Privacy Policy Specification and Audit in a Fixed-Point Logic - How to enforce HIPAA, GLBA and all that (CMU-CyLab-10-008)

نویسندگان

  • Henry DeYoung
  • Deepak Garg
  • Limin Jia
  • Dilsun Kaynar
  • Anupam Datta
چکیده

Organizations such as hospitals and banks that collect and use personal information are required tocomply with privacy regulations like the Health Insurance Portability and Accountability Act (HIPAA)and the Gramm-Leach-Bliley Act (GLBA). With the goal of specification and enforcement of such prac-tical policies, we develop the logic PrivacyLFP, whose syntax is an extension of the fixed point logicLFP with operators of linear temporal logic. We model organizational processes by assigning role-basedresponsibilities to agents that are also expressed in the same logic. To aid in designing such processes,we develop a semantic locality criterion to characterize responsibilities that agents (or groups of agents)have a strategy to discharge, and easily checkable, sound syntactic characterizations of responsibilitiesthat meet this criterion. Policy enforcement is achieved through a combination of techniques: (a) adesign-time analysis of the organizational process to show that the privacy policy is respected if allagents act responsibly, using a sound proof system we develop for PrivacyLFP; and (b) a posthoc auditof logs of organizational activity that identifies agents who did not live up to their responsibilities, usinga model checking procedure we develop for PrivacyLFP. We illustrate these enforcement techniques usinga representative example of an organizational process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Logical Specification of the GLBA and HIPAA Privacy Laws (CMU-CyLab-10-007)

Despite the wide array of frameworks proposed for the formal specification and analysis of privacy laws, there has been comparatively little work on expressing large fragments of actual privacy laws in these frameworks. We attempt to bridge this gap by presenting what we believe to be the most complete logical formalizations of the Gramm-Leach-Bliley Act (GLBA) and the Health Insurance Portabil...

متن کامل

Privacy Policy Specification and Audit in a Fixed-Point Logic

Organizations such as hospitals and banks that collect and use personal information are required tocomply with privacy regulations like the Health Insurance Portability and Accountability Act (HIPAA)and the Gramm-Leach-Bliley Act (GLBA). With the goal of specification and enforcement of such prac-tical policies, we develop the logic PrivacyLFP, whose syntax is an extension of the fi...

متن کامل

A Logical Method for Policy Enforcement over Evolving Audit Logs (CMU-CyLab-11-002)

We present an iterative algorithm for enforcing policies represented in a first-order logic,which can, in particular, express all transmission-related clauses in the HIPAA Privacy Rule.The logic has three features that raise challenges for enforcement — uninterpreted predicates(used to model subjective concepts in privacy policies), real-time temporal properties, and quan-tifica...

متن کامل

Privacy through Accountability: A Computer Science Perspective

Privacy has become a significant concern in modern society as personal information about individuals is increasingly collected, used, and shared, often using digital technologies, by a wide range of organizations. To mitigate privacy concerns, organizations are required to respect privacy laws in regulated sectors (e.g., HIPAA in healthcare, GLBA in financial sector) and to adhere to self-decla...

متن کامل

On XACML's Adequacy to Specify and to Enforce HIPAA

In the medical sphere, personal and medical information is collected, stored, and transmitted for various purposes, such as, continuity of care, rapid formulation of diagnoses, and billing. Many of these operations must comply with federal regulations like the Health Insurance Portability and Accountability Act (HIPAA). To this end, we need a specification language that can precisely capture th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010