Abstract
We discuss ongoing work on developing tools and techniques for understanding natural-language descriptions of security and privacy rules, particularly in the context of cloud computing services. In particular, we present a three-part toolkit for analyzing and processing texts, and enforcing privacy and security rules extracted from those texts. We are interested in developing efficient, accurate technologies to reduce the time spent analyzing and reasoning about new privacy laws and security rules within the enterprise. We describe the tools we have developed for semantic annotation, and also for information extraction - these are specifically intended for analysis of cloud terms of service, and therefore designed to help with self-compliance; however, the techniques involved should be generalizable to other relevant texts, esp. rules and regulations for data protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Ong, V.: An Architecture and Prototype System for Automatically Processing Natural-Language Statements of Policy. Thesis, Naval Postgraduate School, Monterey, California (2001)
Manning, C.D., Schutze, H.: Foundations of Statistical Natural Language Processing. MIT Press (1999)
Breaux, T.D., Vail, M.W., Antón, A.I.: Towards Regulatory Compliance: Extracting Rights and Obligations to Align Requirements with Regulations. In: Proceedings of 14th IEEE International Requirements Engineering Conference, RE 2006 (2006)
Cunningham, H., Maynard, D., Bontcheva, K., Tablan, V., Aswani, N., Ro-berts, I., Gorrell, G., Funk, A., Roberts, A., Damljanovic, D., Heitz, T., Greenwood, M.A., Saggion, H., Petrak, J., Li, Y., Peters, W.: Text Processing with GATE (Version 6). Department of Computer Science, University of Sheffield (2011)
May, M., Gunter, C., Lee, I., Zdancewic, S.: Strong and Weak Policy Relations. In: Proceedings of the 2009 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2009), pp. 33–36. IEEE Computer Society, Washington, DC (2009)
Papanikolaou, N., Creese, S., Goldsmith, M.: Refinement checking for privacy policies. Science of Computer Programming (2011) (article in press), doi:10.1016/j.scico, 07.009
Casassa Mont, M., Pearson, S., Creese, S., Goldsmith, M., Papanikolaou, N.: A Conceptual Model for Privacy Policies with Consent and Revocation Requirements. In: Fischer-Hübner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IFIP AICT, vol. 352, pp. 258–270. Springer, Heidelberg (2011)
Pearson, S., Casassa Mont, M., Kounga, G.: Enhancing Accountability in the Cloud via Sticky Policies. In: Lee, C., Seigneur, J.-M., Park, J.J., Wagner, R.R. (eds.) STA 2011 Workshops. CCIS, vol. 187, pp. 146–155. Springer, Heidelberg (2011)
Bradshaw, S., Millard, C., Walden, I.: Contracts for Clouds: Comparison and Analysis of the Terms and Conditions of Cloud Computing Services. Queen Mary University of London, School of Law Legal Studies Research Paper No. 63/2010 (2010), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1662374 (accessed May 14, 2012)
Breaux, T.D., Gordon, D.G.: Regulatory Requirements as Open Systems: Structures, Patterns and Metrics for the Design of Formal Requirements Specifications. Technical Report CMU-ISR-11-100, Institute for Software Research, Carnegie-Mellon University (2011), http://reports-archive.adm.cs.cmu.edu/anon/isr2011/CMU-ISR-11-100.pdf (accessed May 14, 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Papanikolaou, N. (2012). Natural Language Processing of Rules and Regulations for Compliance in the Cloud. In: Meersman, R., et al. On the Move to Meaningful Internet Systems: OTM 2012. OTM 2012. Lecture Notes in Computer Science, vol 7566. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33615-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-33615-7_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-33614-0
Online ISBN: 978-3-642-33615-7
eBook Packages: Computer ScienceComputer Science (R0)