Origin Privacy: Protecting Privacy in the Big-Data Era
Abstract:
Existing data protection laws sometimes restrict information flow based on its origin or provenance. These origin-based rules are distinct from information flow rules that restrict information based on its topic. In addition to sometimes being directly specified in law, information origin rules are less ambiguous than information topic rules. We call the conception of privacy as that maintained by complying with origin-based rules Origin Privacy. Our work motivates then formally specifies, implements, and analyzes origin rules to information flow.
Security Markings
RECORD
Collection: TRECMS