[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2677855.2677929acmotherconferencesArticle/Chapter ViewAbstractPublication PagesictcsConference Proceedingsconference-collections
research-article

Formal Specification of a Privacy Aware Access Control Framework in Web Services Paradigm using Z Notation

Published: 27 October 2014 Publication History

Abstract

In web services paradigm, multiple heterogeneous web services collaborate to carry out the complex functionality demanded by the users. While using these services, privacy preservation is the major concern for users. Safeguarding their personally identifiable information (PII) from unauthorized usage is the top most priority of service providers in order to survive in the highly competitive market. Like other areas of digital life, preserving privacy is also a prominent concern in healthcare services. The patients' sensitive PII in online services is more at the risk of disclosure without their consent. Currently privacy policy enforcement is done manually in such scenarios, which increases the risk of inadvertent disclosure of the stored PII. This paper is the first step towards automation of privacy policies and laws enforcement in traditional access control frameworks through formal specification of web services in Z notation.

References

[1]
R. M. Sreenath and M.P. Singh, "Agent-based Service Selection," Journal of Web Semantics: Science, Services and Agents on the World Wide Web, vol. 1, no. 3, pp. 261--279, 2004.
[2]
X. Zhang, S. Oh and R. Sandhu, "PBDM: a flexible delegation model in RBAC," In proceedings of the eighth ACM Symposium on Access control models and technologies (SACMAT ), New York, NY, USA, pp. 149--157, 2003.
[3]
Néstor Cataño, Sorren Hanvey, and Camilo Rueda, "Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies", TOOLS 50, Lecture Notes in Computer Science, Springer, vol. 7304 pp. 9--16, 2012.
[4]
J. M. Spivey, The Z Notation: A Reference Manual. Upper Saddle River, NJ, USA: Prentice-Hall, Inc., 1989.
[5]
C. B. Jones. Systematic Software Development Using VDM. Prentice-Hall International, 1986.
[6]
Burdy, Cheon, Cok, Ernst, Kiniry, Leavens, Leino and Poll, An overview of JML tools and applications. In International Journal on Software Tools for Technology Transfer pp. 212--232, 2005.
[7]
C.A.R, Hoare, Communicating Sequential Processes. Prentice Hall Intl., 1st edition 1985, new edition. Jim Davies, 2004.
[8]
J. R. Abrial, The B-Book: Assigning Programs to Meanings. Cambridge University Press, 1996.
[9]
Jeremy Bryans & John Fitzgerald (2007): Formal Engineering of XACML Access Control Policies in VDM++. In Michael Butler, Michael Hinchey & Maríía Larrondo-Petrie, editors: Formal Methods and Software Engineering, Lecture Notes in Computer Science 4789, Springer Berlin / Heidelberg, pp. 37--56.Available at http://dx.doi.org/10.1007/978-3-540-76650-6_4.
[10]
M. Saaltink, "The Z/EVES System," in ZUM '97: The Z Formal Specification Notation, J. Bowen, M. Hinchey, and D. Till, Eds., pp. 72--85, 1997.
[11]
R. Bhatia and M. Singh, "Preserving Privacy In Health Care Web Services Paradigm Through Hippocratic Databases," Springer Book Series Advances in Intelligent Systems and Computing, Volume 308, pp 177--188, 2014.
[12]
Agrawal, R., Kiernan, J., Srikant, R. and Xu, Y. 2002, "Hippocratic databases". In Proceedings of Very Large Data Base, Hong Kong, China, pp 143--154.

Cited By

View all
  • (2021)Security and Privacy Requirements for Electronic ConsentACM Transactions on Computing for Healthcare10.1145/34339952:2(1-24)Online publication date: 22-Mar-2021

Index Terms

  1. Formal Specification of a Privacy Aware Access Control Framework in Web Services Paradigm using Z Notation

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      ICTCS '14: Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies
      November 2014
      559 pages
      ISBN:9781450332163
      DOI:10.1145/2677855
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      In-Cooperation

      • Computer Society of India: Computer Society of India

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Access Control
      2. Formal Specification
      3. Privacy
      4. Web Services
      5. Z Notation

      Qualifiers

      • Research-article
      • Research
      • Refereed limited

      Conference

      ICTCS '14

      Acceptance Rates

      ICTCS '14 Paper Acceptance Rate 97 of 270 submissions, 36%;
      Overall Acceptance Rate 97 of 270 submissions, 36%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Security and Privacy Requirements for Electronic ConsentACM Transactions on Computing for Healthcare10.1145/34339952:2(1-24)Online publication date: 22-Mar-2021

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media