• Corpus ID: 225248914

DataProVe: A Data Protection Policy and System Architecture Verification Tool.

@article{Ta2020DataProVeAD,
  title={DataProVe: A Data Protection Policy and System Architecture Verification Tool.},
  author={Vinh-Thong Ta},
  journal={arXiv: Cryptography and Security},
  year={2020}
}
  • Vinh-Thong Ta
  • Published 20 August 2020
  • Computer Science
  • arXiv: Cryptography and Security
In this paper, we propose a tool, called DataProVe, for specifying high-level data protection policies and system architectures, as well as verifying the conformance between them in a fully automated way. The syntax of the policies and the architectures is based on semi-formal languages, and the automated verification engine relies on logic and resolution based proofs. The functionality and operation of the tool are presented using different examples. 
1 Citations

DataProVe: A Data Protection Policy and System Architecture Verification Tool

A tool, called DataProVe, is proposed for specifying high-level data protection policies and system architectures, as well as verifying the conformance between them in a fully automated way.

References

SHOWING 1-10 OF 49 REFERENCES

The AADL behaviour annex -- experiments and roadmap

An evaluation of the AADL Behavioural Annex that is currently in evaluation phase is presented and the definition of a semantics for the A ADL execution model is discussed and some enhancements are proposed.

A formal basis for architectural connection

The key idea is to define architectural connectors as explicit semantic entities as a collection of protocols that characterize each of the participant roles in an interaction and how these roles interact.

Privacy by Design: On the Formal Design and Conformance Check of Personal Data Protection Policies and Architectures

This paper proposes a (semi-)formal approach for specifying and reasoning about data protection policies and architectures as well as defining conformance relations between architectures and policies, and provides a framework for mathematically sound conformance checks against the current data protection regulations.

A Survey on Privacy Policy Languages: Expressiveness Concerning Data Protection Regulations

  • Jens LeichtM. Heisel
  • Computer Science
    2019 12th CMI Conference on Cybersecurity and Privacy (CMI)
  • 2019
A survey compares 18 policy languages that can be used in the context of privacy policies and focuses on compatibility with legislation like the General Data Protection Regulation of the European Union and the formalization of such language.

A model-based approach to support privacy compliance

The authors demonstrate the usefulness and applicability of the extension mechanisms in specifying key aspects of privacy principles as assumptions and requirements, as well as in providing criteria for the evaluation of these aspects to assess whether the model meets these requirements.

Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.

(1) Whereas the objectives of the Community, as laid down in the Treaty, as amended by the Treaty on European Union, include creating an ever closer union among the peoples of Europe, fostering

Privacy Enhanced Secure Tropos : A Privacy Modeling Language for GDPR Compliance

Privacy Enhanced Secure Tropos (PESTOS) is emerging as a privacy modeling language based on Tropos methodology, which covers the goal and rule perspective, for helping software engineers by assessing candidate PETs, while designing privacy-aware systems, in order to make them compatible with GDPR.

The General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) will replace the current existing EU Data Protection Directive 95/46/EC and will be directly applicable in all Member States without the need for

Log Analysis for Data Protection Accountability

It is shown that compliance with respect to data protection policies can be checked based on logs free of personal data, and the integration of the formal framework for accountability in a global accountability process is described.