The Community for Technology Leaders
RSS Icon
Subscribe
San Francisco, CA
May 23, 2013 to May 24, 2013
ISBN: 978-1-4799-0458-7
pp: 13-17
ABSTRACT
These days, sensitive and personal information is used within a wide range of applications. The exchange of this information is increasingly faster and more and more unpredictable. Hence, the person concerned cannot determine what happens with his personal data after it has been released. It is highly intransparent who is accountable for data misuse. Usage control and provenance tracking are two different approaches to tackle this problem. This work compares the two concepts from a data protection perspective. The support and fulfillment of data protection requirements are analysed. Models and architectures are investigated for commonalities. Combining the two technologies can increase flexibility and effectiveness of provenance tracking and thereby enhance information accountability in practice, if resulting linkability drawbacks are properly handled. A joint architecture is proposed to support this insight.
INDEX TERMS
privacy, usage control, provenance, data protection
CITATION
Christoph Bier, "How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective", SPW, 2013, 2013 IEEE CS Security and Privacy Workshops (SPW2013), 2013 IEEE CS Security and Privacy Workshops (SPW2013) 2013, pp. 13-17, doi:10.1109/SPW.2013.24
16 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool