Privacy by design: On the conformance between protocols and architectures

Vinh Thong Ta*, Thibaud Antignac

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding (ISBN)peer-review

5 Citations (Scopus)

Abstract

In systems design, we generally distinguish the architecture and the protocol levels. In the context of privacy by design, in the first case, we talk about privacy architectures, which define the privacy goals and the main features of the system at high level. In the latter case, we consider the underlying concrete protocols and privacy enhancing technologies that implement the architectures. In this paper, we address the question that whether a given protocol conforms to a privacy architecture and provide the answer based on formal methods. We propose a process algebra variant to define protocols and reason about privacy properties, as well as a mapping procedure from protocols to architectures that are defined in a high-level architecture language.

Original languageEnglish
Title of host publicationFoundations and Practice of Security - 7th International Symposium, FPS 2014, Revised Selected Papers
EditorsJoaquin Garcia-Alfaro, Frédéric Cuppens, Nur Zincir Heywood, Philip W.L. Fong
PublisherSpringer Verlag
Pages65-81
Number of pages17
ISBN (Electronic)9783319170398
DOIs
Publication statusPublished - 2015
EventChinese Materials Congress, CMC 2014 - Chengdu, China
Duration: 4 Jul 20147 Jul 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8930
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceChinese Materials Congress, CMC 2014
Country/TerritoryChina
CityChengdu
Period4/07/147/07/14

Keywords

  • Design

Fingerprint

Dive into the research topics of 'Privacy by design: On the conformance between protocols and architectures'. Together they form a unique fingerprint.

Cite this