Constructing Independently Verifiable Privacy-Compliant Type Systems for Message Passing between Black-Box Components
Paper in proceeding, 2018
We model an architecture as a set of agents or components that pass messages to each other. We present in this paper algorithms that take as input an architecture and a set of privacy constraints, and output an extension of the original architecture that satisfies the privacy constraints.
Privacy constraint
type systems
privacy property
privacy policy
Architecture
privacy safe
General Data Protection Regulation
formal methods
type system
safe architecture
Privacy by Design
type theory
Author
Robin Adams
Chalmers, Computer Science and Engineering (Chalmers), Computing Science (Chalmers)
Sibylle Schupp
Technical University of Hamburg (TUHH)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
03029743 (ISSN) 16113349 (eISSN)
Vol. 11294 LNCS 196-214978-303003591-4 (ISBN)
Oxford, United Kingdom,
Areas of Advance
Information and Communication Technology
Subject Categories
Software Engineering
Computer Science
DOI
10.1007/978-3-030-03592-1_11