Privacy by Design: On the Conformance Between Protocols and Architectures
- Submitting institution
-
University of Central Lancashire
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 13624
- Type
- E - Conference contribution
- DOI
-
10.1007/978-3-319-17040-4_5
- Title of conference / published proceedings
- Foundations and Practice of Security. FPS 2014. Lecture Notes in Computer Science
- First page
- 65
- Volume
- 8930
- Issue
- -
- ISSN
- 0302-9743
- Open access status
- Out of scope for open access requirements
- Month of publication
- April
- Year of publication
- 2015
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
1
- Research group(s)
-
-
- Citation count
- 2
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This paper contains a very strong mathematical concept; whilst addressing a practical problem. It proposes the first ever mathematical approach to verify the conformance between a high-level system architecture and a very detailed system implementation with regards to privacy and security properties, which is crucial in system design. This paper provides accurate mapping of the two system levels, which is very challenging, as system architectures are very abstract compared to system implementations. This approach facilitates automated proofs of the conformance properties (e.g., in DataProVe: https://sites.google.com/view/dataprove/), which can be used by businesses to verify their designed systems’ privacy properties.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -