Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models

Haruhiko Kaiya, Nobukazu Yoshioka, Takao Okubo, Hironori Washizaki, Atsuo Hazeyama

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

An information system can store personal information of its primary users such as shopping histories, and some third party wants or happens to know such information. Because the system usually provides its privacy policy and its users have to give their consent to it, they sometimes have to partially give up the protection of their privacy. On the other hand, a chance of a third party to know such information is too limited if the policy is too defensive. We proposed a method to explore trade-offs between protection of such information and access permissions for a third party, and exemplified it. In this method, operation logs of a system are focused. The structure of each log is then modelled for analysing what kinds of information can be accessed by a third party. Access limitations of each third party are explored so as to balance the protection of privacy information against access right of third parties.

Original languageEnglish
Title of host publicationFrontiers in Artificial Intelligence and Applications
EditorsHamido Fujita, George Angelos Papadopoulos
PublisherIOS Press BV
Pages155-166
Number of pages12
ISBN (Electronic)9781614996736
DOIs
Publication statusPublished - 2016
Event15th International Conference on New Trends in Intelligent Software Methodology Tools, and Techniques, SoMeT 2016 - Larnaca, Cyprus
Duration: 2016 Sept 132016 Sept 15

Publication series

NameFrontiers in Artificial Intelligence and Applications
Volume286
ISSN (Print)0922-6389

Conference

Conference15th International Conference on New Trends in Intelligent Software Methodology Tools, and Techniques, SoMeT 2016
Country/TerritoryCyprus
CityLarnaca
Period16/9/1316/9/15

Keywords

  • Access Control
  • Case Grammar
  • Class Diagram
  • Privacy Requirements Analysis
  • Use Cases

ASJC Scopus subject areas

  • Artificial Intelligence

Fingerprint

Dive into the research topics of 'Requirements Analysis for Privacy Protection and Third Party Awareness Using Logging Models'. Together they form a unique fingerprint.

Cite this