Managing privacy and understanding handling of personal data has turned into a fundamental right, at least within the European Union, with the General Data Protection Regulation (GDPR) being enforced since May 25 th 2018. This has led to tools and services that promise compliance to GDPR in terms of consent management and keeping track of personal data being processed. The information recorded within such tools, as well as that for compliance itself, needs to be interoperable to provide sufficient transparency in its usage. Additionally, interoperability is also necessary towards addressing the right to data portability under GDPR as well as creation of user-configurable and manageable privacy policies. We argue that such interoperability can be enabled through agreement over vocabularies using linked data principles. The W3C Data Privacy Vocabulary and Controls Community Group (DPVCG) was set up to jointly develop such vocabularies towards interoperability in the context of data privacy. This paper presents the resulting Data Privacy Vocabulary (DPV), along with a discussion on its potential uses, and an invitation for feedback and participation.
Abstract-This paper describes the experience of managing a requirements process between distributed parties with diverse interests in a research project context. We present some key 'lessons learned' from a new case study, the DESTECS project, and summarise lessons learned from previous experience reports. Key risks include obstacles imposed by the geographic distance; the different domain knowledge and working contexts of partners; and a risk that autonomous partners' goals do not always coincide. Our observations on a new case study broadly support a previous study, but we also propose some new lessons to learn, including the creation of a small, representative 'requirements authority' (RA); investing time in studying common concepts early in the project; and ensuring that expectations for requirements and for deliveries are made explicit.
In a modern house, the number of electronic devices keeps increasing. More and more of these devices become interconnected, to provide new services. And they start disappearing in the environment, forming a truly pervasive home system.The embedded devices in such pervasive networks are usually owned and managed by several entities with conflicting interests. This makes secure remote management of such devices a challenging task. Software development to implement such services need to solve complex security problems and need to be aware of the large spread of capabilities among the different devices.We present ongoing research to apply and extend the JA-SON architecture [1] to handle such remote management and secure software development issues.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.