2013 IEEE Security and Privacy Workshops (2013)
San Francisco, CA, USA USA
May 23, 2013 to May 24, 2013
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/SPW.2013.24
These days, sensitive and personal information is used within a wide range of applications. The exchange of this information is increasingly faster and more and more unpredictable. Hence, the person concerned cannot determine what happens with his personal data after it has been released. It is highly intransparent who is accountable for data misuse. Usage control and provenance tracking are two different approaches to tackle this problem. This work compares the two concepts from a data protection perspective. The support and fulfillment of data protection requirements are analysed. Models and architectures are investigated for commonalities. Combining the two technologies can increase flexibility and effectiveness of provenance tracking and thereby enhance information accountability in practice, if resulting linkability drawbacks are properly handled. A joint architecture is proposed to support this insight.
privacy, usage control, provenance, data protection
C. Bier, "How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective," 2013 IEEE Security and Privacy Workshops(SPW), San Francisco, CA, USA USA, 2013, pp. 13-17.