Skip to main content
Log in

A dynamic logic for privacy compliance

  • Published:
Artificial Intelligence and Law Aims and scope Submit manuscript

Abstract

Knowledge based privacy policies are more declarative than traditional action based ones, because they specify only what is permitted or forbidden to know, and leave the derivation of the permitted actions to a security monitor. This inference problem is already non trivial with a static privacy policy, and becomes challenging when privacy policies can change over time. We therefore introduce a dynamic modal logic that permits not only to reason about permitted and forbidden knowledge to derive the permitted actions, but also to represent explicitly the declarative privacy policies together with their dynamics. The logic can be used to check both regulatory and behavioral compliance, respectively by checking that the permissions and obligations set up by the security monitor of an organization are not in conflict with the privacy policies, and by checking that these obligations are indeed enforced.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Notes

  1. An accessibility relation R is serial if and only if R(w) ≠ \(\emptyset\) for all worlds w. An accessibility relation R is reflexive if and only if \(w\in R(w)\) for all \(w\in W. \) See Blackburn et al. (2001) for details.

  2. Formally, |ϕ| is defined inductively as follows: \(|p|=1, |\neg\phi|=|K_r\phi|=1+|\phi|, |\phi\land\phi'|=1+|\phi|+|\phi'|, |O_s\alpha|=1+|\alpha|, |[Send\,\psi]\phi|=1+|\psi|+|\phi|, |[Prom\,\alpha]\phi|=1+|\alpha| +|\phi|.\)

  3. Two pointed models (M,v) and (M′, v′) are bisimilar if there is a relation Z on W × W′ such that v Z v′ and satisfying the following conditions:

    • Base:     if wZw′, then for all \(p\in\Upphi^{\phi}, w\in V(p)\) iff w′ ∈ V′(p);

    • Forth R:   if wZw′ and u ∈ R(w), then there is u′ ∈ R(w′) such that u Z u′;

    • Back R:   if w Z w′ and u′ ∈ R(w′), then there is u ∈ R(w) such that u Z u′;

    • Forth D:   if w Z w′ and u ∈ D(w), then there is u′ ∈ D(w′) such that u Z u′;

    • Back D:   if w Z w′ and u′ ∈ D(w′), then there is u ∈ D(w) such that u Z u′.

    If two pointed Kripke models are bisimilar then the formulas true at these two pointed models are the same, i.e. then contain the same information (see Blackburn et al. 2001 for more details). Two multi-pointed models (MS) and (M′, S′), where \(S\subseteq M\) and \(S^{\prime}\subseteq M^{\prime}, \) are bisimilar if for all \(w\in S\) there is \(w^{\prime}\in S^{\prime}\) such that (Mw) and (M′, w′) are bisimilar, and for all \(w^{\prime}\in S^{\prime}\) there is \(w\in S\) such that (Mw) and (M′, w′) are bisimilar.

  4. Formally, |ϕ|1 is defined inductively as follows: \(|p|_1=1, |\neg\phi|_1=|K_r\phi|_1=1+|\phi|_1, |\phi\land\phi'|_1=1+|\phi| _1+|\phi'|_1, |O_s\alpha|_1=1+|\alpha|_1, |[Send\,\psi]\phi|_1=1+|\phi|_1, |[Prom\,\alpha]\phi|_1=1 +|\phi|_1. \)

  5. Formally, |ϕ|2 is defined inductively as follows: \(|p|_2=0, |\neg\phi|_2=|K_r\phi|_2=|\phi|_2, |\phi\land\phi'|_2=|\phi|_2+|\phi'|_2, |O_s\alpha|_2=|\alpha|_2, |[Send\,\psi]\phi|_2=|\psi|+|\phi|_2, |[Prom\,\alpha]\phi|_2=|\alpha| +|\phi|_2.\)

  6. Formally, |ϕ| is defined inductively as follows: if \({\phi=\psi\in{\fancyscript{L}}_{DEDL}, }\) then |ϕ| is defined as in Footnote 2; otherwise, \({|\phi|=1+|\phi|, |\phi\land\phi'|=1+|\phi|+|\phi'|, |(\chi\in{\fancyscript{P}})|=1, |RegComp|=1,|BehComp|=1, |Comp|=1, |P_s(Send\,\psi)|=1+|\psi|, |[Send\,\psi]\phi|=1+|\psi|+|\phi|, [+ \chi]\phi|=1+|\chi|+|\phi|, |[- \chi]|\phi=1+|\chi|+|\phi|}.\)

  7. Two pointed models (Mv) and (M′, v′) are R D-bisimilar if there is a relation on W × W′ satisfying the base condition for \(\Upphi^{\phi}\) and the back and forth conditions for R and D (see footnote 3 or Blackburn et al. (2001) for details).

References

  • Alchourrón C, Gärdenfors P, Makinson D (1985) On the logic of theory change: partial meet contraction and revision functions. J Symbol Logic 50(2):510–530

    Article  MATH  Google Scholar 

  • Anderson A (1958) A reduction of deontic logic to alethic modal logic. Mind 67:100–103

    Article  Google Scholar 

  • Åqvist L (1967) Good samaritans, contrary-to-duty imperatives, and epistemic obligations. Nôus 1:361–379

    Google Scholar 

  • Aucher G, Boella G, van der Torre L (2010a) Prescriptive and descriptive obligations in dynamic epistemic deontic logic. In: AI approaches to the complexity of legal systems (AICOL 2009). Springer, Berlin, LNAI, vol 6237, pp 150–161

  • Aucher G, Boella G, van der Torre L (2010b) Privacy policies with modal logic: the dynamic turn. In: Governatori G, Sartor G (eds) Deontic logic in computer science (DEON 2010). Springer, Berlin, LNCS, vol 6181, pp 196–213

  • Balbiani P, van Ditmarsch H, Seban P (2009) Reasoning about permitted announcements. In: ESSLLI 2009 workshop logical methods for social concepts, Bordeaux

  • Baltag A, Moss L (2004) Logic for epistemic programs. Synthese 139(2):165–224

    Article  MathSciNet  MATH  Google Scholar 

  • Baltag A, Moss L, Solecki S (1998) The logic of common knowledge, public announcement, and private suspicions. In: Gilboa I (ed) Proceedings of the 7th conference on theoretical aspects of rationality and knowledge (TARK98), pp 43–56

  • Barker S (2002) Protecting deductive databases from unauthorized retrieval and update requests. Data Knowl Eng 43(3):295–315

    Article  MathSciNet  Google Scholar 

  • Barth A, Datta A, Mitchell JC, Nissenbaum H (2006) Privacy and contextual integrity: framework and applications. In: IEEE symposium on security and privacy. IEEE Computer Society, Los Alamitos, pp 184–198

  • Barth A, Mitchell JC, Datta A, Sundaram S (2007) Privacy and contextual integrity: framework and applications. In: IEEE Computer Security Foundations Symposium CSF’07. IEEE Computer Society, Los Alamitos, pp 279–294

  • Bishop M (2003) Computer security: art and science. Addison Wesley Professional, Boston

    Google Scholar 

  • Blackburn P, de Rijke M, Venema Y (2001) Modal logic, Cambridge tracts in computer science, vol 53. Cambridge University Press, Cambridge

    Google Scholar 

  • Boella G, Governatori G, Rotolo A, van der Torre L (2010) A logical understanding of legal interpretation. In: Principles of knowledge representation and reasoning: proceedings of the twelfth international conference, KR 2010. AAAI Press

  • Bonatti P, Kraus S, Subrahmanian V (1995) Foundations of secure deductive databases. IEEE Trans Knowl Data Eng 7(3):406–422

    Article  Google Scholar 

  • Brewer DFC, Nash MJ (1989) The chinese wall security policy. In: IEEE symposium on security and privacy. IEEE Computer Society, Los Alamitos, pp 206–214

  • Castañeda HN (1981) The paradoxes of deontic logic: the simplest solution to all of them in one fell swoop. In: Hilpinen R (ed) New studies in deontic logic: norms, actions, and the foundations of ethics, synthese library. Reidel Publishing Co., pp 37–86

  • Castañeda HN (1988) Knowledge and epistemic obligation. Philos Perspect 2:211–233

    Article  Google Scholar 

  • Cranor L (2002) Web Privacy with P3P. O’Reilly and Associates Inc, USA

    Google Scholar 

  • Cuppens F (1993) A logical formalization of secrecy. In: IEEE computer security foundations workshop CSFW’93. IEEE Computer Society, Los Alamitos

  • Cuppens F, Demolombe R (1996) A deontic logic for reasoning about confidentiality. In: Deontic logic, agency and normative systems, third international workshop on deontic logic in computer science (DEON 1996). Springer, Berlin

  • Cuppens F, Demolombe R (1997) A modal logical framework for security policies. In: Ras Z, Skowron A (eds) Foundations of intelligent systems, 10th international symposium, ISMIS ’97. Springer, Berlin, LNCS, vol 1325, pp 579–589

  • DeYoung H, Garg D, Jia L, Kaynar D, Datta A (2010) Experiences in the logical specification of the HIPAA and GLBA privacy laws. In: Proceedings of the 9th annual ACM workshop on privacy in the electronic society, ACM, New York, WPES ’10, pp 73–82

  • Fagin R, Halpern J, Moses Y, Vardi M (1995) Reasoning about knowledge. MIT Press, UK

    MATH  Google Scholar 

  • Federal Trade Commission (1998) Children’s Online Privacy Protection Act of 1998 (COPPA). http://www.ftc.gov/ogc/coppa1.htm

  • Federal Trade Commission (1999) Gramm-Leach-Bliley Act (GLBA). http://www.ftc.gov/privacy/glbact/glbsub1.htm

  • Halpern J, Moses Y (1992) A guide to completeness and complexity for modal logics of knowledge and belief. Artif Intell 54(3):311–379

    MathSciNet  Google Scholar 

  • Hinke TH (1988) Database inference engine design approach. In: Database security DBSec, pp 247–262

  • Horty J (2001) Agency and deontic logic. Oxford University Press, USA

    Book  MATH  Google Scholar 

  • Kanovich M, Rowe P, Scedrov A (2007) Collaborative planning with privacy. In: IEEE computer security foundations symposium CSF’07. IEEE Computer Society, Los Alamitos, pp 265–278

  • Karjoth G, Schunter M (2002) A privacy policy model for enterprises. In: IEEE computer security foundations workshop CSFW’02. IEEE Computer Society, Los Alamitos

  • Lam P, Mitchell J, Sundaram S (2009) A formalization of HIPAA for a medical messaging system. In: Trust, privacy and security in digital business, TrustBus 2009. Springer, Berlin, pp 73–85

  • May M, Gunter C, Lee I (2006) Privacy APIs: Access control techniques to analyze and verify legal privacy policies. In: IEEE computer security foundations symposium CSF’06. IEEE Computer Society, Los Alamitos, pp 85–97

  • Meyer JJC (1988) A different approach to deontic logic: deontic logic viewed as a variant of dynamic logic. Notre Dame J Formal Logic 29(1)

  • Moses T (2005) Extensible Access Control Markup Language (XACML) version 2.0. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf

  • Nielson H, Nielson F (2007) A flow-sensitive analysis of privacy properties. In: IEEE computer security foundations symposium CSF’07. IEEE Computer Society, Los Alamitos, pp 249–264

  • Office for Civil Rights (2003) Summary of the HIPAA privacy rule. http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/privacysummary.pdf

  • Pacuit E, Parikh R, Cogan E (2006) The logic of knowledge based obligation. Synthese 149(2):311–341

    Article  MathSciNet  MATH  Google Scholar 

  • Sahlqvist H (1975) Completeness and correspondence in the first and second order semantics for modal logics. In: Kanger S (ed) Proceedings of the 3rd Scandinavian logic symposium 1973, North Holland, no. 82 in Studies in Logic

  • Sweeney L (2002) k-anonymity: a model for protecting privacy. Int J Uncertainty Fuzziness Knowl-Based Syst 10(5):557–570

    Article  MathSciNet  MATH  Google Scholar 

  • United Nations General Assembly (1948) Universal Declaration of Human Rights (UDHR). http://www.un.org/en/documents/udhr/index

  • van Ditmarsch H, van der Hoek W, Kooi B (2007) Dynamic epistemic logic, synthese library, vol 337. Springer, Berlin

    Google Scholar 

  • Van der Meyden R (1996) The dynamic logic of permission. J Logic Comput 6:465–479

    Article  MathSciNet  MATH  Google Scholar 

  • Warren S, Brandeis L (1890) The right to privacy. Harvard Law Rev 193(4):193–220

    Article  Google Scholar 

  • Westin A (1968) Privacy and freedom. 5th edn. Atheneum, New York

    Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers of this paper for their extensive and helpful comments.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Guillaume Aucher.

Appendices

Appendix 1: An extension of Castañeda’s deontic logic

In this Appendix, we give an extension of our epistemic deontic logic embedding Castañeda’s deontic logic (Castañeda 1981). Starting from a linguistic analysis, the insight of Castañeda is to acknowledge the grammatical duality of expressions depending on whether they are within or without the scope of an obligation operator. This leads him formally to introduce two sets of formulas: circumstances which cannot alone be the foci of deontic operators, unlike what he calls practitions. The former are usually expressed grammatically in the indicative form and the latter are usually expressed grammatically in the infinitive/subjunctive form. For example, “Freud cures Anna O” in the indicative form is a circumstance, but the same sentence in “it is obligatory that Freud cures Anna O” in subjunctive/infinitive form is a practition. Just as practitions are the foci of deontic operators, circumstances are dually the foci of knowledge operators, as pointed out by Castañeda (1988). In that respect, note that an expression ϕ in the scope of a knowledge operator K r ϕ is always in the indicative form and never in the subjunctive/infinitive form, even if K r ϕ is in the scope of a deontic operator O.

We extend Castañeda (1988)’s intuition to the context of epistemic permissions and obligations. In a deontic setting the reading of the term knowledge or belief can be twofold: either as a circumstance or as a practition. On the one hand, in the sentence “it is obligatory that John knows / for John to know that there is an infinity of prime numbers”, the verb ‘to know’ is the focus of a deontic operator and is in the subjunctive/infinitive form. On the other hand, the sentence “John knows that there is an infinity of prime numbers” alone describes a circumstance and the interpretation of the verb ‘to know’ in the indicative form matches the one usually studied in epistemic logic. The former use of the term knowledge within the scope of a deontic operator is not studied in epistemic logic. For these reasons we enrich the language of Castañeda with two knowledge modalities, one for circumstances K r and the other one for epistemic practitions K r ′. This allows us to express new kinds of statements which cannot be expressed directly with our language \({{\fancyscript{L}}_{DEDL}, }\) such as

$$ O_s(K_r\phi\rightarrow K_r'\psi) $$
(10)

Formula 10 reads as ‘it is obligatory for the Sender that, if the Recipient knows ϕ then he also knows ψ’. In our language \({{\fancyscript{L}}_{DEDL}, }\) this statement would be expressed by the intuitively equivalent but formally different expression:

$$ K_r\phi\rightarrow O_sK_r'\psi $$
(11)

Formula 11 reads as ‘if the Recipient knows ϕ then it is obligatory for the Sender that the Recipient also knows ψ’. Both of these formulations 10 and 11 are intuitively equivalent, but they are both intuitively different from the following expression:

$$ O_s(K_r'\phi\rightarrow K_r'\psi) $$
(12)

Formula 12 reads as ‘if it is obligatory for the Sender that the Recipient knows ϕ then it is also obligatory for the Sender that the Recipient knows ψ’. Note that this last formulation 12 is itself also quite similar to the reading of the formula \(O_sK_r'\phi\rightarrow O_sK_r'\psi. \) Formula 10 is not a well-formed formula of our language \({{\fancyscript{L}}_{DEDL}, }\) but it is a well-formed formula of the following language \({{\fancyscript{L}}_{DL}.}\)

Definition 13

Let \(\Upphi^{\alpha}\) be a set of propositional letters. The language \({{\fancyscript{L}}_{DL}={\fancyscript{L}}^{\phi'}_{EDL}\cup{\fancyscript{L}}^{\alpha'}_{EDL},}\) whose formulas are denoted ϕ* in general, is defined inductively as follows.

$$ \begin{aligned} {\fancyscript{L}}^{\phi'}_{EDL}:\phi&::=p\mid \neg\phi\mid\phi\land\phi\mid K_r\phi\mid O_s\alpha\\ {\fancyscript{L}}^{\alpha'}_{EDL}:\alpha&::=\beta\mid K_r\phi\mid\neg\alpha\mid\alpha\land\alpha\mid\alpha\land\phi\mid\phi\land\alpha \end{aligned} $$

where p ranges over \(\Upphi^{\phi}\) and β over \(\Upphi^{\alpha}.\)The only difference with the language \({{\fancyscript{L}}_{DL}}\) is that we now have pure practitions \(\Upphi^{\alpha}\) and that practitions can now be of the form \(\phi\land\alpha\) or \(\phi\rightarrow\alpha\) where ϕ is a circumstance. Pure practitions \(\Upphi^{\alpha}\) are expressions in the scope of a deontic operator that cannot be expressed with a knowledge operator, such as ‘to cure Anna O’ in ‘it is obligatory to cure Anna O’. Therefore, just as epistemic practitions, they are in the subjunctive/infinitive form. Moreover, with this definition of practitions we can also express formulas of the form \(O_s(\phi\rightarrow\alpha)\) and in particular Formula 10 above. Obviously, we would like to have the following validity:

$$ \models O_s(\phi\rightarrow\alpha)\leftrightarrow(\phi\rightarrow O_s\alpha) $$

which is a generalization to the epistemic case of Castañeda’s key validity. For example, “it is obligatory that if Freud knows that Anna O is sick, then he cures her” (\(O_s(K_r\phi\rightarrow \alpha)\)) has the same meaning as “if Freud knows that Anna O is sick, then it is obligatory that he cures her” (\(K_r\phi\rightarrow O_s\alpha\)). This would also make Formulas 10 and 11 formally equivalent. To obtain this validity, we need to add an extra condition (*) in our definition of EDL-model and so define EDL-model’.

Definition 14

An EDL-modelM is a tuple M = (WDRR′, V), where W is a non-empty set of possible worlds, \(R:W\rightarrow 2^W, R':W\rightarrow 2^W\) and \(D:W\rightarrow 2^W\) are accessibility relations on WD being serial. \(V:\Upphi^{\phi}\cup\Upphi^{\alpha}\rightarrow 2^W\) is a valuation such that:Footnote 7

$$ \hbox{for all} \,w\in W, \hbox{ all } v,v'\in D(w)\cup\{w\}, (M,v) \hbox{ is } R D-\hbox{bisimilar to} (M,v'). $$
(*)

The truth conditions are defined as in Definition 14.

The semantic condition (∗) intuitively means that the (epistemic) context where a normative system applies is fixed. One can easily show that any Castañeda model (Castañeda 1981) can be embedded into an EDL-model’, in the sense that the Castañeda model and the corresponding EDL-model’ satisfy the same formulas of \({{\fancyscript{L}}_{EDL}'}\) without epistemic operators K r or K r ′. One can also show that the semantics of \({{\fancyscript{L}}_{EDL}'}\) is sound and complete with respect to the logic \(\mathsf{L}_{EDL}\) to which we add the axiom scheme \(\vdash O_s(\phi\rightarrow\alpha)\leftrightarrow(\phi\rightarrow O_s\alpha). \)

Theorem 7

The semantics of \({{\fancyscript{L}}_{EDL}'}\) is sound and complete with respect to the logic \(\mathsf{L}_{\mathsf{EDL}}'\) axiomatized as follows. The symbol K below stands either for K r or K r ′.

$$ \begin{array}{lll} {\mathsf{A}}_1 & All\, propositional\, tautologies\, based\, on\,\Upphi^{\phi}\\ {\mathsf{A}}_2 & \vdash O_s(\phi\rightarrow\alpha)\leftrightarrow(\phi\rightarrow O_s\alpha)\\ {\mathsf{A}}_3 & \vdash O_s\alpha\rightarrow P_s\alpha\\ {\mathsf{A}}_4 & \vdash O_s(\alpha\rightarrow\alpha')\rightarrow(O_s\alpha\rightarrow O_s\alpha')\\ {\mathsf{A}}_5 & \vdash K(\phi^*\rightarrow\psi^*)\rightarrow(K\phi^*\rightarrow K\psi^*)\\ {\mathsf{R}}_1 & If \vdash\alpha\, then \vdash O_s\alpha \\ {\mathsf{R}}_2 & If \vdash\phi^* then \vdash K\phi^*\\ {\mathsf{R}}_3 & If \vdash\phi^*\rightarrow\psi^* and \vdash\phi^* then \vdash\psi^*\\ \end{array} $$

Proof

Soundness is routine. We prove completeness by building the canonical model of our logic. Let W be the set of all maximal \(\mathsf{L}_{\mathsf{EDL}}'\)-consistent subsets of \({{\fancyscript{L}}_{DL}. }\) For all \(\Upgamma,\Upgamma'\in W, \) we set \(\Upgamma'\in R(\Upgamma)\) iff for all \(K_r\phi\in\Upgamma, \phi\in\Upgamma'. \) We define O s and R′ similarly. Besides, for all \(\Upgamma\in W, \Upgamma\in V(p)\) iff \(p\in\Upgamma, \) and \(\Upgamma\in V(\beta)\) iff \(\beta\in\Upgamma. \) We have therefore defined the canonical model M = (WDRR′, V). We now show by induction on ϕ the ‘truth lemma’: for all \(\Upgamma\in W\) and \({\phi\in{\fancyscript{L}}_{DL}, M,\Upgamma\models\phi}\) iff \(\phi\in \Upgamma (1). \) If \(\Upgamma=p\) then (1) holds. The other boolean cases work by induction hypothesis. Assume ϕ = K r ϕ′. If \(K_r\phi'\in\Upgamma\) then for all \(\Upgamma'\in R(\Upgamma), \phi'\in\Upgamma'\) by definition of R. So \(M,\Upgamma'\models\phi'\) for all \(\Upgamma'\in R(\Upgamma)\) by induction hypothesis, i.e., \(M,\Upgamma\models K_r\phi'. \) If \(M,\Upgamma\models K_r\phi'\) then assume that \({S\subseteq\{\phi\in{\fancyscript{L}}_{DL}\mid K_r\phi\in \Upgamma\}\cup\{\neg\phi'\}}\) is consistent. It follows that there is \(\Upgamma^0\in W\) such that \(S\subseteq\Upgamma^0. \) So there is \(\Upgamma^0\in R(\Upgamma)\) such that \(\neg\phi'\in \Upgamma^0. \) Therefore \(M,\Upgamma\models\neg K_r\phi'\) which is absurd. So S is inconsistent and so there must be \(\phi^1,\ldots,\phi^n\in S\) such that \(\vdash(\phi^1\land\cdots\land\phi^n)\rightarrow\phi'. \) By \(\mathsf{R}_2\) and \(\mathsf{A}_5\) we get \(\vdash(K_r\phi^1\land\cdots\land K_r\phi^n)\rightarrow K_r\phi'\) and because \(K_r\phi^i\in\Upgamma, \) we finally have \(K_r\phi'\in \Upgamma. \) The proof is similar for the operators O s and K r ′. One can also show that D is serial.

Now we have to show that condition (∗∗) holds in our canonical model M. We first show that for all \(\Upgamma\in W, \) all \(\Upgamma',\Upgamma''\in D(\Upgamma)\cup\{\Upgamma\}, \Upgamma'\leftrightsquigarrow\Upgamma'' \), i.e., for all \({\phi\in{\fancyscript{L}}^{\phi'}_{EDL}, \phi\in\Upgamma'}\) iff \(\phi\in\Upgamma''. \) Let \({\phi\in{\fancyscript{L}}^{\phi'}_{EDL}}\) and assume \(\phi\in\Upgamma'. \) If \(\phi\notin\Upgamma\) then \(\neg\phi\in\Upgamma, \) and \(O_s\alpha\in\Upgamma\) for some \({\alpha\in{\fancyscript{L}}^\alpha_{EDL}. }\) So \(M,\Upgamma\models\neg\phi\land O_s\alpha, \) therefore \(M,\Upgamma\models O_s(\neg\phi\land\alpha). \) Then \(M,\Upgamma'\models\neg\phi\land\alpha, \) and so \(\neg\phi\in\Upgamma'. \) This is impossible, so \(\phi\in\Upgamma. \) By the same reasoning we get that \(\phi\in\Upgamma''. \) Likewise vice versa. We now show that \(\leftrightsquigarrow\) is a R D-bisimulation relation. Assume \(\Upgamma\leftrightsquigarrow\Upgamma'. \) The base case for \(\Upphi^{\phi}\) clearly works. We prove the forth condition for R. Let \(\Upgamma_1\in R(\Upgamma)\) and let \({\Upgamma_1^*=\{\phi\in{\fancyscript{L}}^{\phi'}_{EDL}\mid\phi\in\Upgamma_1\}}\) and assume that for all \(\Upgamma_1'\in R(\Upgamma')\) it is not the case that \(\Upgamma_1\leftrightsquigarrow\Upgamma_1', \) i.e., \(\Upgamma^*_1\nsubseteq\Upgamma_1'. \) Let \(S_1=\Upgamma^*_1-\underset{\Upgamma_1'\in R(\Upgamma')}{\bigcup}\Upgamma_1'\) and let us define S = S 1S 2 where \({S_2=\{\phi\in{\fancyscript{L}}^{\phi'}_{EDL}\mid K_r\phi\in\Upgamma\}}\). S is consistent, because \(S\subseteq\Upgamma_1. \) So there is \(\Upgamma_2\in W\) such that \(S\subseteq\Upgamma_2. \) But \({\{\phi\in{\fancyscript{L}}^{\phi'}_{EDL}\mid K_r\phi\in\Upgamma'\}=\{\phi\in{\fancyscript{L}}^{\phi'}_{EDL}\mid K_r\phi\in\Upgamma'\}=\{\phi\in{\fancyscript{L}}^{\phi'}_{EDL}\mid K_r\phi\in\Upgamma\}}\) because \(\Upgamma\leftrightsquigarrow\Upgamma'.\,\Upgamma_2\in R(\Upgamma')\) and \(S_1\subseteq\Upgamma_2\) which is impossible by assumption. So there is \(\Upgamma_1'\in R(\Upgamma)\) such that \(\Upgamma^*\subseteq\Upgamma_1', \) i.e., such that \(\Upgamma_1\leftrightsquigarrow\Upgamma_1'. \) The same reasoning applies for the back condition. It also applies for the back and forth conditions for D by replacing S 2 by \({S_2'=\{\alpha\in{\fancyscript{L}}^{\alpha'}_{EDL}\mid O_s\alpha\in\Upgamma\}. }\) \(\square\)

Axioms \(\mathsf{A}_1\) to \(\mathsf{A}_4\) and rules \(\mathsf{R}_1\) and \(\mathsf{R}_3\) provide an alternative axiomatization of Castañeda’s language. We can then derive in this logic the following theorems. In particular, note that our notion of knowledge is truthful, even if it was not explicitly mentioned in the axiomatization.

Proposition 5

For all \({\phi\in{\fancyscript{L}}_{EDL}, }\)

$$ \vdash K_r'\phi\rightarrow\phi $$
(13)
$$ \vdash K_r\phi\rightarrow\phi $$
(14)
$$ \vdash O_sK_r'\phi\rightarrow\phi $$
(15)
$$ \vdash \neg P_s K_r' \phi\rightarrow\phi $$
(16)

Equation 16 allows us to derive that as a result of informing the recipient that he should not know that ϕ holds, this very Recipient actually learns that ϕ holds. Indeed, as a result of sending this message, the Recipient knows that he should not know ϕ (\(K_r\neg P_sK_r'\phi\)), and therefore by application of Equation 16, he also knows that ϕ (K r ϕ). This derivation was not possible in our logic \(\mathsf{L}_{DEDL}, \) as we noted it in Example 9.

Appendix 2: Algorithms \({Add_1^{\fancyscript{P}}}\) and \({Add_2^{\fancyscript{P}}}\)

Algorithms \({Add_1^{\fancyscript{P}}}\) and \({Add_2^{\fancyscript{P}}}\) below (i.e. Algorithms 5 and 6) are called in Algorithm 4. They are adapted from algorithms Add 1 and Add 2 (i.e. Algorithms 2 and 3) to take into account the presence of the privacy policy \({\fancyscript{P}}\) in the language \({{\fancyscript{L}}_{PL}. }\)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Aucher, G., Boella, G. & van der Torre, L. A dynamic logic for privacy compliance. Artif Intell Law 19, 187 (2011). https://doi.org/10.1007/s10506-011-9114-3

Download citation

  • Published:

  • DOI: https://doi.org/10.1007/s10506-011-9114-3

Keywords

Navigation