How to Trust the Re-use of Data

  • Erisa Karafili
  • Hanne Riis Nielson
  • Flemming Nielson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9331)


Research in natural sciences and life sciences involve carrying out experiments to collect data as well as carrying out analysis to interpret the data. Increasingly data is being made available to other scientists in big databases. The scientific process builds on the idea that research results can be independently validated by other researchers. However, the concern about the correct re-use of data is also increasing. As illustrated by a currently evolving case of alleged scientific mispractice there is a need to support a reliable re-use of data. To solve this challenge we introduce an enriched coordination language based on Klaim, that can model the coordination of the re-use of data in the research community. We define the formal semantics of our language and develop a static analysis that can be used to check whether we have a trustable re-use of data.


Data Pattern Parallel Composition Access Control Policy Reaction Rule Service Orchestration 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.



We are supported by IDEA4CPS (DNRF 86-10).


  1. 1.
    Agha, G.A., Kim, W.: Actors: a unifying model for parallel and distributed computing. J. Syst. Architect. 45(15), 1263–1277 (1999)CrossRefGoogle Scholar
  2. 2.
    Arbab, F.: Reo: a channel-based coordination model for component composition. Math. Struct. Comp. Sci. 14(3), 329–366 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    Basu, A., Bozga, M., Sifakis, J.: Modeling heterogeneous real-time components in BIP. In: Proceedings of SEFM, pp. 3–12 (2006)Google Scholar
  4. 4.
    Bliudze, S., Sifakis, J.: The algebra of connectors-structuring interaction in BIP. IEEE Trans. Comput. 57(10), 1315–1330 (2008)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Brewer, D.F.C., Nash, M.J.: The chinese wall security policy. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 206–214 (1989)Google Scholar
  6. 6.
    Callaway, E.: Fraud investigation rocks danish university (2011).
  7. 7.
    De Nicola, R., Ferrari, G.L., Pugliese, R.: KLAIM: a kernel language for agents interaction and mobility. IEEE Trans. Softw. Eng. 24(5), 315–330 (1998)CrossRefGoogle Scholar
  8. 8.
    Hankin, C., Nielson, F., Nielson, H.R.: Advice from belnap policies. In: Proceedings of IEEE Computer Security Foundations Symposium, pp. 234–247 (2009)Google Scholar
  9. 9.
    Hankin, C., Nielson, F., Nielson, H.R., Yang, F.: Advice for coordination. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 153–168. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  10. 10.
    Hartswood, M., Procter, R., Taylor, P., Blot, L., Anderson, S., Rouncefield, M., Slack, R.: Problems of data mobility and reuse in the provision of computer-based training for screening mammography. In: Human Factors in Computing Systems, pp. 909–918 (2012)Google Scholar
  11. 11.
    Lapadula, A., Pugliese, R., Tiezzi, F.: A calculus for orchestration of web services. In: De Nicola, R. (ed.) ESOP 2007. LNCS, vol. 4421, pp. 33–47. Springer, Heidelberg (2007) CrossRefGoogle Scholar
  12. 12.
    Nielson, H.R., Nielson, F., Pilegaard, H.: Flow logic for process calculi. ACM Comput. Surv. 44(1), 3:1–3:39 (2012)CrossRefzbMATHGoogle Scholar
  13. 13.
    Petković, M., Prandi, D., Zannone, N.: Purpose control: did you process the data for the intended purpose? In: Jonker, W., Petković, M. (eds.) SDM 2011. LNCS, vol. 6933, pp. 145–168. Springer, Heidelberg (2011) CrossRefGoogle Scholar
  14. 14.
    Prandi, D., Quaglia, P., Zannone, N.: Formal analysis of BPMN via a translation into COWS. In: Lea, D., Zavattaro, G. (eds.) COORDINATION 2008. LNCS, vol. 5052, pp. 249–263. Springer, Heidelberg (2008) CrossRefGoogle Scholar
  15. 15.
    Wallis, J.C., Rolando, E., Borgman, C.L.: If we share data, will anyone use them? data sharing and reuse in the long tail of science and technology. PLoS ONE 8(7), e67332 (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Erisa Karafili
    • 1
  • Hanne Riis Nielson
    • 1
  • Flemming Nielson
    • 1
  1. 1.DTU ComputeTechnical University of DenmarkKongens LyngbyDenmark

Personalised recommendations