Given the ubiquity of data acquisition and processing in our everyday life,protecting data sovereignty in distributed systems is a significant topic ofresearch. Usage control and provenance tracking systems are very promisingsteps towards a technical solution for the problem of data sovereignty. However,due to their complexity and diversity these systems are still not fully understood.In this work we investigate the functionality of usage control and provenancetracking systems. We classify them into three different categories based on theirsecurity goals and properties. Furthermore we identify generic use cases forthese systems that help to understand what attack vectors system operators haveto be mindful of
Data provenance describes how data came to be in its present form. It includes data sources and the ...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
These days, sensitive and personal information is used within a wide range of applications. The exch...
Across the world, organizations are required to comply with regulatory frameworks dictating how to m...
While provenance research is common in distributed systems, many proposed solutions do not address t...
In times of strongly (personal) data-driven economy, the inception of the European General Data Prot...
In times of strongly (personal) data-driven economy, the inception of the European General Data Prot...
Achieving data protection and privacy in modern data processing systems is a prominent topic of acad...
The concept of provenance is well known by some, and completely unknown to others. In this talk I gi...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
With the development of data transactions, data security issues have become increasingly important. ...
Provenance is defined as the origin or the earliest known history of a thing. In the aspect of dat...
As cloud computing and virtualization technologies become mainstream, the need to be able to track d...
In this report, we focus on data usage control and data provenance that are conceptual and technolog...
Data provenance describes how data came to be in its present form. It includes data sources and the ...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
These days, sensitive and personal information is used within a wide range of applications. The exch...
Across the world, organizations are required to comply with regulatory frameworks dictating how to m...
While provenance research is common in distributed systems, many proposed solutions do not address t...
In times of strongly (personal) data-driven economy, the inception of the European General Data Prot...
In times of strongly (personal) data-driven economy, the inception of the European General Data Prot...
Achieving data protection and privacy in modern data processing systems is a prominent topic of acad...
The concept of provenance is well known by some, and completely unknown to others. In this talk I gi...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
With the development of data transactions, data security issues have become increasingly important. ...
Provenance is defined as the origin or the earliest known history of a thing. In the aspect of dat...
As cloud computing and virtualization technologies become mainstream, the need to be able to track d...
In this report, we focus on data usage control and data provenance that are conceptual and technolog...
Data provenance describes how data came to be in its present form. It includes data sources and the ...
Context Data usage control is an extension of access control that is concerned with how data may or ...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...