1 — 15 out of 12,386 results