Skip to main content

Securing Access to Complex Digital Artifacts – Towards a Controlled Processing Environment for Digital Research Data

  • Conference paper
Research and Advanced Technology for Digital Libraries (TPDL 2013)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8092))

Included in the following conference series:

  • 2607 Accesses

Abstract

Providing secured and restricted access to digital objects, especially access to digital research data, for a general audience poses new challenges to memory institutions. For instance, to protect individuals, only anonymized or pseudonymized data should be released to a general audience. Standard procedures have been established over time to cope with privacy issues of non-interactive digital objects like text, audio and video. Appearances of identifiers and potentially also quasi-identifiers were removed by a simple overlay, e.g. in text documents such appearances were simply blackened out. Today’s digital artifacts, especially research data, have complex, non-linear and even interactive manifestations. Thus, a different approach to securing access to complex digital artifacts is required. This paper presents an architecture and technical methods to control access to digital research data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carlisle, D.M., Rodrian, M.L., Diamond, C.L.: California inpatient data reporting manual, medical information reporting for california (5th ed). Tech. rep., Office of Statewide Health Planning and Development (2007)

    Google Scholar 

  2. Kifer, D., Gehrke, J.: Injecting utility into anonymized datasets. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, SIGMOD 2006, pp. 217–228. ACM, New York (2006)

    Chapter  Google Scholar 

  3. Li, T., Li, N.: On the tradeoff between privacy and utility in data publishing. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 517–526. ACM, New York (2009)

    Chapter  Google Scholar 

  4. Fung, B.C.M., Wang, K., Chen, R., Yu, P.S.: Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4), 14:1–14:53 (2010)

    Google Scholar 

  5. Wohlgemuth, S., Echizen, I., Sonehara, N., Müller, G.: Tagging disclosures of personal data to third parties to preserve privacy. In: Rannenberg, K., Varadharajan, V., Weber, C. (eds.) Security and Privacy – Silver Linings in the Cloud. IFIP AICT, vol. 330, pp. 241–252. Springer, Heidelberg (2010)

    Google Scholar 

  6. Rechert, K., Valizada, I., von Suchodoletz, D., Latocha, J.: bwFLA – a functional approach to digital preservation. PIK – Praxis der Informationsverarbeitung und Kommunikation 35(4), 259–267 (2012)

    Google Scholar 

  7. von Suchodoletz, D., Rechert, K., Welte, R., van den Dobbelsteen, M., Roberts, B., van der Hoeven, J., Schroder, J.: Automation of flexible migration workflows. International Journal of Digital Curation 2(2) (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Latocha, J., Rechert, K., Echizen, I. (2013). Securing Access to Complex Digital Artifacts – Towards a Controlled Processing Environment for Digital Research Data. In: Aalberg, T., Papatheodorou, C., Dobreva, M., Tsakonas, G., Farrugia, C.J. (eds) Research and Advanced Technology for Digital Libraries. TPDL 2013. Lecture Notes in Computer Science, vol 8092. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40501-3_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-40501-3_32

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-40500-6

  • Online ISBN: 978-3-642-40501-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics