Data usage control generalizes access control to what happens to data in the future and after it has been given away (accessed). Spanning the domains of privacy, the protection of intellectual property and compliance, typical current requirements include ”delete after thirty days”, ”don’t delete within five years”, ”notify whenever data is given away”, and ”don’t print”. However, in the near future more general requirements may include ”do not use for employment purposes”, ”do not use for tracking”, as well as ”do not use to harm me in any way”. Major challenges in this field include policies, the relationship between end user actions and technical events, tracking data across layers of abstraction and logical as well as physical systems, policy enforcement, protection of the enforcement mechanisms and guarantees.
Following three successful events - the Dagstuhl Seminar on Distributed Usage Control, the W3C Privacy and Data Usage Control Workshop, and the WWW 2012 Workshop on Data Usage Management on the Web - the goal of the 4th International Workshop on Data Usage Management is to discuss current technical developments in usage control and, in particular, foster collaboration in the area of usage representation (policies is one mechanism), provenance tracking, misuse identification, and distributed usage enforcement. Though enabling privacy through careful and controlled dissemination of sensitive information is an obvious fallout of usage control, this workshop is interested in understanding data usage control as a whole. The workshop is also interested in discussing domain-specific solutions (which typically exist in semi-controlled environments) and their generalization to more open environments such as the Web.
Topics and ThemesThe topics of interest include but are not limited to
We solicit short position (upto 5 pages) and long technical (upto 8 pages) papers in IEEE Proceedings format on all dimensions of the above problem domain. Papers accepted by the workshop will be published by the IEEE Computer Society Press. Digital version of the proceedings will be made available to attendees.
All papers must be submitted via EasyChair at https://www.easychair.org/conferences/?conf=duma13.
Papers due: February 11, 2013
Program CommitteeStefan Katzenbeisser, U Darmstadt
Jaehong Park, University of Texas at San Antonio
Renato Iannella, Semantic Identity
David Chadwick, University of Kent
Fabio Martinelli, IIT-CNR
Anupam Datta, CMU
Guenter Karjoth, IBM
David Basin, ETH Zurich
Sandro Etalle, T.U. Eindhoven and University of Twente
Stephan Micklitz, Google
Tim Finin, UMBC
Helen Nissenbaum, NYU
ProceedingsThe proceedings are available in IEEE eXplore ISBN 978-0-7695-5017-6
Our SupportersCenter for Security Informatics
$Date: 2013-10-25 11:20:46 -0400 (Fri, 25 Oct 2013) $