Securing Access to Complex Digital Artifacts – Towards a Controlled Processing Environment for Digital Research Data

  • Johann Latocha
  • Klaus Rechert
  • Isao Echizen
Conference paper

DOI: 10.1007/978-3-642-40501-3_32

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8092)
Cite this paper as:
Latocha J., Rechert K., Echizen I. (2013) Securing Access to Complex Digital Artifacts – Towards a Controlled Processing Environment for Digital Research Data. In: Aalberg T., Papatheodorou C., Dobreva M., Tsakonas G., Farrugia C.J. (eds) Research and Advanced Technology for Digital Libraries. TPDL 2013. Lecture Notes in Computer Science, vol 8092. Springer, Berlin, Heidelberg

Abstract

Providing secured and restricted access to digital objects, especially access to digital research data, for a general audience poses new challenges to memory institutions. For instance, to protect individuals, only anonymized or pseudonymized data should be released to a general audience. Standard procedures have been established over time to cope with privacy issues of non-interactive digital objects like text, audio and video. Appearances of identifiers and potentially also quasi-identifiers were removed by a simple overlay, e.g. in text documents such appearances were simply blackened out. Today’s digital artifacts, especially research data, have complex, non-linear and even interactive manifestations. Thus, a different approach to securing access to complex digital artifacts is required. This paper presents an architecture and technical methods to control access to digital research data.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Johann Latocha
    • 1
  • Klaus Rechert
    • 1
  • Isao Echizen
    • 2
  1. 1.University of FreiburgFreiburgGermany
  2. 2.National Institute of InformaticsChiyoda-kuJapan

Personalised recommendations