Poporo: A Formal Methods Tool for Fast-Checking of Social Network Privacy Policies
The increase in use of Smart mobile devices has allowed for an ever growing market for services providers. These services are increasingly used to connect to users’ on-line private information through social networking sites that share and personalise on-line information. This leads to the problem of privacy leaks stemming from an application’s non-adherence to a predefined set of privacy policies. This paper presents a formal methods tool to reliably restrict the access to content in on-line social network services. The Poporo tool builds upon a previous work in which we provided a predicate calculus definition for social networking in B that models social-network content, privacy policies, and social-network friendship relations. This paper presents the implementation and the functionality of our Poporo tool through a running example in the domain of social networking sites.
Unable to display preview. Download preview PDF.
- 1.Appel, A.W.: Foundational proof-carrying code. In: LCS (2001)Google Scholar
- 2.Backes, M., Bagga, W., Karjoth, G., Schunter, M.: Efficient Comparison of Enterprise Privacy Policies. IBM Research, Zurich Research Laboratory (September 2003)Google Scholar
- 6.Cataño, N., Rueda, C., Hanvey, S.: The Poporo tool (2011), http://poporo.uma.pt/~ncatano/Projects/wespfm/Poporo/poporo.php
- 7.Cataño, N., Rueda, C., Hanvey, S.: Verification of jml generic types with yices. In: CCC (2011)Google Scholar
- 8.Cataño, N., Wahls, T., Rueda, C., Rivera, V., Yu, D.: Translating B machines to JML specifications. In: SAC-SVT (to appear, 2012)Google Scholar
- 9.Dijkstra, E.W.: A Discipline of Programming. Prentice Hall, Inc. (October 1976)Google Scholar
- 10.Duterte, B., de Moura, L.: The Yices SMT solver. Technical report, Computer Science Laboratory, SRI International (2006)Google Scholar
- 13.Moses, T.: eXtensible Access Control Markup Language (XACML) Version 2.0. OASIS (2005)Google Scholar
- 14.Sadeh, N., Gandon, F.: Semantic web technologies to reconcile privacy and context awareness. Journal of Web Semantics 1 (2004)Google Scholar