Skip to main content
Erschienen in: WIRTSCHAFTSINFORMATIK 5/2008

01.10.2008 | WI – Schwerpunktaufsatz

Compliance Monitor for Early Warning Risk Determination

verfasst von: Dipl.-Inform. Rafael Accorsi, Yoshinori Sato MSc., Satoshi Kai MSc.

Erschienen in: WIRTSCHAFTSINFORMATIK | Ausgabe 5/2008

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The paper reports on a reference monitor for early warning risk determination for privacy violations in the context of business compliance and demonstrates its applicability in the particular case of anonymity. To this end, the monitor detects system executions that potentially lead to incompliant states before the actual violation by determining the risk they pose to compliance goals and warning officers responsible for compliance about risky executions. In doing so, the presented monitor is a novel technique to automate some of the tasks involved in guaranteeing compliance.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Fußnoten
1
The existence of such an event history is considered in theoretical approaches on monitoring investigating the decidability capabilities of the monitor (Hamlen et al. 2006). The authors are not aware of practical approaches addressing this issue.
 
Literatur
Zurück zum Zitat Accorsi, Rafael (2006): On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. In: Fischer-Huebner, Simone; Rannenberg, Kai; Yngstroem, Louise; Lindskog, Stefan (Eds.): International Federation for Information Processing, Security and Privacy in Dynamic Environments vol. 2001, Springer-Verlag, pp. 329–339. Accorsi, Rafael (2006): On the Relationship of Privacy and Secure Remote Logging in Dynamic Systems. In: Fischer-Huebner, Simone; Rannenberg, Kai; Yngstroem, Louise; Lindskog, Stefan (Eds.): International Federation for Information Processing, Security and Privacy in Dynamic Environments vol. 2001, Springer-Verlag, pp. 329–339.
Zurück zum Zitat Accorsi, Rafael (2008): Automated Audits to Complement the Notion of Control for Identity Management. In: deLeeuw, Elisabeth; Fischer-Huebner, Simone; Iseng, Jimmy; Borking, John (Eds.): Policies and Research in Identity Management, vol. 261 of IFIP, Springer, pp. 39–48. Accorsi, Rafael (2008): Automated Audits to Complement the Notion of Control for Identity Management. In: deLeeuw, Elisabeth; Fischer-Huebner, Simone; Iseng, Jimmy; Borking, John (Eds.): Policies and Research in Identity Management, vol. 261 of IFIP, Springer, pp. 39–48.
Zurück zum Zitat Ashley, Paul; Hada, Satoshi; Karjoth, Guenter; Powers, Calvin; Schunter, Matthias (2003): Enterprise Privacy Authorization Language. IBM Research Report, IBM, Zurich. Ashley, Paul; Hada, Satoshi; Karjoth, Guenter; Powers, Calvin; Schunter, Matthias (2003): Enterprise Privacy Authorization Language. IBM Research Report, IBM, Zurich.
Zurück zum Zitat Bishop, Matt; Bhumiratana, Bhune; Crawford, Rick; Levitt, Carl (2004): How to Sanitize Data. In: Proceedings of the 13th IEEE International Workshops Infrastructure for Collaborative Enterprises, o.P, pp. 217–222. Bishop, Matt; Bhumiratana, Bhune; Crawford, Rick; Levitt, Carl (2004): How to Sanitize Data. In: Proceedings of the 13th IEEE International Workshops Infrastructure for Collaborative Enterprises, o.P, pp. 217–222.
Zurück zum Zitat Breaux, Travis; Antón, Annie (2008): Analyzing Regulatory Rules for Privacy and Security Requirements. In: IEEE Transactions of Software Engineering 34 (1), pp. 5–20. Breaux, Travis; Antón, Annie (2008): Analyzing Regulatory Rules for Privacy and Security Requirements. In: IEEE Transactions of Software Engineering 34 (1), pp. 5–20.
Zurück zum Zitat Casassa-Mont, Marco; Pearson, Siani; Bramhall, Pete (2003): Towards Accountable Management of Privacy and Identity Information. In: Snekkenes, Einar; Gollmann, Dieter (Eds.): Proceedings of ESORICS, Lecture Notes in Computer Science vol. 2808, Springer-Verlag, 146–161. Casassa-Mont, Marco; Pearson, Siani; Bramhall, Pete (2003): Towards Accountable Management of Privacy and Identity Information. In: Snekkenes, Einar; Gollmann, Dieter (Eds.): Proceedings of ESORICS, Lecture Notes in Computer Science vol. 2808, Springer-Verlag, 146–161.
Zurück zum Zitat Dalenius, Tore (1986): Finding a Needle in a Haystack– or Identifying Anonymous Census Record. In: Journal of Official Statistics 2 (3): pp. 329–336. Dalenius, Tore (1986): Finding a Needle in a Haystack– or Identifying Anonymous Census Record. In: Journal of Official Statistics 2 (3): pp. 329–336.
Zurück zum Zitat Gama, Pedro; Ferreira, Paulo (2005): Obligation Policies: An Enforcement Platform. In: Proceedings of the 6th International Workshop on Policies for Distributed Systems and Networks, pp. 203–212. Gama, Pedro; Ferreira, Paulo (2005): Obligation Policies: An Enforcement Platform. In: Proceedings of the 6th International Workshop on Policies for Distributed Systems and Networks, pp. 203–212.
Zurück zum Zitat Hamlen, Kevin; Morrisett, Greg; Schneider, Fred (2006): Computability Classes for Enforcement Mechanisms. In: ACM Transactions on Programming Languages and Systems 28 (1), pp. 175–205. Hamlen, Kevin; Morrisett, Greg; Schneider, Fred (2006): Computability Classes for Enforcement Mechanisms. In: ACM Transactions on Programming Languages and Systems 28 (1), pp. 175–205.
Zurück zum Zitat Hillson, David; Simon, Peter (2007): Practical Project Risk Management: The Atom Methodology. Management Concepts, Inc., USA. Hillson, David; Simon, Peter (2007): Practical Project Risk Management: The Atom Methodology. Management Concepts, Inc., USA.
Zurück zum Zitat Hilty, Manuel; Basin, David; Pretschner, Alexander (2005): On Obligations. In: di Vimercati, Sabrina; Syverson, Paul; Gollmann, Dieter (Eds.): Proceedings of the 10th ESORICS, Lecture Notes in Computer Science, vol. 3679, Springer-Verlag, pp. 98–117. Hilty, Manuel; Basin, David; Pretschner, Alexander (2005): On Obligations. In: di Vimercati, Sabrina; Syverson, Paul; Gollmann, Dieter (Eds.): Proceedings of the 10th ESORICS, Lecture Notes in Computer Science, vol. 3679, Springer-Verlag, pp. 98–117.
Zurück zum Zitat HIPAA (2008): http://www.hipaa.org, retrieved on 2008-05-07. HIPAA (2008): http://​www.​hipaa.​org, retrieved on 2008-05-07.
Zurück zum Zitat Irwin, Keith; Yu, Ting; Winsborough, William (2006): On the Modelling and Analysis of Obligations. In: Proceedings of the 13th ACM Conference in Computer and Communication Security, pp. 134–143. Irwin, Keith; Yu, Ting; Winsborough, William (2006): On the Modelling and Analysis of Obligations. In: Proceedings of the 13th ACM Conference in Computer and Communication Security, pp. 134–143.
Zurück zum Zitat Kähmer, Martin; Gilliot, Maike (2008a): Extended Privacy Definition Tool. To appear in: Proceedings of 4th Multikonferenz Wirtschaftsinformatik, Lecture Notes in Informatics, Munich. Kähmer, Martin; Gilliot, Maike (2008a): Extended Privacy Definition Tool. To appear in: Proceedings of 4th Multikonferenz Wirtschaftsinformatik, Lecture Notes in Informatics, Munich.
Zurück zum Zitat Kähmer, Martin; Gilliot, Maike (2008b): Automating Privacy Compliance with ExPDT. To appear in: IEEE Conference on E-Commerce Technology, Washington. Kähmer, Martin; Gilliot, Maike (2008b): Automating Privacy Compliance with ExPDT. To appear in: IEEE Conference on E-Commerce Technology, Washington.
Zurück zum Zitat Lampson, Butler; Abadi, Martin; Burrows, Michael; Wobber, Edward (1991): Authentication in Distributed Systems: Theory and Practice. In: ACM Operating Systems Review 25 (5), pp. 165–182. Lampson, Butler; Abadi, Martin; Burrows, Michael; Wobber, Edward (1991): Authentication in Distributed Systems: Theory and Practice. In: ACM Operating Systems Review 25 (5), pp. 165–182.
Zurück zum Zitat Machanavajjhala, Ashwin; Kifer, Daniel; Gehrke, Johannes; Venkitasubramaniam, Muthuramakrishnan (2007): L-diversity: Privacy beyond k-anonymity. In ACM Transactions of Knowledge Discovery Data 1 (1), pp. 1–52. Machanavajjhala, Ashwin; Kifer, Daniel; Gehrke, Johannes; Venkitasubramaniam, Muthuramakrishnan (2007): L-diversity: Privacy beyond k-anonymity. In ACM Transactions of Knowledge Discovery Data 1 (1), pp. 1–52.
Zurück zum Zitat Park, Jaehong; Sandhu Ravi (2004): The UCONABC Usage Control Model. In: ACM Transactions on Information and System Security 7 (1), pp. 128–174. Park, Jaehong; Sandhu Ravi (2004): The UCONABC Usage Control Model. In: ACM Transactions on Information and System Security 7 (1), pp. 128–174.
Zurück zum Zitat Pretschner, Alexander; Massacci, Fabio; Hilty, Manuel (2007): Usage Control in Service-Oriented Architectures. In: Lambrinoudakis, Costas; Pernul; Günther; Tjoa, A Min (Eds.): Proceedings of the 4th TRUSTBUS, Lecture Notes in Computer Science, vol. 4657, Springer-Verlag, pp. 83–93. Pretschner, Alexander; Massacci, Fabio; Hilty, Manuel (2007): Usage Control in Service-Oriented Architectures. In: Lambrinoudakis, Costas; Pernul; Günther; Tjoa, A Min (Eds.): Proceedings of the 4th TRUSTBUS, Lecture Notes in Computer Science, vol. 4657, Springer-Verlag, pp. 83–93.
Zurück zum Zitat Prokein, Oliver (2008): IT-Risikomanagement. Gabler, Wiesbaden. Prokein, Oliver (2008): IT-Risikomanagement. Gabler, Wiesbaden.
Zurück zum Zitat Ribeiro, Carlos; Zúquete, André; Ferreira, Paulo (2001): Enforcing Obligations with Security Monitors. In: Qing, Sihan; Okamoto, Tatusaki; Zhou, Jianying: Proceedings of the the 3rd International Conference on Information and Communications Security, Lecture Notes in Computer Science, vol. 2229, Springer-Verlag, pp. 172–176. Ribeiro, Carlos; Zúquete, André; Ferreira, Paulo (2001): Enforcing Obligations with Security Monitors. In: Qing, Sihan; Okamoto, Tatusaki; Zhou, Jianying: Proceedings of the the 3rd International Conference on Information and Communications Security, Lecture Notes in Computer Science, vol. 2229, Springer-Verlag, pp. 172–176.
Zurück zum Zitat Sackmann, Stefan; Strüker, Jens; Accorsi, Rafael (2006): Personalization in Privacy-Aware Highly Dynamic Systems. In: Communications of the ACM 49 (9), pp. 32–38. Sackmann, Stefan; Strüker, Jens; Accorsi, Rafael (2006): Personalization in Privacy-Aware Highly Dynamic Systems. In: Communications of the ACM 49 (9), pp. 32–38.
Zurück zum Zitat Sato, Yoshinori; Kawasaki, Akihiko (2007): An Anonymization Technique with Considering Identification Risk. In: Proceedings of Multimedia, Distributed, Cooperative, and Mobile Symposium, Japan, pp.1182–1189. Sato, Yoshinori; Kawasaki, Akihiko (2007): An Anonymization Technique with Considering Identification Risk. In: Proceedings of Multimedia, Distributed, Cooperative, and Mobile Symposium, Japan, pp.1182–1189.
Zurück zum Zitat Schneider, Fred (2000): Enforceable Security Policies. In: ACM Transactions on Information System Security 3 (1), pp. 30–50. Schneider, Fred (2000): Enforceable Security Policies. In: ACM Transactions on Information System Security 3 (1), pp. 30–50.
Zurück zum Zitat Sorebo, Gib (2006): A model for Private Section Compliance in Information Security. In: IT Compliance Journal 2, pp. 7–14. Sorebo, Gib (2006): A model for Private Section Compliance in Information Security. In: IT Compliance Journal 2, pp. 7–14.
Zurück zum Zitat Sweeney, Latanya (2000): Uniqueness of Simple Demographics in the U.S. Population. Research Report in the Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh. Sweeney, Latanya (2000): Uniqueness of Simple Demographics in the U.S. Population. Research Report in the Carnegie Mellon University, Laboratory for International Data Privacy, Pittsburgh.
Zurück zum Zitat Sweeney, Latanya (2002): k-anonymity: a model for protecting privacy. In: International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 (5), pp. 557–570. Sweeney, Latanya (2002): k-anonymity: a model for protecting privacy. In: International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10 (5), pp. 557–570.
Zurück zum Zitat Takemura, Akimichi (2000): Minimum Unsafe and Maximum Safe Sets of Variables for Disclosure Risk Assessment of Individual Records in a Microdata Set. In: Journal Japan Statistics Society, 32 pp. 107–117. Takemura, Akimichi (2000): Minimum Unsafe and Maximum Safe Sets of Variables for Disclosure Risk Assessment of Individual Records in a Microdata Set. In: Journal Japan Statistics Society, 32 pp. 107–117.
Zurück zum Zitat Takemura, Akimichi (2003): Current Trends in Theoretical Research of Statistical Disclosure Control Problem. In: Proceedings of the Institute of Statistical Mathematics 51 (2), pp. 241–260. Takemura, Akimichi (2003): Current Trends in Theoretical Research of Statistical Disclosure Control Problem. In: Proceedings of the Institute of Statistical Mathematics 51 (2), pp. 241–260.
Zurück zum Zitat Waterfield, Phebe; Casey, John (2005): The Governance of Compliance: Putting Policies into Practice. Consulting Report of Yankee Group Research Inc, USA. Waterfield, Phebe; Casey, John (2005): The Governance of Compliance: Putting Policies into Practice. Consulting Report of Yankee Group Research Inc, USA.
Zurück zum Zitat Willenborg, Leon; de Waal, Ton (2000): Elements of Statistical Disclosure Control. In: Lecture Notes in Statistics 155, Springer-Verlag, New York. Willenborg, Leon; de Waal, Ton (2000): Elements of Statistical Disclosure Control. In: Lecture Notes in Statistics 155, Springer-Verlag, New York.
Metadaten
Titel
Compliance Monitor for Early Warning Risk Determination
verfasst von
Dipl.-Inform. Rafael Accorsi
Yoshinori Sato MSc.
Satoshi Kai MSc.
Publikationsdatum
01.10.2008
Verlag
Vieweg Verlag
Erschienen in
WIRTSCHAFTSINFORMATIK / Ausgabe 5/2008
Print ISSN: 0937-6429
Elektronische ISSN: 1861-8936
DOI
https://doi.org/10.1007/s11576-008-0079-0

Weitere Artikel der Ausgabe 5/2008

WIRTSCHAFTSINFORMATIK 5/2008 Zur Ausgabe

Premium Partner