Skip to main content

A Semantic Model for Personal Consent Management

  • Conference paper
Metadata and Semantics Research (MTSR 2013)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 390))

Included in the following conference series:

Abstract

Data protection and privacy has a significant importance in information sharing mechanisms, especially in domains that handle with sensitive information. The knowledge that can be inferred from this sensitive information may unveil the consumer’s personal information. Consumers should control who can access their consent data and for what purposes this data will be used. Therefore, information sharing requires effective policies to protect the personal data and to ensure the consumer’s privacy needs. As different consumers have different privacy levels, each consumer should determine one’s own consent policy. Besides ensuring personal privacy, information sharing to obtain personal data usage for acceptable reasons should be endorsed. This work proposes a semantic web based personal consent management model. In this model, consumers specify their consent data and create their personal consent policy for their consent data according to their privacy concerns. Thus, personalized consumer privacy for consent management will be ensured and reasonable information sharing for the personal data usage will be supported.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sweeney, L.: Uniqueness of Simple Demographics in the U.S. Population. Technical Report, Carnegie Mellon University (2000)

    Google Scholar 

  2. Cooper, T., Collman, J.: Managing Information Security and Privacy in Healthcare Data Mining: State of the Art. Medical Informatics: Knowledge Management and Data Mining in Biomedicine 8, 95–137 (2005)

    Google Scholar 

  3. Kluge, E.-H.W.: Informed consent and the security of the electronic health record (EHR): Some policy considerations. International Journal of Medical Informatics 73(3), 229–234 (2004)

    Article  Google Scholar 

  4. Sweeney, L.: k-Anonymity: A Model for Protecting Privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems 10(5), 557–570 (2002)

    Google Scholar 

  5. Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M.: ℓ-Diversity: Privacy Beyond k-Anonymity. In: Proceedings of the 22nd International Conference on Data Engineering (ICDE 2006), p. 24 (2006)

    Google Scholar 

  6. Li, N., Li, T., Venkatasubramanian, S.: t-Closeness: Privacy Beyond k-Anonymity and ℓ-Diversity. In: Proc. of Int. Conf. on Data Engineering (ICDE 2007) (2007)

    Google Scholar 

  7. Coiera, E., Clarke, R.: e-Consent: The Design and Implementation of Consumer Consent Mechanisms in an Electronic Environment. Journal of the American Medical Informatics Association 11(2), 129–140 (2004)

    Google Scholar 

  8. Anderson, R.J.: A Security Policy Model for Clinical Information Systems. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy (1996)

    Google Scholar 

  9. Blobel, B.: Authorisation and Access Control for Electronic Health Record Systems. International Journal of Medical Informatics 73(3), 251–257 (2004)

    Article  Google Scholar 

  10. Khan, A., Nadi, S.: Consentir: An Electronic Patient Consent Management System. In: 4th Annual Symposium of Health Technology (2010)

    Google Scholar 

  11. Becker, M.Y., Sewell, P.: Cassandra: Flexible Trust Management, Applied to Electronic Health Records. In: Proceedings of the 17th IEEE Computer Security Foundations Workshop (CSFW 2004), pp. 139–154 (2004)

    Google Scholar 

  12. Ko, Y.-Y., Liou, D.-M.: The Study of Managing the Personal Consent in the Electronic Healthcare Environment. World Academy of Science, Engineering and Technology 65, 314 (2010)

    Google Scholar 

  13. Russello, G., Dong, C., Dulay, N.: Consent-based Workflows for Healthcare Management. In: Proceedings of the 2008 IEEE Workshop on Policies for Distributed Systems and Networks (2008)

    Google Scholar 

  14. Samarati, P.: Protecting Respondents Identities in Microdata Release. IEEE Transactions on Knowledge and Data Engineering 13(6), 1010–1027 (2001)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Can, O. (2013). A Semantic Model for Personal Consent Management. In: Garoufallou, E., Greenberg, J. (eds) Metadata and Semantics Research. MTSR 2013. Communications in Computer and Information Science, vol 390. Springer, Cham. https://doi.org/10.1007/978-3-319-03437-9_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03437-9_15

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03436-2

  • Online ISBN: 978-3-319-03437-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics