FROM HIPPOCRATIC DATABASES TO SECURE TROPOS: A COMPUTER-AIDED RE-ENGINEERING APPROACH
Abstract
Privacy protection is a growing concern in the marketplace. Yet, privacy requirements and mechanisms are usually retro-fitted into a pre-existing design which may not be able to accommodate them due to potential conflicts with functional requirements.
We propose a procedure for automatically extracting privacy requirements from databases supporting access control mechanisms for personal data (hereafter Hippocratic databases) and representing them in the Secure Tropos framework where tools are available for checking the correctness and consistency of privacy requirements. The procedure is illustrated with a case study.
References
-
S. Abiteboul , R. Hull and V. Vianu , Foundations of Databases ( Addison-Wesley ) . Google Scholar - CSUR 21(4), 515 (1989), DOI: 10.1145/76894.76895. Web of Science, Google Scholar
R. Agrawal , Hippocratic databases, Proc. VLDB '02 (Morgan Kaufmann, 2002) pp. 143–154. Google Scholar- A. I. Antón, D. Bolchini, and Q. He, The Use of Goals to Extract Privacy and Security Requirements from Policy Statements, Technical Report TR-2003-17, NCSU Computer Science, September 2003 . Google Scholar
- Requirements Eng. J. 9(3), 169 (2004). Web of Science, Google Scholar
M. Backes , Efficient comparison of enterprise privacy policies, Proc. SAC '04 (ACM Press, 2004) pp. 375–382, DOI: 10.1145/967900.967983. Google ScholarM. Backes , B. Pfitzmann and M. Schunter , A toolkit for managing enterprise privacy policies, Proc. ESORICS '03,LNCS 2808 (Springer, 2003) pp. 162–180. Google Scholar- D. E. Bell and L. J. LaPadula, Secure Computer System: Unified Exposition and MULTICS Interpretation, Technical Report MTR-2997 Rev. 1, The MITRE Corporation, Bedford, MA, 1976 . Google Scholar
- JAAMAS 8(3), 203 (2004). Web of Science, Google Scholar
- J.-W. Byun, E. Bertino, and N. Li, Purpose-Based Access Control for Privacy Protection in Relational Database Systems, Technical Report 2004-52, Purdue University, 2004 . Google Scholar
J.-W. Byun , E. Bertino and N. Li , Purpose based access control of complex data for privacy protection, Proc. SACMAT '05 (ACM Press, 2005) pp. 102–110, DOI: 10.1145/1063979.1063998. Google Scholar- L. Cranor, M. Langheinrich, M. Marchiori, and J. Reagle, The Platform for Privacy Preferences 1.0 (P3P1.0) Specification, W3C Recommendation, April 2002 . Google Scholar
T. Dell'Armi , Aggregate functions in disjunctive logic programming: Semantics, complexity, and implementation in DLV, Proc. IJCAI '03 (Morgan Kaufmann, 2003) pp. 847–852. Google ScholarD. Downs , Issues in discretionary access control, Proc. Symp. on Sec. and Privacy (IEEE Press, 1985) pp. 208–218. Google ScholarP. Giorgini , Filling the gap between requirements engineering and public key/trust management infrastructures, Proc. EuroPKI '04,LNCS 3093 (Springer, 2004) pp. 98–111. Google ScholarP. Giorgini , Requirements engineering meets trust management: Model, methodology, and reasoning, Proc. iTrust '04,LNCS 2995 (Springer, 2004) pp. 176–190. Google ScholarP. Giorgini , Modelling social and individual trust in requirements engineering methodologies, Proc. iTrust '05,LNCS 3477 (Springer, 2005) pp. 161–176. Google ScholarQ. He and A. I. Antón , A framework for modeling privacy requirements in role engineering, Proc. REFSQ'03 (2003) pp. 137–146. Google ScholarG. Karjoth , M. Schunter and M. Waidner , Platform for enterprise privacy practices: Privacy-enabled management of customer data, Proc. PET '02,LNCS 2482 (Springer, 2002) pp. 69–84. Google ScholarK. LeFevre , Limiting disclosure in hippocratic databases, Proc. VLDB '04 (Morgan Kaufmann, 2004) pp. 108–119. Google ScholarL. Liu , E. S. K. Yu and J. Mylopoulos , Security and privacy requirements analysis within a social setting, Proc. RE '03 (IEEE Press, 2003) pp. 151–161. Google Scholar- The VLDB J. (2006). Google Scholar
- Comp. Standards & Interfaces 27(5), 445 (2005). Web of Science, Google Scholar
-
F. Massacci and N. Zannone , Privacy is linking permission to purpose , Proc. 12th Int. Workshop on Sec. Protocols ( 2004 ) . Google Scholar C. S. Powers , P. Ashley and M. Schunter , Privacy promises, access control, and privacy management: Enforcing privacy throughout an enterprise by extending access control, Proc. ISEC '02 (IEEE Press, 2002) pp. 13–21, DOI: 10.1109/ISEC.2002.1166906. Google Scholar- IEEE Comp. 29(2), 38 (1996), DOI: 10.1109/2.485845. Web of Science, Google Scholar
A. van Lamsweerde , From system goals to intruder anti-goals: Attack generation and resolution for security requirements engineering, Proc. RHAS '03 (2003) pp. 49–56. Google Scholar