A Practical Generic Privacy Language
نویسندگان
چکیده
We present a declarative language with a formal semantics for specifying both users’ privacy preferences and services’ privacy policies. Expressiveness and applicability are maximized by keeping the vocabulary and semantics of service behaviours abstract. A privacy-compliant data-handling protocol for a network of communicating principals is described.
منابع مشابه
Building small user-friendly boolean circuits
In this paper, we introduce RockEngine Generic Privacy builder, a Boolean circuit compiler meant to be part of the RockEngine Generic Privacy Engine developed by Rockchain.org. The RockEngine Generic Privacy builder is a complete garbled circuit generator that will be used in particular on the public network of Rockchain.org to perform Secure Function Evaluation on private dAppBoxes nodes. The ...
متن کاملConvertible limited (multi-) verifier signature: new constructions and applications
A convertible limited (multi-) verifier signature (CL(M)VS) provides controlled verifiability and preserves the privacy of the signer. Furthermore, limited verifier(s) can designate the signature to a third party or convert it into a publicly verifiable signature upon necessity. In this proposal, we first present a generic construction of convertible limited verifier signature (CLVS) into which...
متن کاملSecure Multi-party Computation Protocols from a High-Level Programming Language
Secure multi-party computation (SMC) enables privacy-preserving computations on data originating from a number of parties. In today’s digital world, data privacy is increasingly more difficult to provide. With SMC methods like secret sharing and Yao’s garbled circuits, it is possible to build privacypreserving computational protocols that do not leak confidential inputs to other parties. The ad...
متن کاملGeneric Analysis of Literary Translation: A Case Study of Contemporary English Short Stories
Translation of a literary text is a difficult task, for understanding literature requires knowledge of various linguistic levels of a literary text in addition to strategies and methods of translation. To this should still be added cognitive-based translation training which helps practitioners preserve the aesthetic aspects of a literary text. Focusing on short story as a genre with both ...
متن کاملLocation Based Authentication of KNN Queries with Location and Query Privacy
In mobile communication, spatial queries pose a serious threat to user location privacy because the location of a query may reveal sensitive information about the mobile user. In this paper, study approximate k nearest neighbor (kNN) queries where the mobile user queries the location-based service (LBS) provider about approximate k nearest points of interest (POIs) on the basis of his current l...
متن کامل