Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies
Abstract
The increase in use of Smart mobile devices has allowed for an ever growing market for services providers. These services are increasingly used to connect to users’ on-line private information through social networking sites that share and personalise on-line information. This leads to the problem of privacy leaks stemming from an application’s non-adherence to a predefined set of privacy policies. This paper presents a formal methods tool to reliably restrict the access to content in on-line social network services. The Poporo tool builds upon a previous work in which we provided a predicate calculus definition for social networking in B that models social-network content, privacy policies, and social-network friendship relations. This paper presents the implementation and the functionality of our Poporo tool through a running example in the domain of social networking sites.
Keywords
Privacy Policy Java Program Privacy Leak Uninterpreted Function Smart Mobile DevicePreview
Unable to display preview. Download preview PDF.
References
- 1.Appel, A.W.: Foundational proof-carrying code. In: LCS (2001)Google Scholar
- 2.Backes, M., Bagga, W., Karjoth, G., Schunter, M.: Efficient Comparison of Enterprise Privacy Policies. IBM Research, Zurich Research Laboratory (September 2003)Google Scholar
- 3.Barthe, G., Crégut, P., Grégoire, B., Jensen, T., Pichardie, D.: The MOBIUS Proof Carrying Code Infrastructure. In: de Boer, F.S., Bonsangue, M.M., Graf, S., de Roever, W.-P. (eds.) FMCO 2007. LNCS, vol. 5382, pp. 1–24. Springer, Heidelberg (2008)CrossRefGoogle Scholar
- 4.Breunesse, C., Cataño, N., Huisman, M., Jacobs, B.: Formal methods for smart cards: An experience report. Science of Computer Programming 55(1-3), 53–80 (2005)MathSciNetMATHCrossRefGoogle Scholar
- 5.Cataño, N., Rueda, C.: Matelas: A Predicate Calculus Common Formal Definition for Social Networking. In: Frappier, M., Glässer, U., Khurshid, S., Laleau, R., Reeves, S. (eds.) ABZ 2010. LNCS, vol. 5977, pp. 259–272. Springer, Heidelberg (2010)CrossRefGoogle Scholar
- 6.Cataño, N., Rueda, C., Hanvey, S.: The Poporo tool (2011), http://poporo.uma.pt/~ncatano/Projects/wespfm/Poporo/poporo.php
- 7.Cataño, N., Rueda, C., Hanvey, S.: Verification of jml generic types with yices. In: CCC (2011)Google Scholar
- 8.Cataño, N., Wahls, T., Rueda, C., Rivera, V., Yu, D.: Translating B machines to JML specifications. In: SAC-SVT (to appear, 2012)Google Scholar
- 9.Dijkstra, E.W.: A Discipline of Programming. Prentice Hall, Inc. (October 1976)Google Scholar
- 10.Duterte, B., de Moura, L.: The Yices SMT solver. Technical report, Computer Science Laboratory, SRI International (2006)Google Scholar
- 11.Dutertre, B., de Moura, L.: A Fast Linear-Arithmetic Solver for DPLL(T). In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 81–94. Springer, Heidelberg (2006)CrossRefGoogle Scholar
- 12.Leavens, G.T., Baker, A.L., Ruby, C.: Preliminary design of JML: A behavioral interface specification language for Java. ACM SIGSOFT 31(3), 1–38 (2006)CrossRefGoogle Scholar
- 13.Moses, T.: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS (2005)Google Scholar
- 14.Sadeh, N., Gandon, F.: Semantic web technologies to reconcile privacy and context awareness. Journal of Web Semantics 1 (2004)Google Scholar