2010
DOI: 10.1007/978-3-642-15877-3_14
|View full text |Cite
|
Sign up to set email alerts
|

A Provenance-Based Compliance Framework

Abstract: Abstract. Given the significant amount of personal information available on the Web, verifying its correct use emerges as an important issue. When personal information is published, it should be later used under a set of usage policies. If these policies are not followed, sensitive data could be exposed and used against its owner. Under these circumstances, processing transparency is desirable since it allows users to decide whether information is used appropriately. It has been argued that data provenance can… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 13 publications
0
5
0
Order By: Relevance
“…In the realm of data classification and grading, scholars typically commence their endeavors by establishing policies to ensure data compliance, which serves as a foundational step in constructing programs and frameworks for data classification and grading. For instance, Aldeco-Perez et al introduced a compliance analysis framework based on data source and data usage, aligned with the UK Data Protection Act [24,25]. Their approach focuses on averting the misuse of personal sensitive data and evaluating the propriety of its utilization.…”
Section: Data Classification and Grading Frameworkmentioning
confidence: 99%
“…In the realm of data classification and grading, scholars typically commence their endeavors by establishing policies to ensure data compliance, which serves as a foundational step in constructing programs and frameworks for data classification and grading. For instance, Aldeco-Perez et al introduced a compliance analysis framework based on data source and data usage, aligned with the UK Data Protection Act [24,25]. Their approach focuses on averting the misuse of personal sensitive data and evaluating the propriety of its utilization.…”
Section: Data Classification and Grading Frameworkmentioning
confidence: 99%
“…Towards such a mapping, provenance mechanisms show real potential [38,23,30,20,39]. Provenance concerns capturing information describing data: it can involve recording the data's lineage, including where it came from, where it moves to, and the associated dependencies, contexts (e.g.…”
Section: Technical Mechanisms For Supporting Reviewabilitymentioning
confidence: 99%
“…Provenance is an active area of research [41], and is commonly applied in a research context to assist in reproducibility by recording the data, workflows and computation of scientific processes [41,42]. The potential for provenance to assist compliance with specific information management (compliance) obligations has previously been considered [38,30,39,20,23], though these often focus on a particular technical aspect, be it representation or capture. However, the use of data provenance methods for general systems-related accountability concerns represents an emerging area warranting further consideration.…”
Section: Decision Provenance: Exposing the Decision Pipelinesmentioning
confidence: 99%
“…Provenance is an active area of research [25], and is commonly applied in a research context to assist in reproducibility by recording the data, workflows and computation of scientific processes [25], [26]. The potential for provenance to assist compliance with specific information management obligations has previously been considered (often focusing on a particular technical aspect, be it representation or capture) [22], [23], [27]- [29]. However, the use of data provenance methods generally for systems-related accountability concerns, as detailed above, has yet to be considered in depth.…”
Section: Decision Provenance: Exposing the Decision Pipelinementioning
confidence: 99%
“…21 Though, as mentioned, provenance has been considered for some specific compliance aspects (see for e.g. [22], [23], [27]- [29]), the broader accountability considerations have yet to be explored in depth. In terms of decision provenance operating between systems and across boundaries, many of the open challenges predominately stem from the scale, federation, and complexity of what are effectively wide-scale distributed systems that can encompass a range of technologies, and also a number of organisations with different and possibly competing incentives.…”
Section: Using the Decision Pipeline: Points For Investigationmentioning
confidence: 99%