"I hereby leave my email to...": Data Usage Control and the Digital Estate

Author(s):  
Stephan Micklitz ◽  
Martin Ortlieb ◽  
Jessica Staddon
Keyword(s):  
Author(s):  
Aliaksandr Lazouski ◽  
Gaetano Mancini ◽  
Fabio Martinelli ◽  
Paolo Mori
Keyword(s):  

Author(s):  
Wolfgang Hommel

In this chapter, we first summarize an analysis of the differences between Grids and the previously dominant model of inter-organizational collaboration. Based on requirements derived thereof, we specify a security framework that demonstrates how well-established policy-based privacy management architectures can be extended to provide the required Grid-specific functionality. We also discuss the necessary steps for integration into existing service provider and service access point infrastructures. Special emphasis is put on privacy policies that can be configured by users themselves, and distinguishing between the initial data access phase and the later data usage control phase. We also discuss the challenges of practically applying the required changes to real-world infrastructures, including delegated administration, monitoring, and auditing.


Author(s):  
Flavio Cirillo ◽  
Bin Cheng ◽  
Raffaele Porcellana ◽  
Marco Russo ◽  
Gurkan Solmaz ◽  
...  

Cyber Crime ◽  
2013 ◽  
pp. 284-299
Author(s):  
Wolfgang Hommel

In this chapter, we first summarize an analysis of the differences between Grids and the previously dominant model of inter-organizational collaboration. Based on requirements derived thereof, we specify a security framework that demonstrates how well-established policy-based privacy management architectures can be extended to provide the required Grid-specific functionality. We also discuss the necessary steps for integration into existing service provider and service access point infrastructures. Special emphasis is put on privacy policies that can be configured by users themselves, and distinguishing between the initial data access phase and the later data usage control phase. We also discuss the challenges of practically applying the required changes to real-world infrastructures, including delegated administration, monitoring, and auditing.


Sign in / Sign up

Export Citation Format

Share Document