Blog
About

113
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Provenance-based Auditing of Private Data Use

      ,

      Visions of Computer Science - BCS International Academic Conference (VOCS)

      BCS International Academic Conference

      22 - 24 September 2008

      Provenance, Audit, Private data, Data Protection Act

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and exposition of private data to unauthorized recipients have been publicly and widely advertised. For authorities and system administrators to check compliance to regulations, auditing of private data processing becomes crucial in IT systems. Finding the origin of some data, determining how some data is being used, checking that the processing of some data is compatible with the purpose for which the data was captured are typical functionality that an auditing capability should support, but difficult to implement in a reusable manner. Such questions are so-called provenance questions, where provenance is defined as the process that led to some data being produced. The aim of this paper is to articulate how data provenance can be used as the underpinning approach of an auditing capability in IT systems. We present a case study based on requirements of the Data Protection Act and an application that audits the processing of private data, which we apply to an example manipulating private data in a university.

          Related collections

          Most cited references 3

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Electronically Querying for the Provenance of Entities

           Simon Miles (2006)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Data protection — The new law

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Security and the new Data Protection law

               Chris Pounder (1998)
                Bookmark

                Author and article information

                Contributors
                Conference
                September 2008
                September 2008
                : 141-152
                Affiliations
                School of Electronics and Computer Science, University of Southampton, Southampton SO17 1BJ, UK
                Article
                10.14236/ewic/VOCS2008.13
                © Rocío Aldeco-Pérez et al. Published by BCS Learning and Development Ltd. Visions of Computer Science - BCS International Academic Conference

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                Visions of Computer Science - BCS International Academic Conference
                VOCS
                Imperial College, London, UK
                22 - 24 September 2008
                Electronic Workshops in Computing (eWiC)
                BCS International Academic Conference
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article