Privacy and contextual integrity: Framework and applications

Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philosophy. We formalize some aspects of contextual integrity in a logical framework for expressing and reasoning about norms of transmission of personal information. In comparison with access control and privacy policy frameworks such as RBAC, EPAL, and P3P, these norms focus on who personal information is about, how it is transmitted, and past and future actions by both the subject and the users of the information. Norms can be positive or negative depending on whether they refer to actions that are allowed or disallowed. Our model is expressive enough to capture naturally many notions of privacy found in legislation, including those found in HIPAA, COPPA, and GLBA. A number of important problems regarding compliance with privacy norms, future requirements associated with specific actions, and relations between policies and legal standards reduce to standard decision procedures for temporal logic.

Original languageEnglish (US)
Title of host publicationProceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
Pages184-198
Number of pages15
DOIs
StatePublished - 2006
Event2006 IEEE Symposium on Security and Privacy, S and P 2006 - Berkeley, United States
Duration: May 21 2006May 24 2006

Publication series

NameProceedings - IEEE Symposium on Security and Privacy
Volume2006
ISSN (Print)1081-6011

Other

Other2006 IEEE Symposium on Security and Privacy, S and P 2006
CountryUnited States
CityBerkeley
Period5/21/065/24/06

ASJC Scopus subject areas

  • Engineering(all)

Fingerprint Dive into the research topics of 'Privacy and contextual integrity: Framework and applications'. Together they form a unique fingerprint.

Cite this