- Information Security and Cryptography
- Building E9 1, Room 3.17
- +49 681 302 57370
- Personal Webpage
For checking compliance with privacy regulations, the respective laws have to be represented in a computer-readable form. Classically, this is done by modeling laws as logical formulas and verifying whether a predicate is logically entailed.
This is in contrast to the juristical judgement of compliance, where it is common to judge on precedents. In this project we formalize case-law and use this formalization to learn in which contexts a given predicate is satisfiable.