On the Use of Formal Methods to Enforce Privacy-Aware Social Networking

On the Use of Formal Methods to Enforce Privacy-Aware Social Networking

Néstor Cataño Collazos, Sorren Christopher Hanvey, Camilo Rueda Calderón
Copyright: © 2013 |Pages: 26
ISBN13: 9781466639263|ISBN10: 1466639261|EISBN13: 9781466639270
DOI: 10.4018/978-1-4666-3926-3.ch011
Cite Chapter Cite Chapter

MLA

Collazos, Néstor Cataño, et al. "On the Use of Formal Methods to Enforce Privacy-Aware Social Networking." Social Network Engineering for Secure Web Data and Services, edited by Luca Caviglione, et al., IGI Global, 2013, pp. 222-247. https://doi.org/10.4018/978-1-4666-3926-3.ch011

APA

Collazos, N. C., Hanvey, S. C., & Calderón, C. R. (2013). On the Use of Formal Methods to Enforce Privacy-Aware Social Networking. In L. Caviglione, M. Coccoli, & A. Merlo (Eds.), Social Network Engineering for Secure Web Data and Services (pp. 222-247). IGI Global. https://doi.org/10.4018/978-1-4666-3926-3.ch011

Chicago

Collazos, Néstor Cataño, Sorren Christopher Hanvey, and Camilo Rueda Calderón. "On the Use of Formal Methods to Enforce Privacy-Aware Social Networking." In Social Network Engineering for Secure Web Data and Services, edited by Luca Caviglione, Mauro Coccoli, and Alessio Merlo, 222-247. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-3926-3.ch011

Export Reference

Mendeley
Favorite

Abstract

This chapter discusses the use of formal techniques and formal verification tools to ensure privacy-aware social networking; hence users of social-networking sites can predict what the consequences of updating their privacy settings are. A formal methods approach is presented for modeling and comparing social-network privacy policies, and for checking whether a user’s privacy policy can coexist with other policies within a social networking site. The authors present the Poporo tool implementing the approach. Poporo builds on a predicate calculus definition for social networking written in B that models social network content, people in the network, friendship relations, and privacy policies that are modeled as permissions to access content. Several examples of privacy-awareness social networking are also shown using Poporo.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.