Towards a Logic of Consent and Revocation

by Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou
Abstract:
Our aim is to provide a mechanism for bridging the gap between data privacy policy languages and high-level requirements. We introduce a logic for reasoning about the dynamics of privacy. In particular, we focus on the semantics of the processes of consent and revocation when applied to the handling and use of personal data. Our logic provides the basis for a formal verification framework for privacy and identity management systems. It is independent of any particular policy description language for privacy preferences and privacy-aware access control, and can be used to verify correctness of policy against requirements specifications, as well as consistency across a policy set. We give examples of how the logic can be used to specify aspects of high-level privacy policies.
Reference:
Towards a Logic of Consent and Revocation (Ioannis Agrafiotis, Sadie Creese, Michael Goldsmith, Nick Papanikolaou), 2010. (Internal Report, EnCoRe Research Project.)
Bibtex Entry:
@MISC{Agrafiotis2010a,
  author = {Ioannis Agrafiotis and Sadie Creese and Michael Goldsmith and Nick
	Papanikolaou},
  title = {Towards a Logic of Consent and Revocation},
  year = {2010},
  note = {Internal Report, EnCoRe Research Project.},
  abstract = {Our aim is to provide a mechanism for bridging the gap between data
	privacy policy languages and high-level requirements. We introduce
	a logic for reasoning about the dynamics of privacy. In particular,
	we focus on the semantics of the processes of consent and revocation
	when applied to the handling and use of personal data. Our logic
	provides the basis for a formal verification framework for privacy
	and identity management systems. It is independent of any particular
	policy description language for privacy preferences and privacy-aware
	access control, and can be used to verify correctness of policy against
	requirements specifications, as well as consistency across a policy
	set. We give examples of how the logic can be used to specify aspects
	of high-level privacy policies.},
  owner = {Nick},
  timestamp = {2010.06.20},
  url = {../files/logic-cr.pdf}
}