2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications 2014
DOI: 10.1109/trustcom.2014.66
|View full text |Cite
|
Sign up to set email alerts
|

Trust Mechanism for Enforcing Compliance to Secondary Data Use Contracts

Abstract: In many research and business domains, there are efforts to develop systems that aggregate user data gathered by various data sources. This approach involves secondary sharing of user data and potentially benefits the user in terms of improved personalization and better experience. However, concerns regarding privacy arise when sharing user data with unknown third parties. These concerns can be alleviated at two stages: i) ensuring selective control of the applications to share user data with, and ii) monitori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…Such mechanisms can help inform firms about the reputation of prospective data users before deciding to participate in data sharing. Finally, Noorian et al (2014) proposed a data use agreement that clearly states the purpose of data usage, including the penalty that will be enforced in the event of a violation.…”
Section: Trust and Perceived Risks In Data Sharingmentioning
confidence: 99%
“…Such mechanisms can help inform firms about the reputation of prospective data users before deciding to participate in data sharing. Finally, Noorian et al (2014) proposed a data use agreement that clearly states the purpose of data usage, including the penalty that will be enforced in the event of a violation.…”
Section: Trust and Perceived Risks In Data Sharingmentioning
confidence: 99%
“…A brand-new milling machine is created in order to gather and process data from a single data owner. It is not allowed to combine personal data from different individuals within a single machine mill [12]. Data Mill either could be located in the cloud or within the local device within the smart home (e.g., as part of Amazon Echo or Google Home) [13].…”
Section: Data Studiomentioning
confidence: 99%