A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services

Advanced information processing technologies are often applied to large profiles and result in detailed behavior analysis. Moreover, under the pretext of increased personalization and strong accountability, organizations exchange information to compile even larger profiles. However, the user is unaw...

Full description

Saved in:
Bibliographic Details
Published inEngineering Secure Software and Systems pp. 155 - 170
Main Authors Decroix, Koen, Lapon, Jorn, De Decker, Bart, Naessens, Vincent
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2013
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN3642365620
9783642365621
ISSN0302-9743
1611-3349
DOI10.1007/978-3-642-36563-8_11

Cover

Abstract Advanced information processing technologies are often applied to large profiles and result in detailed behavior analysis. Moreover, under the pretext of increased personalization and strong accountability, organizations exchange information to compile even larger profiles. However, the user is unaware about the amount and type of personal data kept in profiles, partially due to advanced interactions between multiple organizations during service consumption. In this paper, a formal approach to inspect privacy and trust in advanced electronic services is presented. It allows to express access and privacy policies of service providers. Also, the privacy properties of multiple authentication technologies are formally modeled. From this, meaningful privacy properties can be extracted based on varying trust assumptions. Feedback is rendered through automated reasoning, useful for both users and system designers. To demonstrate its practicability, the approach is applied to the design of a travel reservation system.
AbstractList Advanced information processing technologies are often applied to large profiles and result in detailed behavior analysis. Moreover, under the pretext of increased personalization and strong accountability, organizations exchange information to compile even larger profiles. However, the user is unaware about the amount and type of personal data kept in profiles, partially due to advanced interactions between multiple organizations during service consumption. In this paper, a formal approach to inspect privacy and trust in advanced electronic services is presented. It allows to express access and privacy policies of service providers. Also, the privacy properties of multiple authentication technologies are formally modeled. From this, meaningful privacy properties can be extracted based on varying trust assumptions. Feedback is rendered through automated reasoning, useful for both users and system designers. To demonstrate its practicability, the approach is applied to the design of a travel reservation system.
Author De Decker, Bart
Lapon, Jorn
Decroix, Koen
Naessens, Vincent
Author_xml – sequence: 1
  givenname: Koen
  surname: Decroix
  fullname: Decroix, Koen
  email: Koen.Decroix@kahosl.be
  organization: Department of Industrial Engineering, Katholieke Hogeschool Sint-Lieven, Ghent, Belgium
– sequence: 2
  givenname: Jorn
  surname: Lapon
  fullname: Lapon, Jorn
  email: Jorn.Lapon@kahosl.be
  organization: Department of Industrial Engineering, Katholieke Hogeschool Sint-Lieven, Ghent, Belgium
– sequence: 3
  givenname: Bart
  surname: De Decker
  fullname: De Decker, Bart
  email: Bart.DeDecker@cs.kuleuven.be
  organization: iMinds-DistriNet, KU Leuven, Heverlee, Belgium
– sequence: 4
  givenname: Vincent
  surname: Naessens
  fullname: Naessens, Vincent
  email: Vincent.Naessens@kahosl.be
  organization: Department of Industrial Engineering, Katholieke Hogeschool Sint-Lieven, Ghent, Belgium
BookMark eNo1kNFKAzEQRaNWsK39Ax_yA9FJZjfZfVxKq4WCovU5JNlsXazZktSCf2-s-jRw5nJnOBMyCkPwhNxwuOUA6q5WFUMmC8FQlhJZpTk_I7OMMcMTq87JmEvOGWJRX5DJ_0LAiIwBQbBaFXhFZin1FkRRCV4CjMlzQ5dD_DA72uz3cTDujXZDpKuQ9t4d-rClT7E_GvdFTWjpJn6mA-0DbdqjCc63dLHLsTiE3tEXH4-98-maXHZml_zsb07J63KxmT-w9eP9at6s2Taf5sxK60xhhfKghAPTeadQ-aq0ynoOJUInu7K1bS0N79CXhZFlV4FDX-W0wykRv71pH_OjPmo7DO9Jc9A_1nTWo1FnD_pkSP9Yw29Xg12Q
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2013
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2013
DOI 10.1007/978-3-642-36563-8_11
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642365638
3642365639
EISSN 1611-3349
Editor Scandariato, Riccardo
Livshits, Benjamin
Jürjens, Jan
Editor_xml – sequence: 1
  givenname: Jan
  surname: Jürjens
  fullname: Jürjens, Jan
  email: jan.jurjens@cs.tu-dortmund.de
– sequence: 2
  givenname: Benjamin
  surname: Livshits
  fullname: Livshits, Benjamin
  email: livshits@microsoft.com
– sequence: 3
  givenname: Riccardo
  surname: Scandariato
  fullname: Scandariato, Riccardo
  email: riccardo.scandariato@cs.kuleuven.be
EndPage 170
GroupedDBID -DT
-GH
-~X
1SB
29L
2HA
2HV
5QI
875
AASHB
ABMNI
ACGFS
ADCXD
AEFIE
ALMA_UNASSIGNED_HOLDINGS
EJD
F5P
FEDTE
HVGLF
LAS
LDH
P2P
RIG
RNI
RSU
SVGTG
VI1
~02
ID FETCH-LOGICAL-g1501-b6bca4b27e072c0afec737e85b7be10530f6f5dbd96a1f3e54a65f80c3e80afc3
ISBN 3642365620
9783642365621
ISSN 0302-9743
IngestDate Tue Jul 29 20:03:12 EDT 2025
IsPeerReviewed true
IsScholarly true
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-g1501-b6bca4b27e072c0afec737e85b7be10530f6f5dbd96a1f3e54a65f80c3e80afc3
PageCount 16
ParticipantIDs springer_books_10_1007_978_3_642_36563_8_11
PublicationCentury 2000
PublicationDate 2013
PublicationDateYYYYMMDD 2013-01-01
PublicationDate_xml – year: 2013
  text: 2013
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Lecture Notes in Computer Science
PublicationSubtitle 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
PublicationTitle Engineering Secure Software and Systems
PublicationYear 2013
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
RelatedPersons Kleinberg, Jon M.
Mattern, Friedemann
Nierstrasz, Oscar
Steffen, Bernhard
Kittler, Josef
Vardi, Moshe Y.
Weikum, Gerhard
Sudan, Madhu
Naor, Moni
Mitchell, John C.
Terzopoulos, Demetri
Pandu Rangan, C.
Kanade, Takeo
Hutchison, David
Tygar, Doug
RelatedPersons_xml – sequence: 1
  givenname: David
  surname: Hutchison
  fullname: Hutchison, David
  organization: Lancaster University, Lancaster, UK
– sequence: 2
  givenname: Takeo
  surname: Kanade
  fullname: Kanade, Takeo
  organization: Carnegie Mellon University, Pittsburgh, USA
– sequence: 3
  givenname: Josef
  surname: Kittler
  fullname: Kittler, Josef
  organization: University of Surrey, Guildford, UK
– sequence: 4
  givenname: Jon M.
  surname: Kleinberg
  fullname: Kleinberg, Jon M.
  organization: Cornell University, Ithaca, USA
– sequence: 5
  givenname: Friedemann
  surname: Mattern
  fullname: Mattern, Friedemann
  organization: ETH Zurich, Zurich, Switzerland
– sequence: 6
  givenname: John C.
  surname: Mitchell
  fullname: Mitchell, John C.
  organization: Stanford University, Stanford, USA
– sequence: 7
  givenname: Moni
  surname: Naor
  fullname: Naor, Moni
  organization: Weizmann Institute of Science, Rehovot, Israel
– sequence: 8
  givenname: Oscar
  surname: Nierstrasz
  fullname: Nierstrasz, Oscar
  organization: University of Bern, Bern, Switzerland
– sequence: 9
  givenname: C.
  surname: Pandu Rangan
  fullname: Pandu Rangan, C.
  organization: Indian Institute of Technology, Madras, India
– sequence: 10
  givenname: Bernhard
  surname: Steffen
  fullname: Steffen, Bernhard
  organization: University of Dortmund, Dortmund, Germany
– sequence: 11
  givenname: Madhu
  surname: Sudan
  fullname: Sudan, Madhu
  organization: Massachusetts Institute of Technology, USA
– sequence: 12
  givenname: Demetri
  surname: Terzopoulos
  fullname: Terzopoulos, Demetri
  organization: University of California, Los Angeles, USA
– sequence: 13
  givenname: Doug
  surname: Tygar
  fullname: Tygar, Doug
  organization: University of California, Berkeley, USA
– sequence: 14
  givenname: Moshe Y.
  surname: Vardi
  fullname: Vardi, Moshe Y.
  organization: Rice University, Houston, USA
– sequence: 15
  givenname: Gerhard
  surname: Weikum
  fullname: Weikum, Gerhard
  organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany
SSID ssib024821500
ssib024566521
ssj0002792
ssj0000879996
Score 1.9195492
Snippet Advanced information processing technologies are often applied to large profiles and result in detailed behavior analysis. Moreover, under the pretext of...
SourceID springer
SourceType Publisher
StartPage 155
SubjectTerms electronic services
modeling
privacy
trust
Title A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services
URI http://link.springer.com/10.1007/978-3-642-36563-8_11
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLaq7gIcgAHit3zgVhklseO4Bw4DdRqlTAi6abcodmxUCSWo60Dij-Fv5b3YTjI2IY1L1EZW4_h9ffnyfnwm5JUVjss6d8xVNmFCp3OmM1sxMZc6t_ncqBrjHR-P5dGJWJ7lZ5PJ71HV0sVOvza_ru0r-R-rwjmwK3bJ3sCy_Y_CCfgM9oUjWBiOf5Hfy2HWkM7vlQR91NzOvoBP_VmFjMBYixyZKvDDdtM9aj60Q__Xqvru8-7LdtsMY8EPxXqLt1EGCUPGFUqNe-p9umlMXzUTKp5nh0iBvyG39Z1aWMT4vvHtnDDPT9vND9xfHue3xm6PLtwSyxAWw5Y80YV5p4dizOdvViHdcdzuuiqyWdyRIjqocQQDd5O4FMGIEczZPwS-umYTYH7APvnIXYOHyhi8EXkXab0LlyjMyL0QanDLqZcCDk_41G9VcuXhMa4XgYux7mpMldg6vpcJyZMp2TtYLFen0WNh1liOCFAmFFCoIHjYcQFV4Btlzw1QrtHntfy8sdso3FcWFMj67-mo0_O6SV3J3XeUaH2P3ME2GYr9K2CC-2Rim31yN5qEBpPsk9sjnD4gnw-ohwiNEKEAETpAhAaIUIAI7SBCNw2NEKEDRGiEyENycrhYvztiYVsP9hXWJmVaalMJnRU2KTKTVM6aghdW5brQFug-T5x0ea3ruaxSx20uKpk7lRhuFYw2_BGZNm1jHxNaVylPnbJFYmohuFPGSpEYaQplZJ2IJ2QWl6jEP-p5GVW6YUFLXsKClt2ClrigT280-hm5NYD5OZnuthf2BRDUnX4ZUPIHrMSFnQ
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Engineering+Secure+Software+and+Systems&rft.au=Decroix%2C+Koen&rft.au=Lapon%2C+Jorn&rft.au=De+Decker%2C+Bart&rft.au=Naessens%2C+Vincent&rft.atitle=A+Formal+Approach+for+Inspecting+Privacy+and+Trust+in+Advanced+Electronic+Services&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2013-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642365638&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=155&rft.epage=170&rft_id=info:doi/10.1007%2F978-3-642-36563-8_11
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon