A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services
Advanced information processing technologies are often applied to large profiles and result in detailed behavior analysis. Moreover, under the pretext of increased personalization and strong accountability, organizations exchange information to compile even larger profiles. However, the user is unaw...
Saved in:
Published in | Engineering Secure Software and Systems pp. 155 - 170 |
---|---|
Main Authors | , , , |
Format | Book Chapter |
Language | English |
Published |
Berlin, Heidelberg
Springer Berlin Heidelberg
2013
|
Series | Lecture Notes in Computer Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642365620 9783642365621 |
ISSN | 0302-9743 1611-3349 |
DOI | 10.1007/978-3-642-36563-8_11 |
Cover
Abstract | Advanced information processing technologies are often applied to large profiles and result in detailed behavior analysis. Moreover, under the pretext of increased personalization and strong accountability, organizations exchange information to compile even larger profiles. However, the user is unaware about the amount and type of personal data kept in profiles, partially due to advanced interactions between multiple organizations during service consumption.
In this paper, a formal approach to inspect privacy and trust in advanced electronic services is presented. It allows to express access and privacy policies of service providers. Also, the privacy properties of multiple authentication technologies are formally modeled. From this, meaningful privacy properties can be extracted based on varying trust assumptions. Feedback is rendered through automated reasoning, useful for both users and system designers. To demonstrate its practicability, the approach is applied to the design of a travel reservation system. |
---|---|
AbstractList | Advanced information processing technologies are often applied to large profiles and result in detailed behavior analysis. Moreover, under the pretext of increased personalization and strong accountability, organizations exchange information to compile even larger profiles. However, the user is unaware about the amount and type of personal data kept in profiles, partially due to advanced interactions between multiple organizations during service consumption.
In this paper, a formal approach to inspect privacy and trust in advanced electronic services is presented. It allows to express access and privacy policies of service providers. Also, the privacy properties of multiple authentication technologies are formally modeled. From this, meaningful privacy properties can be extracted based on varying trust assumptions. Feedback is rendered through automated reasoning, useful for both users and system designers. To demonstrate its practicability, the approach is applied to the design of a travel reservation system. |
Author | De Decker, Bart Lapon, Jorn Decroix, Koen Naessens, Vincent |
Author_xml | – sequence: 1 givenname: Koen surname: Decroix fullname: Decroix, Koen email: Koen.Decroix@kahosl.be organization: Department of Industrial Engineering, Katholieke Hogeschool Sint-Lieven, Ghent, Belgium – sequence: 2 givenname: Jorn surname: Lapon fullname: Lapon, Jorn email: Jorn.Lapon@kahosl.be organization: Department of Industrial Engineering, Katholieke Hogeschool Sint-Lieven, Ghent, Belgium – sequence: 3 givenname: Bart surname: De Decker fullname: De Decker, Bart email: Bart.DeDecker@cs.kuleuven.be organization: iMinds-DistriNet, KU Leuven, Heverlee, Belgium – sequence: 4 givenname: Vincent surname: Naessens fullname: Naessens, Vincent email: Vincent.Naessens@kahosl.be organization: Department of Industrial Engineering, Katholieke Hogeschool Sint-Lieven, Ghent, Belgium |
BookMark | eNo1kNFKAzEQRaNWsK39Ax_yA9FJZjfZfVxKq4WCovU5JNlsXazZktSCf2-s-jRw5nJnOBMyCkPwhNxwuOUA6q5WFUMmC8FQlhJZpTk_I7OMMcMTq87JmEvOGWJRX5DJ_0LAiIwBQbBaFXhFZin1FkRRCV4CjMlzQ5dD_DA72uz3cTDujXZDpKuQ9t4d-rClT7E_GvdFTWjpJn6mA-0DbdqjCc63dLHLsTiE3tEXH4-98-maXHZml_zsb07J63KxmT-w9eP9at6s2Taf5sxK60xhhfKghAPTeadQ-aq0ynoOJUInu7K1bS0N79CXhZFlV4FDX-W0wykRv71pH_OjPmo7DO9Jc9A_1nTWo1FnD_pkSP9Yw29Xg12Q |
ContentType | Book Chapter |
Copyright | Springer-Verlag Berlin Heidelberg 2013 |
Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2013 |
DOI | 10.1007/978-3-642-36563-8_11 |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISBN | 9783642365638 3642365639 |
EISSN | 1611-3349 |
Editor | Scandariato, Riccardo Livshits, Benjamin Jürjens, Jan |
Editor_xml | – sequence: 1 givenname: Jan surname: Jürjens fullname: Jürjens, Jan email: jan.jurjens@cs.tu-dortmund.de – sequence: 2 givenname: Benjamin surname: Livshits fullname: Livshits, Benjamin email: livshits@microsoft.com – sequence: 3 givenname: Riccardo surname: Scandariato fullname: Scandariato, Riccardo email: riccardo.scandariato@cs.kuleuven.be |
EndPage | 170 |
GroupedDBID | -DT -GH -~X 1SB 29L 2HA 2HV 5QI 875 AASHB ABMNI ACGFS ADCXD AEFIE ALMA_UNASSIGNED_HOLDINGS EJD F5P FEDTE HVGLF LAS LDH P2P RIG RNI RSU SVGTG VI1 ~02 |
ID | FETCH-LOGICAL-g1501-b6bca4b27e072c0afec737e85b7be10530f6f5dbd96a1f3e54a65f80c3e80afc3 |
ISBN | 3642365620 9783642365621 |
ISSN | 0302-9743 |
IngestDate | Tue Jul 29 20:03:12 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-g1501-b6bca4b27e072c0afec737e85b7be10530f6f5dbd96a1f3e54a65f80c3e80afc3 |
PageCount | 16 |
ParticipantIDs | springer_books_10_1007_978_3_642_36563_8_11 |
PublicationCentury | 2000 |
PublicationDate | 2013 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – year: 2013 text: 2013 |
PublicationDecade | 2010 |
PublicationPlace | Berlin, Heidelberg |
PublicationPlace_xml | – name: Berlin, Heidelberg |
PublicationSeriesTitle | Lecture Notes in Computer Science |
PublicationSubtitle | 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings |
PublicationTitle | Engineering Secure Software and Systems |
PublicationYear | 2013 |
Publisher | Springer Berlin Heidelberg |
Publisher_xml | – name: Springer Berlin Heidelberg |
RelatedPersons | Kleinberg, Jon M. Mattern, Friedemann Nierstrasz, Oscar Steffen, Bernhard Kittler, Josef Vardi, Moshe Y. Weikum, Gerhard Sudan, Madhu Naor, Moni Mitchell, John C. Terzopoulos, Demetri Pandu Rangan, C. Kanade, Takeo Hutchison, David Tygar, Doug |
RelatedPersons_xml | – sequence: 1 givenname: David surname: Hutchison fullname: Hutchison, David organization: Lancaster University, Lancaster, UK – sequence: 2 givenname: Takeo surname: Kanade fullname: Kanade, Takeo organization: Carnegie Mellon University, Pittsburgh, USA – sequence: 3 givenname: Josef surname: Kittler fullname: Kittler, Josef organization: University of Surrey, Guildford, UK – sequence: 4 givenname: Jon M. surname: Kleinberg fullname: Kleinberg, Jon M. organization: Cornell University, Ithaca, USA – sequence: 5 givenname: Friedemann surname: Mattern fullname: Mattern, Friedemann organization: ETH Zurich, Zurich, Switzerland – sequence: 6 givenname: John C. surname: Mitchell fullname: Mitchell, John C. organization: Stanford University, Stanford, USA – sequence: 7 givenname: Moni surname: Naor fullname: Naor, Moni organization: Weizmann Institute of Science, Rehovot, Israel – sequence: 8 givenname: Oscar surname: Nierstrasz fullname: Nierstrasz, Oscar organization: University of Bern, Bern, Switzerland – sequence: 9 givenname: C. surname: Pandu Rangan fullname: Pandu Rangan, C. organization: Indian Institute of Technology, Madras, India – sequence: 10 givenname: Bernhard surname: Steffen fullname: Steffen, Bernhard organization: University of Dortmund, Dortmund, Germany – sequence: 11 givenname: Madhu surname: Sudan fullname: Sudan, Madhu organization: Massachusetts Institute of Technology, USA – sequence: 12 givenname: Demetri surname: Terzopoulos fullname: Terzopoulos, Demetri organization: University of California, Los Angeles, USA – sequence: 13 givenname: Doug surname: Tygar fullname: Tygar, Doug organization: University of California, Berkeley, USA – sequence: 14 givenname: Moshe Y. surname: Vardi fullname: Vardi, Moshe Y. organization: Rice University, Houston, USA – sequence: 15 givenname: Gerhard surname: Weikum fullname: Weikum, Gerhard organization: Max-Planck Institute of Computer Science, Saarbrücken, Germany |
SSID | ssib024821500 ssib024566521 ssj0002792 ssj0000879996 |
Score | 1.9195492 |
Snippet | Advanced information processing technologies are often applied to large profiles and result in detailed behavior analysis. Moreover, under the pretext of... |
SourceID | springer |
SourceType | Publisher |
StartPage | 155 |
SubjectTerms | electronic services modeling privacy trust |
Title | A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services |
URI | http://link.springer.com/10.1007/978-3-642-36563-8_11 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3Pb9MwFLaq7gIcgAHit3zgVhklseO4Bw4DdRqlTAi6abcodmxUCSWo60Dij-Fv5b3YTjI2IY1L1EZW4_h9ffnyfnwm5JUVjss6d8xVNmFCp3OmM1sxMZc6t_ncqBrjHR-P5dGJWJ7lZ5PJ71HV0sVOvza_ru0r-R-rwjmwK3bJ3sCy_Y_CCfgM9oUjWBiOf5Hfy2HWkM7vlQR91NzOvoBP_VmFjMBYixyZKvDDdtM9aj60Q__Xqvru8-7LdtsMY8EPxXqLt1EGCUPGFUqNe-p9umlMXzUTKp5nh0iBvyG39Z1aWMT4vvHtnDDPT9vND9xfHue3xm6PLtwSyxAWw5Y80YV5p4dizOdvViHdcdzuuiqyWdyRIjqocQQDd5O4FMGIEczZPwS-umYTYH7APvnIXYOHyhi8EXkXab0LlyjMyL0QanDLqZcCDk_41G9VcuXhMa4XgYux7mpMldg6vpcJyZMp2TtYLFen0WNh1liOCFAmFFCoIHjYcQFV4Btlzw1QrtHntfy8sdso3FcWFMj67-mo0_O6SV3J3XeUaH2P3ME2GYr9K2CC-2Rim31yN5qEBpPsk9sjnD4gnw-ohwiNEKEAETpAhAaIUIAI7SBCNw2NEKEDRGiEyENycrhYvztiYVsP9hXWJmVaalMJnRU2KTKTVM6aghdW5brQFug-T5x0ea3ruaxSx20uKpk7lRhuFYw2_BGZNm1jHxNaVylPnbJFYmohuFPGSpEYaQplZJ2IJ2QWl6jEP-p5GVW6YUFLXsKClt2ClrigT280-hm5NYD5OZnuthf2BRDUnX4ZUPIHrMSFnQ |
linkProvider | Library Specific Holdings |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Engineering+Secure+Software+and+Systems&rft.au=Decroix%2C+Koen&rft.au=Lapon%2C+Jorn&rft.au=De+Decker%2C+Bart&rft.au=Naessens%2C+Vincent&rft.atitle=A+Formal+Approach+for+Inspecting+Privacy+and+Trust+in+Advanced+Electronic+Services&rft.series=Lecture+Notes+in+Computer+Science&rft.date=2013-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642365638&rft.issn=0302-9743&rft.eissn=1611-3349&rft.spage=155&rft.epage=170&rft_id=info:doi/10.1007%2F978-3-642-36563-8_11 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0302-9743&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0302-9743&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0302-9743&client=summon |