RSL-IL4Privacy: a domain-specific language for the rigorous specification of privacy policies

被引:20
作者
Caramujo, Joao [1 ]
da Silva, Alberto Rodrigues [1 ]
Monfared, Shaghayegh [1 ]
Ribeiro, Andre [1 ]
Calado, Pavel [1 ]
Breaux, Travis [2 ]
机构
[1] Univ Lisbon, Inst Super Tecn, INESC ID, Lisbon, Portugal
[2] Carnegie Mellon Univ, Inst Software Res, Pittsburgh, PA 15213 USA
关键词
Privacy policy; Privacy requirement; Domain-specific language; RSL-IL4Privacy; Eddy; NATURAL-LANGUAGE; REQUIREMENTS;
D O I
10.1007/s00766-018-0305-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile and web applications that manage users' personal information require developers to align their software design with privacy requirements commonly described in privacy policies. These policies are often the sole means to enforce accountability on that data protection. We propose the RSL-IL4Privacy, a domain-specific language for specifying privacy policies that can be simultaneously manipulated by computers and authored and analyzed by humans. In addition, RSL-IL4Privacy can be used as an intermediate language to support model-to-model transformations from and into other related languages. RSL-IL4Privacy provides policy authors with means to define a privacy policy as a set of declarative statements with explicit relationships to services, data recipients, private data types and enforcement mechanisms. The RSL-IL4Privacy is defined with different technologies for supporting distinct levels of formality, namely support for multiple modes of presenting privacy requirements, including tabular, graphical and textual representations, to increase integration with a wider variety of authoring and analyzing practices. We apply this language to support the analysis and comparison of policies from Facebook, LinkedIn, Twitter, Dropbox and IMDb. We discuss with further detail the application of this approach to the Twitter policy by presenting several examples with multiple representations. Finally, we discuss how RSL-IL4Privacy can improve the quality of privacy policies and also identifies threats to validity.
引用
收藏
页码:1 / 26
页数:26
相关论文
共 58 条
[11]  
Bettini L., 2013, Implementing Domain-Specific Languages with Xtext and Xtend
[12]   Mining Privacy Goals from Privacy Policies Using Hybridized Task Recomposition [J].
Bhatia, Jaspreet ;
Breaux, Travis D. ;
Schaub, Florian .
ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2016, 25 (03)
[13]  
Bonneau Joseph, 2010, EC INFORM SECURITY P
[14]   Analyzing regulatory rules for privacy and security requirements [J].
Breaux, Travis D. ;
Anton, Annie I. .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2008, 34 (01) :5-20
[15]   Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements [J].
Breaux, Travis D. ;
Hibshi, Hanan ;
Rao, Ashwini .
REQUIREMENTS ENGINEERING, 2014, 19 (03) :281-307
[16]  
Brodie CA, 2006, P 2 S US POL SEC
[17]  
Caramujo J, 2015, IEEE 17 C BUS INF CB
[18]  
Cleland-Huang J, 2010, ICSE
[19]  
Cranor L. F., 2003, IEEE Security & Privacy, V1, P50, DOI 10.1109/MSECP.2003.1253568
[20]   Model-driven engineering: A survey supported by the unified conceptual model [J].
da Silva, Alberto Rodrigues .
COMPUTER LANGUAGES SYSTEMS & STRUCTURES, 2015, 43 :139-155