Proceedings. Fifth IEEE International Workshop on Policies for Distributed Systems and Networks
Download PDF

Abstract

Privacy policy evaluation engines enable queries whether a specific user is allowed to access specific data for a specific purpose. While tools for authoring, maintaining, and auditing privacy policies already exist, no tool exists yet to deal with unification within such policies, e.g., to enable queries if data might be modified by some user, or how many user entries satisfy a certain constraint. We show how this can can be achieved by embedding enterprise privacy policies into Prolog. We show this concretely for IBM's Enterprise Privacy Authorization Language (EPAL). Based on the unification mechanisms of Prolog, our work enables general queries for privacy policies as well as quantitative measurements.
Like what you’re reading?
Already a member?Sign In
Member Price
$11
Non-Member Price
$21
Add to CartSign In
Get this article FREE with a new membership!

Related Articles