Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data 2015
DOI: 10.1145/2723372.2723721
|View full text |Cite
|
Sign up to set email alerts
|

Automatic Enforcement of Data Use Policies with DataLawyer

Abstract: Data has value and is increasingly being exchanged for commercial and research purposes. Data, however, is typically accompanied by terms of use, which limit how it can be used. To date, there are only a few, ad-hoc methods to enforce these terms. We propose DataLawyer, a new system to formally specify usage policies and check them automatically at query runtime in a relational database management system (DBMS). We develop a new model to specify policies compactly and precisely. We introduce novel algorithms t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 27 publications
0
14
0
Order By: Relevance
“…The following reasons account for this trend: 1) For the data contributors, they have severe privacy concerns [8]. Nevertheless, the service-based trading mode, which has hidden the sensitive raw data, alleviates their concerns; 2) For the service provider, comprehensive and insightful data services can bring in more profits [10]; 3) For the data consumers, data copyright infringement [11] is serious. However, such a data trading mode differs from most of conventional data sharing scenarios, e.g., data publishing [12].…”
Section: Introductionmentioning
confidence: 99%
“…The following reasons account for this trend: 1) For the data contributors, they have severe privacy concerns [8]. Nevertheless, the service-based trading mode, which has hidden the sensitive raw data, alleviates their concerns; 2) For the service provider, comprehensive and insightful data services can bring in more profits [10]; 3) For the data consumers, data copyright infringement [11] is serious. However, such a data trading mode differs from most of conventional data sharing scenarios, e.g., data publishing [12].…”
Section: Introductionmentioning
confidence: 99%
“…In particular, the property of non-renouncement in traditional digital mark plans infers that the mark is remarkable", and any outsider is in a situation to check the genuineness of a data submitter utilizing her open key and consequently the relating digital certificate, i.e., the truthfulness of data combination in our model. Be that as it may, the check in digital mark plans needs the data of data, and may essentially presentation a data patron's genuine personality [12]. Identifying with MAC, the information donors and in this way the information customers should concur on a common mystery key that is unconventional in learning markets.…”
Section: Problem Definitionmentioning
confidence: 99%
“…Interleaved comparison strategies [3]which compare rankers using click data, are a promising alternative to traditional information retrieval evaluation methods that require expensive explicit judgments. A major limitation of these methods is that they assume access to live data, meaning that new data must be collected for every pair of rankers compared [3]. 1) Disadvantage: It cannot support policies that require other semantics, such as creating a log entry when a violation occurs.…”
Section: Interleaved Policy Evaluationmentioning
confidence: 99%
“…We present Account Trade, a set of accountable protocols for big data trading via data brokers. It enables data brokers to achieve trading-related accountability against dishonest consumers by blaming them when misbehaviour is detected [3]. [1] uses a scheme that integrates two cryptographic primitives, blind signature and hash chain, into a highly flexible and lightweight authentication and session key establishment protocol.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation