首页 > 最新文献

2015 IEEE Security and Privacy Workshops最新文献

英文 中文
Verification State-Space Reduction through Restricted Parsing Environments 通过限制解析环境减少验证状态空间
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.30
Jacob I. Torrey, Mark P. Bridgman
We discuss the potential for significant reduction in size and complexity of verification tasks for input-handling software when such software is constructed according to Lang Sec principles, i.e., Is designed as a recognizer for a particular language of valid inputs and is compiled for a suitably limited computational model no stronger than needed for the recognition task. We introduce Crema, a programming language and restricted execution environment of sub-Turing power, and conduct a case study to estimate and compare the respective sizes of verification tasks for the qmail SMTP parsing code fragments when executed natively vs in Crema -- using LLVM and KLEE. We also study the application of the same principles to the verification of reference monitors.
当输入处理软件根据Lang Sec原则构建时,我们讨论了显著减少输入处理软件验证任务的大小和复杂性的潜力,即,设计为有效输入的特定语言的识别器,并为不强于识别任务所需的适当有限的计算模型进行编译。本文介绍了基于子图灵能力的编程语言和受限执行环境Crema,并利用LLVM和KLEE对qmail SMTP解析代码片段在本地执行和在Crema中执行时的验证任务大小进行了估算和比较。我们还研究将同样的原则应用于对参考监测员的核查。
{"title":"Verification State-Space Reduction through Restricted Parsing Environments","authors":"Jacob I. Torrey, Mark P. Bridgman","doi":"10.1109/SPW.2015.30","DOIUrl":"https://doi.org/10.1109/SPW.2015.30","url":null,"abstract":"We discuss the potential for significant reduction in size and complexity of verification tasks for input-handling software when such software is constructed according to Lang Sec principles, i.e., Is designed as a recognizer for a particular language of valid inputs and is compiled for a suitably limited computational model no stronger than needed for the recognition task. We introduce Crema, a programming language and restricted execution environment of sub-Turing power, and conduct a case study to estimate and compare the respective sizes of verification tasks for the qmail SMTP parsing code fragments when executed natively vs in Crema -- using LLVM and KLEE. We also study the application of the same principles to the verification of reference monitors.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125312198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Protection Goals for Privacy Engineering 隐私工程的保护目标
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.13
M. Hansen, Meiko Jensen, M. Rost
Six protection goals provide a common scheme for addressing the legal, technical, economic, and societal dimensions of privacy and data protection in complex IT systems. In this paper, each of these is analyzed for state of the art in implementation, existing techniques and technologies, and future research indications.
六个保护目标为解决复杂IT系统中隐私和数据保护的法律、技术、经济和社会方面的问题提供了一个通用方案。在本文中,每一个都分析了在实施的艺术状态,现有的技术和技术,以及未来的研究指示。
{"title":"Protection Goals for Privacy Engineering","authors":"M. Hansen, Meiko Jensen, M. Rost","doi":"10.1109/SPW.2015.13","DOIUrl":"https://doi.org/10.1109/SPW.2015.13","url":null,"abstract":"Six protection goals provide a common scheme for addressing the legal, technical, economic, and societal dimensions of privacy and data protection in complex IT systems. In this paper, each of these is analyzed for state of the art in implementation, existing techniques and technologies, and future research indications.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132176423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
Privacy Threats and Practical Solutions for Genetic Risk Tests 基因风险测试的隐私威胁和实用解决方案
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.12
Ludovic Barman, Mohammed Taha Elgraini, J. Raisaro, J. Hubaux, Erman Ayday
Recently, several solutions have been proposed to address the complex challenge of protecting individuals' genetic data during personalized medicine tests. In this short paper, we analyze different privacy threats and propose simple countermeasures for the generic architecture mainly used in the literature. In particular, we present and evaluate a new practical solution against a critical attack of a malicious medical center trying to actively infer raw genetic information of patients.
最近,已经提出了几种解决方案,以解决在个性化医学测试中保护个人基因数据的复杂挑战。在这篇短文中,我们分析了不同的隐私威胁,并针对文献中主要使用的通用架构提出了简单的对策。特别是,我们提出并评估了针对恶意医疗中心试图积极推断患者原始遗传信息的关键攻击的新的实用解决方案。
{"title":"Privacy Threats and Practical Solutions for Genetic Risk Tests","authors":"Ludovic Barman, Mohammed Taha Elgraini, J. Raisaro, J. Hubaux, Erman Ayday","doi":"10.1109/SPW.2015.12","DOIUrl":"https://doi.org/10.1109/SPW.2015.12","url":null,"abstract":"Recently, several solutions have been proposed to address the complex challenge of protecting individuals' genetic data during personalized medicine tests. In this short paper, we analyze different privacy threats and propose simple countermeasures for the generic architecture mainly used in the literature. In particular, we present and evaluate a new practical solution against a critical attack of a malicious medical center trying to actively infer raw genetic information of patients.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122670835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Reviewing for Privacy in Internet and Web Standard-Setting 互联网隐私与网络标准制定综述
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.18
Nick Doty
The functionality of the Internet and the World Wide Web is determined in large part by the standards that allow for interoperable implementations, as a result, the privacy of our online interactions depends on the work done within standard-setting organizations. But how do the organizational structure and processes of these multistake holder groups affect the engineering of values such as privacy? This paper reviews the history of considerations for security and privacy in Internet and Web standard-setting, the impact of Snowden surveillance revelations and reactions to them, and some trends in how we review for privacy in Internet and Web standards.
互联网和万维网的功能在很大程度上取决于允许互操作实现的标准,因此,我们在线交互的隐私取决于标准制定组织所做的工作。但是,这些多利益相关者群体的组织结构和流程如何影响隐私等价值观的工程?本文回顾了互联网和Web标准制定中对安全和隐私的考虑的历史,斯诺登监控披露的影响及其反应,以及我们如何审查互联网和Web标准中的隐私的一些趋势。
{"title":"Reviewing for Privacy in Internet and Web Standard-Setting","authors":"Nick Doty","doi":"10.1109/SPW.2015.18","DOIUrl":"https://doi.org/10.1109/SPW.2015.18","url":null,"abstract":"The functionality of the Internet and the World Wide Web is determined in large part by the standards that allow for interoperable implementations, as a result, the privacy of our online interactions depends on the work done within standard-setting organizations. But how do the organizational structure and processes of these multistake holder groups affect the engineering of values such as privacy? This paper reviews the history of considerations for security and privacy in Internet and Web standard-setting, the impact of Snowden surveillance revelations and reactions to them, and some trends in how we review for privacy in Internet and Web standards.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128037898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws 协议状态机和会话语言:规范、实现和安全缺陷
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.32
E. Poll, Joeri de Ruiter, Aleksy Schubert
Input languages, which describe the set of valid inputs an application has to handle, play a central role in language-theoretic security, in recognition of the fact that overly complex, sloppily specified, or incorrectly implemented input languages are the root cause of many security vulnerabilities. Often an input language not only involves a language of individual messages, but also some protocol with a notion of a session, i.e. A sequence of messages that makes up a dialogue between two parties. This paper takes a closer look at languages for such sessions, when it comes to specification, implementation, and testing - and as a source of insecurity. We show that these 'session' languages are often poorly specified and that errors in implementing them can cause security problems. As a way to improve this situation, we discuss the possibility to automatically infer formal specifications of such languages, in the form of protocol state machines, from implementations by black box testing.
输入语言描述了应用程序必须处理的一组有效输入,它在语言理论安全性中起着核心作用,因为人们认识到,过于复杂、指定不严谨或实现不正确的输入语言是许多安全漏洞的根本原因。通常,输入语言不仅涉及单个消息的语言,还涉及具有会话概念的协议,即组成双方之间对话的消息序列。本文将深入研究用于此类会议的语言,当涉及到规范、实现和测试时,以及作为不安全的来源。我们指出,这些“会话”语言通常没有得到很好的指定,并且在实现它们时出现的错误可能会导致安全问题。作为改善这种情况的一种方法,我们讨论了通过黑盒测试从实现中以协议状态机的形式自动推断这些语言的正式规范的可能性。
{"title":"Protocol State Machines and Session Languages: Specification, implementation, and Security Flaws","authors":"E. Poll, Joeri de Ruiter, Aleksy Schubert","doi":"10.1109/SPW.2015.32","DOIUrl":"https://doi.org/10.1109/SPW.2015.32","url":null,"abstract":"Input languages, which describe the set of valid inputs an application has to handle, play a central role in language-theoretic security, in recognition of the fact that overly complex, sloppily specified, or incorrectly implemented input languages are the root cause of many security vulnerabilities. Often an input language not only involves a language of individual messages, but also some protocol with a notion of a session, i.e. A sequence of messages that makes up a dialogue between two parties. This paper takes a closer look at languages for such sessions, when it comes to specification, implementation, and testing - and as a source of insecurity. We show that these 'session' languages are often poorly specified and that errors in implementing them can cause security problems. As a way to improve this situation, we discuss the possibility to automatically infer formal specifications of such languages, in the form of protocol state machines, from implementations by black box testing.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127850378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Genomic Privacy Metrics: A Systematic Comparison 基因组隐私度量:一个系统的比较
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.15
Isabel Wagner
The human genome uniquely identifies, and contains highly sensitive information about, individuals. This creates a high potential for misuse of genomic data (e.g., Genetic discrimination). This paper investigates how genomic privacy can be measured in scenarios where an adversary aims to infer a person's genome by constructing probability distributions on the values of genetic variations. Specifically, we investigate 22 privacy metrics using adversaries of different strengths, and uncover problems with several metrics that have previously been used for genomic privacy. We then give suggestions on metric selection, and illustrate the process with a case study on Alzheimer's disease.
人类基因组独特地识别并包含有关个体的高度敏感信息。这就产生了滥用基因组数据(例如,基因歧视)的高可能性。本文研究了在对手旨在通过构建遗传变异值的概率分布来推断一个人的基因组的情况下,如何测量基因组隐私。具体而言,我们使用不同优势的对手调查了22个隐私指标,并发现了先前用于基因组隐私的几个指标的问题。然后,我们给出了度量选择的建议,并以阿尔茨海默病的案例研究说明了这一过程。
{"title":"Genomic Privacy Metrics: A Systematic Comparison","authors":"Isabel Wagner","doi":"10.1109/SPW.2015.15","DOIUrl":"https://doi.org/10.1109/SPW.2015.15","url":null,"abstract":"The human genome uniquely identifies, and contains highly sensitive information about, individuals. This creates a high potential for misuse of genomic data (e.g., Genetic discrimination). This paper investigates how genomic privacy can be measured in scenarios where an adversary aims to infer a person's genome by constructing probability distributions on the values of genetic variations. Specifically, we investigate 22 privacy metrics using adversaries of different strengths, and uncover problems with several metrics that have previously been used for genomic privacy. We then give suggestions on metric selection, and illustrate the process with a case study on Alzheimer's disease.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114933849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Privacy Principles for Sharing Cyber Security Data 共享网络安全数据的隐私原则
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.23
Gina Fisk, Calvin Ardi, Neale Pickett, J. Heidemann, M. Fisk, C. Papadopoulos
Sharing cyber security data across organizational boundaries brings both privacy risks in the exposure of personal information and data, and organizational risk in disclosing internal information. These risks occur as information leaks in network traffic or logs, and also in queries made across organizations. They are also complicated by the trade-offs in privacy preservation and utility present in anonymization to manage disclosure. In this paper, we define three principles that guide sharing security information across organizations: Least Disclosure, Qualitative Evaluation, and Forward Progress. We then discuss engineering approaches that apply these principles to a distributed security system. Application of these principles can reduce the risk of data exposure and help manage trust requirements for data sharing, helping to meet our goal of balancing privacy, organizational risk, and the ability to better respond to security with shared information.
跨组织边界的网络安全数据共享既带来了个人信息和数据暴露的隐私风险,也带来了内部信息披露的组织风险。这些风险发生在网络流量或日志中的信息泄漏,以及跨组织的查询中。在隐私保护和管理披露的匿名化中存在的效用之间的权衡也使它们变得复杂。在本文中,我们定义了指导跨组织共享安全信息的三个原则:最少披露、定性评估和向前进展。然后我们讨论将这些原理应用于分布式安全系统的工程方法。这些原则的应用可以降低数据暴露的风险,帮助管理数据共享的信任需求,帮助实现平衡隐私、组织风险和更好地响应共享信息安全性的能力的目标。
{"title":"Privacy Principles for Sharing Cyber Security Data","authors":"Gina Fisk, Calvin Ardi, Neale Pickett, J. Heidemann, M. Fisk, C. Papadopoulos","doi":"10.1109/SPW.2015.23","DOIUrl":"https://doi.org/10.1109/SPW.2015.23","url":null,"abstract":"Sharing cyber security data across organizational boundaries brings both privacy risks in the exposure of personal information and data, and organizational risk in disclosing internal information. These risks occur as information leaks in network traffic or logs, and also in queries made across organizations. They are also complicated by the trade-offs in privacy preservation and utility present in anonymization to manage disclosure. In this paper, we define three principles that guide sharing security information across organizations: Least Disclosure, Qualitative Evaluation, and Forward Progress. We then discuss engineering approaches that apply these principles to a distributed security system. Application of these principles can reduce the risk of data exposure and help manage trust requirements for data sharing, helping to meet our goal of balancing privacy, organizational risk, and the ability to better respond to security with shared information.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127367201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Extending the Power of Consent with User-Managed Access: A Standard Architecture for Asynchronous, Centralizable, Internet-Scalable Consent 通过用户管理访问扩展同意的权力:异步、集中化、互联网可扩展同意的标准体系结构
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.34
Eve Maler
The inherent weaknesses of existing notice-and-consent paradigms of data privacy are becoming clear, not just to privacy practitioners but to ordinary online users as well. The corporate privacy function is a maturing discipline, but greater maturity often equates just to greater regulatory compliance. At a time when many users are disturbed by the status quo, new trends in web security and data sharing are demonstrating useful new consent paradigms. Benefiting from these trends, the emerging standard User-Managed Access (UMA) allows apps to extend the power of consent. UMA corrects a power imbalance that favors companies over individuals, enabling privacy solutions that move beyond compliance.
不仅对隐私从业者而言,对普通在线用户而言,现有的“通知-同意”数据隐私范式的固有弱点正变得越来越明显。企业隐私功能是一门成熟的学科,但更成熟往往等同于更严格的法规遵从性。当许多用户对现状感到不安时,网络安全和数据共享的新趋势正在展示有用的新同意范例。受益于这些趋势,新兴的标准用户管理访问(UMA)允许应用程序扩展同意的权力。UMA纠正了有利于公司而不是个人的权力不平衡,使隐私解决方案超越了合规性。
{"title":"Extending the Power of Consent with User-Managed Access: A Standard Architecture for Asynchronous, Centralizable, Internet-Scalable Consent","authors":"Eve Maler","doi":"10.1109/SPW.2015.34","DOIUrl":"https://doi.org/10.1109/SPW.2015.34","url":null,"abstract":"The inherent weaknesses of existing notice-and-consent paradigms of data privacy are becoming clear, not just to privacy practitioners but to ordinary online users as well. The corporate privacy function is a maturing discipline, but greater maturity often equates just to greater regulatory compliance. At a time when many users are disturbed by the status quo, new trends in web security and data sharing are demonstrating useful new consent paradigms. Benefiting from these trends, the emerging standard User-Managed Access (UMA) allows apps to extend the power of consent. UMA corrects a power imbalance that favors companies over individuals, enabling privacy solutions that move beyond compliance.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132885498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations 基于高阶SNV相关性的推理攻击量化基因组隐私
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.21
Sahel Shariati Samani, Zhicong Huang, Erman Ayday, M. Elliot, J. Fellay, J. Hubaux, Z. Kutalik
As genomic data becomes widely used, the problem of genomic data privacy becomes a hot interdisciplinary research topic among geneticists, bioinformaticians and security and privacy experts. Practical attacks have been identified on genomic data, and thus break the privacy expectations of individuals who contribute their genomic data to medical research, or simply share their data online. Frustrating as it is, the problem could become even worse. Existing genomic privacy breaches rely on low-order SNV (Single Nucleotide Variant) correlations. Our work shows that far more powerful attacks can be designed if high-order correlations are utilized. We corroborate this concern by making use of different SNV correlations based on various genomic data models and applying them to an inference attack on individuals' genotype data with hidden SNVs. We also show that low-order models behave very differently from real genomic data and therefore should not be relied upon for privacy-preserving solutions.
随着基因组数据的广泛应用,基因组数据隐私问题成为遗传学家、生物信息学家和安全隐私专家跨学科研究的热点。已经确定了针对基因组数据的实际攻击,从而打破了为医学研究提供基因组数据或仅仅在网上分享数据的个人对隐私的期望。令人沮丧的是,这个问题可能会变得更糟。现有的基因组隐私泄露依赖于低阶SNV(单核苷酸变异)相关性。我们的工作表明,如果利用高阶相关性,可以设计出更强大的攻击。我们利用基于不同基因组数据模型的不同SNV相关性,并将其应用于对隐藏SNV的个体基因型数据的推理攻击,从而证实了这一担忧。我们还表明,低阶模型的行为与真实的基因组数据非常不同,因此不应该依赖于隐私保护解决方案。
{"title":"Quantifying Genomic Privacy via Inference Attack with High-Order SNV Correlations","authors":"Sahel Shariati Samani, Zhicong Huang, Erman Ayday, M. Elliot, J. Fellay, J. Hubaux, Z. Kutalik","doi":"10.1109/SPW.2015.21","DOIUrl":"https://doi.org/10.1109/SPW.2015.21","url":null,"abstract":"As genomic data becomes widely used, the problem of genomic data privacy becomes a hot interdisciplinary research topic among geneticists, bioinformaticians and security and privacy experts. Practical attacks have been identified on genomic data, and thus break the privacy expectations of individuals who contribute their genomic data to medical research, or simply share their data online. Frustrating as it is, the problem could become even worse. Existing genomic privacy breaches rely on low-order SNV (Single Nucleotide Variant) correlations. Our work shows that far more powerful attacks can be designed if high-order correlations are utilized. We corroborate this concern by making use of different SNV correlations based on various genomic data models and applying them to an inference attack on individuals' genotype data with hidden SNVs. We also show that low-order models behave very differently from real genomic data and therefore should not be relied upon for privacy-preserving solutions.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"61 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129605421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology 准备:将隐私最佳实践集成到隐私工程方法论中
Pub Date : 2015-05-21 DOI: 10.1109/SPW.2015.22
Nicolás Notario, A. Crespo, Y. Martín, J. D. Álamo, D. Métayer, Thibaud Antignac, A. Kung, I. Kroener, David Wright
Data protection authorities worldwide have agreed on the value of considering privacy-by-design principles when developing privacy-friendly systems and software. However, on the technical plane, a profusion of privacy-oriented guidelines and approaches coexists, which provides partial solutions to the overall problem and aids engineers during different stages of the system development lifecycle. As a result, engineers find difficult to understand what they should do to make their systems abide by privacy by design, thus hindering the adoption of privacy engineering practices. This paper reviews existing best practices in the analysis and design stages of the system development lifecycle, introduces a systematic methodology for privacy engineering that merges and integrates them, leveraging their best features whilst addressing their weak points, and describes its alignment with current standardization efforts.
世界各地的数据保护当局都同意在开发隐私友好型系统和软件时考虑设计隐私原则的价值。然而,在技术层面上,大量面向隐私的指导方针和方法并存,它们为整体问题提供了部分解决方案,并在系统开发生命周期的不同阶段帮助工程师。因此,工程师发现很难理解他们应该做些什么来使他们的系统在设计上遵守隐私,从而阻碍了隐私工程实践的采用。本文回顾了在系统开发生命周期的分析和设计阶段现有的最佳实践,介绍了一种系统的隐私工程方法,该方法将它们合并和集成,利用它们的最佳特性,同时解决它们的弱点,并描述了它与当前标准化工作的一致性。
{"title":"PRIPARE: Integrating Privacy Best Practices into a Privacy Engineering Methodology","authors":"Nicolás Notario, A. Crespo, Y. Martín, J. D. Álamo, D. Métayer, Thibaud Antignac, A. Kung, I. Kroener, David Wright","doi":"10.1109/SPW.2015.22","DOIUrl":"https://doi.org/10.1109/SPW.2015.22","url":null,"abstract":"Data protection authorities worldwide have agreed on the value of considering privacy-by-design principles when developing privacy-friendly systems and software. However, on the technical plane, a profusion of privacy-oriented guidelines and approaches coexists, which provides partial solutions to the overall problem and aids engineers during different stages of the system development lifecycle. As a result, engineers find difficult to understand what they should do to make their systems abide by privacy by design, thus hindering the adoption of privacy engineering practices. This paper reviews existing best practices in the analysis and design stages of the system development lifecycle, introduces a systematic methodology for privacy engineering that merges and integrates them, leveraging their best features whilst addressing their weak points, and describes its alignment with current standardization efforts.","PeriodicalId":301535,"journal":{"name":"2015 IEEE Security and Privacy Workshops","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129558622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 100
期刊
2015 IEEE Security and Privacy Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1