• Corpus ID: 47019134

A Logical Framework for Verifying Privacy Breaches of Social Networks

  title={A Logical Framework for Verifying Privacy Breaches of Social Networks},
  author={N{\'e}stor Cata{\~n}o},
We present a novel approach to deal with transitivity permission-delegation threats that arise in social networks when content is granted permissions by third-party users thereby breaking the privacy policy of the content owner. These types of privacy breaches are often unintentional in social networks like Facebook, and hence, (more) in-place mechanisms are needed to make social network users aware of the consequences of changing their privacy policies. Our approach is unique in its use of… 

Figures and Tables from this paper


Privacy Protection for Social Networking APIs
This work addresses the privacy risks associated with social networking APIs by presenting a privacy-by-proxy design for a privacypreserving API that is motivated by an analysis of the data needs and uses of Facebook applications.
Privacy suites: shared privacy for social networks
A new paradigm is proposed which allows users to easily choose "suites" of privacy settings which have been specified by friends or trusted experts, only modifying them if they wish, which could dramatically increase the privacy protection that most users experience with minimal time investment.
Inferring privacy policies for social networking services
A machine learning approach is used to extract automatically privacy settings based on the policy that information produced within a social context should remain in that social context, both to ensure privacy as well as maximising utility.
Information revelation and privacy in online social networks
This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.
Efficient comparison of enterprise privacy policies
A practical algorithm is presented, concentrating on those aspects that make refinement of privacy policies more difficult than, for example refinement for access control policies, such as a more sophisticated treatment of deny rules and a suitable way for dealing with obligations and conditions on context information.
Understanding and capturing people’s privacy policies in a mobile social networking application
This article reports on the work on PeopleFinder, an application that enables cell phone and laptop users to selectively share their locations with others, and explores technologies that empower users to more effectively and efficiently specify their privacy preferences.
Formal Methods for Privacy
It is argued technology's dual role in privacy: new technologies raise new threats to privacy rights and new technologies can help preserve privacy, which raises new challenges and thus new research opportunities for the formal methods community.
Security policy compliance with violation management
This paper formally defines conditions to be satisfied by an information system to comply with its security policy and presents a proof-based approach to check if these conditions are enforced.
A Theory of Expressiveness in Mechanisms
A theory that ties the expressiveness of mechanisms to their efficiency in a domain-independent manner and derives an upper bound on the expected efficiency of any mechanism under its most efficient Nash equilibrium, which depends only on the mechanism's expressiveness.