Samenvatting
Nowadays, repurposing of personal data is a major privacy issue. Detection of data repurposing requires posteriori mechanisms able to determine how data have been processed. However, current a posteriori solutions for privacy compliance are often manual, leading infringements to remain undetected. In this paper, we propose a privacy compliance technique for detecting privacy infringements and measuring their severity. The approach quantifies infringements by considering a number of deviations from specifications (i.e., insertion, suppression, replacement, and re-ordering).
Originele taal-2 | Engels |
---|---|
Titel | Business Process Management (10th International Conference, BPM 2012, Tallinn, Estonia, September 3-6, 2012. Proceedings) |
Redacteuren | A. Barros, A. Gal, E. Kindler |
Plaats van productie | Berlin |
Uitgeverij | Springer |
Pagina's | 114-119 |
ISBN van geprinte versie | 978-3-642-32884-8 |
DOI's | |
Status | Gepubliceerd - 2012 |
Evenement | 10th International Conference on Business Process Management (BPM 2012) - Tallinn, Estland Duur: 3 sep. 2012 → 6 sep. 2012 Congresnummer: 10 |
Publicatie series
Naam | Lecture Notes in Computer Science |
---|---|
Volume | 7481 |
ISSN van geprinte versie | 0302-9743 |
Congres
Congres | 10th International Conference on Business Process Management (BPM 2012) |
---|---|
Verkorte titel | BPM 2012 |
Land/Regio | Estland |
Stad | Tallinn |
Periode | 3/09/12 → 6/09/12 |
Ander | 10th International Conference on Business Process Management (BPM 2012) |