DUMW 2012 - Data Usage Management on the Web
Topics/Call fo Papers
The current abundance of digital data requires societal, legal, economical, and technical approaches to ensure appropriate use of this vast amount of data. Following two successful events - the Dagstuhl Seminar on Distributed Usage Control and the W3C Privacy and Data Usage Control Workshop, the goal of this workshop is to discuss current developments in usage management and to identify interesting areas of future research. Data usage control generalizes access control in order to address what happens to data in the future and after it has been shared or accessed. Spanning the domains of privacy, the protection of intellectual property and compliance, typical requirements include "delete after thirty days", "delete within five years", "notify whenever data is given away", and "don't share". However, in the near future, more general requirements may include "do not use for employment purposes", "do not use for tracking", as well as "do not use to harm me in any way". Major challenges in this field include policies, the relationship between end user actions and technical events, tracking data across layers of abstraction as well as logical and physical systems, policy enforcement, protection of the enforcement mechanisms, and guarantees.
http://dig.csail.mit.edu/2012/WWW-DUMW/
In the workshop, we will discuss the state of the art in different approaches including preventive (such as DRM systems) and forensic (such as accountability) approaches and discuss open problems. Besides this technical perspective, we want to provide a forum for discussions on the requirements (societal, individual, technical), the guarantees that can be provided in different contexts (e.g., inadvertent vs. malicious abuse of data) and business models for developing and deploying data usage control technology.
Topics and Themes
The topics of interest include but are not limited to
social or economical approaches to usage control
provenance generation
provenance tracking
accountability
usage enforcement
usage policies
privacy
mis-use detection
different perspectives to usage management
Submission
We solicit short position (upto 5 pages) and long technical (upto 8 pages) papers in ACM SIG Proceedings format on all dimensions of the above problem domain. Proceedings will be published as an MIT/KIT technical report.
For formatting instructions and templates, please see ACM SIG Proceedings Templates.
All papers must be submitted via EasyChair at DUMW2012.
http://dig.csail.mit.edu/2012/WWW-DUMW/
In the workshop, we will discuss the state of the art in different approaches including preventive (such as DRM systems) and forensic (such as accountability) approaches and discuss open problems. Besides this technical perspective, we want to provide a forum for discussions on the requirements (societal, individual, technical), the guarantees that can be provided in different contexts (e.g., inadvertent vs. malicious abuse of data) and business models for developing and deploying data usage control technology.
Topics and Themes
The topics of interest include but are not limited to
social or economical approaches to usage control
provenance generation
provenance tracking
accountability
usage enforcement
usage policies
privacy
mis-use detection
different perspectives to usage management
Submission
We solicit short position (upto 5 pages) and long technical (upto 8 pages) papers in ACM SIG Proceedings format on all dimensions of the above problem domain. Proceedings will be published as an MIT/KIT technical report.
For formatting instructions and templates, please see ACM SIG Proceedings Templates.
All papers must be submitted via EasyChair at DUMW2012.
Other CFPs
Last modified: 2012-01-11 16:27:00