Policies to Regulate Distributed Data Exchange

Samuel R. Cauvin, Nir Oren, Wamberto W. Vasconcelos

Research output: Chapter in Book/Report/Conference proceedingPublished conference contribution

43 Downloads (Pure)

Abstract

Data sharing is becoming an integral part of many aspects of our daily lives. We propose a method for controlling access to data and knowledge through fine-grained, user-specified explicitly represented policies. We present an overview of a policy formalism and mechanisms to facilitate distributed data sharing. We provide a breakdown of how our approach defines compliance and violation, specifically providing a new outlook on violation of permissions within the context of data sharing. We also examine how our mechanisms have been adapted to support socially responsible interactions between participants, whilst still providing them with control over their own data. We also explore a series of planned experiments investigating how users understand and interact with policies in a simplified version of our formalism.
Original languageEnglish
Title of host publicationAgreement Technologies
Subtitle of host publication6th International Conference, AT 2018, Bergen, Norway, December 6-7, 2018, Revised Selected Papers
EditorsMarin Lujak
Place of PublicationCham
PublisherSpringer
Pages146-161
Number of pages16
ISBN (Electronic)9783030172947
ISBN (Print)9783030172930
DOIs
Publication statusPublished - 2019
Event6th International Conference on Agreement Technologies - University of Bergen, Bergen, Norway
Duration: 6 Dec 20187 Dec 2018

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume11327
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Agreement Technologies
Abbreviated titleAT 2018
Country/TerritoryNorway
CityBergen
Period6/12/187/12/18

Bibliographical note

This research is partially sponsored by the EPSRC grant EP/P011829/1, funded
under the UK Engineering and Physical Sciences Council Human Dimensions of
Cyber Security call (2016).

Fingerprint

Dive into the research topics of 'Policies to Regulate Distributed Data Exchange'. Together they form a unique fingerprint.

Cite this