2008
DOI: 10.14236/ewic/vocs2008.13
|View full text |Cite
|
Sign up to set email alerts
|

Provenance-based Auditing of Private Data Use

Abstract: Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and exposition of private data to unauthorized recipients have been publicly and widely advertised. For authorities and system administrators to check compliance to regulations, auditing of private data processing becomes crucial in IT systems. Finding the origin of some data, determining how some data is being used, checking that the process… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 19 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…In the realm of data classification and grading, scholars typically commence their endeavors by establishing policies to ensure data compliance, which serves as a foundational step in constructing programs and frameworks for data classification and grading. For instance, Aldeco-Perez et al introduced a compliance analysis framework based on data source and data usage, aligned with the UK Data Protection Act [24,25]. Their approach focuses on averting the misuse of personal sensitive data and evaluating the propriety of its utilization.…”
Section: Data Classification and Grading Frameworkmentioning
confidence: 99%
“…In the realm of data classification and grading, scholars typically commence their endeavors by establishing policies to ensure data compliance, which serves as a foundational step in constructing programs and frameworks for data classification and grading. For instance, Aldeco-Perez et al introduced a compliance analysis framework based on data source and data usage, aligned with the UK Data Protection Act [24,25]. Their approach focuses on averting the misuse of personal sensitive data and evaluating the propriety of its utilization.…”
Section: Data Classification and Grading Frameworkmentioning
confidence: 99%
“…In difference to our work they assume that a global model of the observed services is given by the BPEL specification. The authors of (Aldeco-Perez et al, 2008) present an architecture for auditing private data in IT-Systems by collecting provenance information. Their architecture is also based on requirements specified by privacy laws.…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, on the one hand, data provenance is essential to scientific environments. Many works describe details of data provenance [ 1 , 2 ], classify their characteristics [ 3 ], propose models [ 4 - 7 ] and present practical applications [ 8 , 9 ]. Buneman et al [ 10 ] define data provenance as "the description of the origins of a piece of data and the process by which it arrived in a database" .…”
Section: Introductionmentioning
confidence: 99%