-
Notifications
You must be signed in to change notification settings - Fork 0
/
main.bib
232 lines (209 loc) · 14.1 KB
/
main.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
@online{meta-fine,
title = {Meta Fined \$1.3 Billion for Violating E.U. Data Privacy Rules},
author = {Satariano, Adam},
url = {https://www.nytimes.com/2023/05/22/business/meta-facebook-eu-privacy-fine.html?unlocked_article_code=1.nk0.KFcs.zTTKmSZwMUhz&smid=url-share},
urldate = {2024-04-27},
year = {2023},
month = may,
}
@online{amazon-fine,
title = {Amazon to Pay \$25 Million to Settle Children’s Privacy Charges},
author = {Singer, Natasha},
url = {https://www.nytimes.com/2023/05/31/technology/amazon-25-million-childrens-privacy.html?unlocked_article_code=1.nk0.fGdA.IFRM2SYu7oGe&smid=url-share},
urldate = {2024-04-27},
year = {2023},
month = may,
}
@online{CostContinuousCompliance2020,
title = {The {{Cost}} of {{Continuous Compliance}}},
year = {2020},
month = feb,
journal = {DataGrail},
url = {https://www.datagrail.io/resources/reports/gdpr-ccpa-cost-report/},
urldate = {2023-02-01},
abstract = {Read this report to learn about the challenges companies faced while preparing for and sustaining their privacy compliance programs.},
langid = {english}
}
@online{cnl-def,
title = {Controlled Natural Language},
url = {http://www.sigcnl.org/},
urldate = {2023-02-01},
}
@online{smithGDPRRacketWho,
title = {The {{GDPR Racket}}: {{Who}}'s {{Making Money From This}} \$9bn {{Business Shakedown}}},
shorttitle = {The {{GDPR Racket}}},
author = {Smith, Oliver},
journal = {Forbes},
url = {https://www.forbes.com/sites/oliversmith/2018/05/02/the-gdpr-racket-whos-making-money-from-this-9bn-business-shakedown/},
urldate = {2023-02-01},
abstract = {Lawyers, consultants and technology vendors have raked in a combined \$1.1 billion from Britain's FTSE 350 and \$7.8 billion from America's Fortune 500 companies in preparing for GDPR.},
chapter = {Business},
langid = {english}
}
@online{freedit-pageviews,
url = {https://github.com/freedit-org/freedit/blob/f5905db9ea3c8630d61c80143d5f2553ee654b15/src/controller/user.rs#L1096},
title = {Freddit: Pageview data retention},
urldate = {2024-04-19},
}
@article{ferranteProgramDependenceGraph1987,
title = {The Program Dependence Graph and Its Use in Optimization},
author = {Ferrante, Jeanne and Ottenstein, Karl J. and Warren, Joe D.},
year = {1987},
month = jul,
journal = {ACM Transactions on Programming Languages and Systems},
volume = {9},
number = {3},
pages = {319--349},
issn = {0164-0925},
doi = {10.1145/24039.24041},
url = {https://dl.acm.org/doi/10.1145/24039.24041},
urldate = {2023-04-16},
abstract = {In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependences for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program. Control dependences are introduced to analogously represent only the essential control flow relationships of a program. Control dependences are derived from the usual control flow graph. Many traditional optimizations operate more efficiently on the PDG. Since dependences in the PDG connect computationally related parts of the program, a single walk of these dependences is sufficient to perform many optimizations. The PDG allows transformations such as vectorization, that previously required special treatment of control dependence, to be performed in a manner that is uniform for both control and data dependences. Program transformations that require interaction of the two dependence types can also be easily handled with our representation. As an example, an incremental approach to modifying data dependences resulting from branch deletion or loop unrolling is introduced. The PDG supports incremental optimization, permitting transformations to be triggered by one another and applied only to affected dependences.}
}
@inproceedings{resin,
author = {Yip, Alexander and Wang, Xi and Zeldovich, Nickolai and Kaashoek, M. Frans},
title = {Improving Application Security with Data Flow Assertions},
year = {2009},
isbn = {9781605587523},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
url = {https://doi.org/10.1145/1629575.1629604},
doi = {10.1145/1629575.1629604},
abstract = {Resin is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. Resin provides policy objects, which programmers use to specify assertion code and metadata; data tracking, which allows programmers to associate assertions with application data, and to keep track of assertions as the data flow through the application; and filter objects, which programmers use to define data flow boundaries at which assertions are checked. Resin's runtime checks data flow assertions by propagating policy objects along with data, as that data moves through the application, and then invoking filter objects when data crosses a data flow boundary, such as when writing data to the network or a file.Using Resin, Web application programmers can prevent a range of problems, from SQL injection and cross-site scripting, to inadvertent password disclosure and missing access control checks. Adding a Resin assertion to an application requires few changes to the existing application code, and an assertion can reuse existing code and data structures. For instance, 23 lines of code detect and prevent three previously-unknown missing access control vulnerabilities in phpBB, a popular Web forum application. Other assertions comprising tens of lines of code prevent a range of vulnerabilities in Python and PHP applications. A prototype of Resin incurs a 33\% CPU overhead running the HotCRP conference management application.},
booktitle = {Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles},
pages = {291–304},
numpages = {14},
keywords = {sql injection, php, python, privacy, security, xss, web},
location = {Big Sky, Montana, USA},
series = {SOSP '09}
}
@inproceedings{ponder,
author = {Damianou, Nicodemos and Dulay, Naranker and Lupu, Emil and Sloman, Morris},
title = {The Ponder Policy Specification Language},
year = {2001},
isbn = {3540416102},
publisher = {Springer-Verlag},
address = {Berlin, Heidelberg},
abstract = {The Ponder language provides a common means of specifying security policies that map onto various access control implementation mechanisms for firewalls, operating systems, databases and Java. It supports obligation policies that are event triggered condition-action rules for policy based management of networks and distributed systems. Ponder can also be used for security management activities such as registration of users or logging and auditing events for dealing with access to critical resources or security violations. Key concepts of the language include roles to group policies relating to a position in an organisation, relationships to define interactions between roles and management structures to define a configuration of roles and relationships pertaining to an organisational unit such as a department. These reusable composite policy specifications cater for the complexity of large enterprise information systems. Ponder is declarative, strongly-typed and object-oriented which makes the language flexible, extensible and adaptable to a wide range of management requirements.},
booktitle = {Proceedings of the International Workshop on Policies for Distributed Systems and Networks},
pages = {18–38},
numpages = {21},
series = {POLICY '01}
}
@article{jif,
author = {Myers, Andrew C. and Liskov, Barbara},
title = {Protecting Privacy Using the Decentralized Label Model},
year = {2000},
issue_date = {Oct. 2000},
publisher = {Association for Computing Machinery},
address = {New York, NY, USA},
volume = {9},
number = {4},
issn = {1049-331X},
url = {https://doi.org/10.1145/363516.363526},
doi = {10.1145/363516.363526},
abstract = {Stronger protection is needed for the confidentiality and integrity of data, because programs containing untrusted code are the rule rather than the exception. Information flow control allows the enforcement of end-to-end security policies, but has been difficult to put into practice. This article describes the decentralized label model, a new label model for control of information flow in systems with mutual distrust and decentralized authority. The model improves on existing multilevel security models by allowing users to declassify information in a decentralized way, and by improving support for fine-grained data sharing. It supports static program analysis of information flow, so that programs can be certified to permit only acceptable information flows, while largely avoiding the overhead of run-time checking. The article introduces the language Jif, an extension to Java that provides static checking of information flow using the decentralized label model.},
journal = {ACM Trans. Softw. Eng. Methodol.},
month = {oct},
pages = {410–442},
numpages = {33},
keywords = {end-to-end, information flow controls, confidentiality, roles, policies, integrity, declassification, lattice, type checking, downgrading, principals}
}
@article{hotnets,
author = {Grewal, Karuna and Godfrey, P. Brighten and Hsu, Justin},
booktitle = {},
editor = {},
url = {https://doi.org/10.1145/3626111.3628181},
title = {Expressive Policies For MicroService Networks},
year = {2023},
series = {HotNets '23}
}
@inproceedings{legalese,
author = {Sen, Shayak and Guha, Saikat and Datta, Anupam and Rajamani, Sriram K. and Tsai, Janice and Wing, Jeannette M.},
booktitle = {2014 IEEE Symposium on Security and Privacy},
title = {Bootstrapping Privacy Compliance in Big Data Systems},
year = {2014},
volume = {},
number = {},
pages = {327-342},
doi = {10.1109/SP.2014.28}
}
@inproceedings{privguard,
author = {Lun Wang and Usmann Khan and Joseph Near and Qi Pang and Jithendaraa Subramanian and Neel Somani and Peng Gao and Andrew Low and Dawn Song},
title = {{PrivGuard}: Privacy Regulation Compliance Made Easier},
booktitle = {31st USENIX Security Symposium (USENIX Security 22)},
year = {2022},
isbn = {978-1-939133-31-1},
address = {Boston, MA},
pages = {3753--3770},
url = {https://www.usenix.org/conference/usenixsecurity22/presentation/wang-lun},
publisher = {USENIX Association},
month = aug
}
@inproceedings{riverbed,
author = {Wang, Frank and Ko, Ronny and Mickens, James},
title = {Riverbed: Enforcing User-Defined Privacy Constraints in Distributed Web Services},
year = {2019},
isbn = {9781931971492},
publisher = {USENIX Association},
address = {USA},
abstract = {Riverbed is a new framework for building privacy-respecting web services. Using a simple policy language, users define restrictions on how a remote service can process and store sensitive data. A transparent Riverbed proxy sits between a user's front-end client (e.g., a web browser) and the back-end server code. The back-end code remotely attests to the proxy, demonstrating that the code respects user policies; in particular, the server code attests that it executes within a Riverbed-compatible managed runtime that uses IFC to enforce user policies. If attestation succeeds, the proxy releases the user's data, tagging it with the user-defined policies. On the server-side, the Riverbed runtime places all data with compatible policies into the same universe (i.e., the same isolated instance of the full web service). The universe mechanism allows Riverbed to work with unmodified, legacy software; unlike prior IFC systems, Riverbed does not require developers to reason about security lattices, or manually annotate code with labels. Riverbed imposes only modest performance overheads, with worst-case slowdowns of 10\% for several real applications.},
booktitle = {Proceedings of the 16th USENIX Conference on Networked Systems Design and Implementation},
pages = {615–629},
numpages = {15},
location = {Boston, MA, USA},
series = {NSDI'19}
}
@inproceedings{rulekeeper,
author = {Ferreira, Mafalda and Brito, Tiago and Santos, José and Santos, Nuno},
year = {2023},
month = {05},
pages = {2817-2834},
title = {RuleKeeper: GDPR-Aware Personal Data Compliance for Web Frameworks},
doi = {10.1109/SP46215.2023.10179395}
}
@inproceedings{logical-english,
author = {Kowalski, R. and Dávila, J. and Sartor, G. and Calejo, M.},
year = {2023},
title = {Logical English for Law and Education},
doi = { https://doi.org/10.1007/978-3-031-35254-6_24}
}
@online{lemmy,
title = {Lemmy: A link aggregator and forum for the fediverse},
url = {https://github.com/LemmyNet/lemmy}
}
@online{hyperswitch,
title = {Hyperswitch: An open source payments switch written in Rust to make payments fast, reliable and affordable},
url = {https://github.com/juspay/hyperswitch}
}
@online{atomic,
title = {AtomicServer: a lightweight, yet powerful CMS / Graph Database},
url = {https://github.com/atomicdata-dev/atomic-server}
}
@online{atomic-fix,
title = {AtomicServer (Initial Bug Fix): Prevent Unauthorized Commits},
url = {https://github.com/atomicdata-dev/atomic-server/commit/46a503a},
urldate = {2024-04-19},
}
@online{plume,
title = {Plume: A federated blogging engine based on ActivityPub},
url = {https://github.com/Plume-org/Plume}
}
@online{websubmit,
title = {Websubmit-rs: A Simple Class Submission System},
shorttitle = {Websubmit-rs},
author = {Schwarzkopf, Malte},
year = {2021},
month = oct,
url = {https://github.com/ms705/websubmit-rs}
}
@online{contile,
title = {Contile: The back-end server for the Mozilla Tile Service},
url = {https://github.com/mozilla-services/contile},
urldate = {2024-04-19},
}
@online{freedit,
title = {Freedit: The safest and lightest forum, powered by rust.},
url = {https://github.com/freedit-org/freedit},
urldate = {2024-04-19},
}