DataProVe: A Data Protection Policy and System Architecture Verification Tool.
@article{Ta2020DataProVeAD, title={DataProVe: A Data Protection Policy and System Architecture Verification Tool.}, author={Vinh-Thong Ta}, journal={arXiv: Cryptography and Security}, year={2020} }
In this paper, we propose a tool, called DataProVe, for specifying high-level data protection policies and system architectures, as well as verifying the conformance between them in a fully automated way. The syntax of the policies and the architectures is based on semi-formal languages, and the automated verification engine relies on logic and resolution based proofs. The functionality and operation of the tool are presented using different examples.
Figures and Tables from this paper
One Citation
DataProVe: A Data Protection Policy and System Architecture Verification Tool
- Computer ScienceArXiv
- 2020
A tool, called DataProVe, is proposed for specifying high-level data protection policies and system architectures, as well as verifying the conformance between them in a fully automated way.
References
SHOWING 1-10 OF 49 REFERENCES
The AADL behaviour annex -- experiments and roadmap
- Computer Science12th IEEE International Conference on Engineering Complex Computer Systems (ICECCS 2007)
- 2007
An evaluation of the AADL Behavioural Annex that is currently in evaluation phase is presented and the definition of a semantics for the A ADL execution model is discussed and some enhancements are proposed.
A formal basis for architectural connection
- Computer ScienceTSEM
- 1997
The key idea is to define architectural connectors as explicit semantic entities as a collection of protocols that characterize each of the participant roles in an interaction and how these roles interact.
Privacy by Design: On the Formal Design and Conformance Check of Personal Data Protection Policies and Architectures
- Computer Science
- 2015
This paper proposes a (semi-)formal approach for specifying and reasoning about data protection policies and architectures as well as defining conformance relations between architectures and policies, and provides a framework for mathematically sound conformance checks against the current data protection regulations.
A Survey on Privacy Policy Languages: Expressiveness Concerning Data Protection Regulations
- Computer Science2019 12th CMI Conference on Cybersecurity and Privacy (CMI)
- 2019
A survey compares 18 policy languages that can be used in the context of privacy policies and focuses on compatibility with legislation like the General Data Protection Regulation of the European Union and the formalization of such language.
A model-based approach to support privacy compliance
- Computer ScienceInf. Comput. Secur.
- 2018
The authors demonstrate the usefulness and applicability of the extension mechanisms in specifying key aspects of privacy principles as assumptions and requirements, as well as in providing criteria for the evaluation of these aspects to assess whether the model meets these requirements.
Some Preliminary Comments on the DIRECTIVE 95/46/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data.
- Political Science
- 1996
(1) Whereas the objectives of the Community, as laid down in the Treaty, as amended by the Treaty on European Union, include creating an ever closer union among the peoples of Europe, fostering…
Privacy Enhanced Secure Tropos : A Privacy Modeling Language for GDPR Compliance
- Computer Science
- 2018
Privacy Enhanced Secure Tropos (PESTOS) is emerging as a privacy modeling language based on Tropos methodology, which covers the goal and rule perspective, for helping software engineers by assessing candidate PETs, while designing privacy-aware systems, in order to make them compatible with GDPR.
The General Data Protection Regulation (GDPR)
- LawIrish medical journal
- 2018
The General Data Protection Regulation (GDPR) will replace the current existing EU Data Protection Directive 95/46/EC and will be directly applicable in all Member States without the need for…
Log Analysis for Data Protection Accountability
- Computer ScienceFM
- 2014
It is shown that compliance with respect to data protection policies can be checked based on logs free of personal data, and the integration of the formal framework for accountability in a global accountability process is described.