2013 IEEE Security and Privacy Workshops 2013
DOI: 10.1109/spw.2013.24
|View full text |Cite
|
Sign up to set email alerts
|

How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective

Abstract: These days, sensitive and personal information is used within a wide range of applications. The exchange of this information is increasingly faster and more and more unpredictable. Hence, the person concerned cannot determine what happens with his personal data after it has been released. It is highly intransparent who is accountable for data misuse. Usage control and provenance tracking are two different approaches to tackle this problem. This work compares the two concepts from a data protection perspective.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(18 citation statements)
references
References 19 publications
0
18
0
Order By: Relevance
“…If the PDP allows the event to happen, the information flow model of the PIP is updated. Provenance tracking takes advantage of the information flow state represented by the PIP and provides comprehensive information to the person concerned (data subject) [1].…”
Section: Architecturementioning
confidence: 99%
See 3 more Smart Citations
“…If the PDP allows the event to happen, the information flow model of the PIP is updated. Provenance tracking takes advantage of the information flow state represented by the PIP and provides comprehensive information to the person concerned (data subject) [1].…”
Section: Architecturementioning
confidence: 99%
“…Our implementation is built on Thunderbayes++. 1 We selected it because it integrates SpamBayes, 2 an one-to-one implementation of the methodology of Robinson and Graham. We adapted SpamBayes such as only the body and the subject of a message are analyzed for classification.…”
Section: Architecturementioning
confidence: 99%
See 2 more Smart Citations
“…However, while IFC enforcement is a step towards demonstrating compliance with regulation requirements, a mechanism to provide transparency over data usage and processing is needed to complement IFC. Indeed, Bier [5] argues for the integration of usage control and provenance. Information Flow Control and Audit has been introduced by Pasquier et al [6] to complement IFC to facilitate insight into data provenance [7] through visualisation and analysis of how information has actually flowed across the system.…”
Section: Introductionmentioning
confidence: 99%