A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is
In most data control scenarios there is the opportunity for oversight by those who, while perhaps not directly involved in the creation of the data, understand the intended usage of the data. ... We argue that due to the proliferation of online data and our aging population, data owners will increasingly face requests for data access and usage when such oversight is not present because the original ... ACKNOWLEDGMENT The authors would like to thank Jess Hemerly and Eric Sachs for useful feedback on earlier drafts of this position paper. ...doi:10.1109/spw.2013.28 dblp:conf/sp/MicklitzOS13 fatcat:vlqofl4nb5hvhhzgxbqlc4h4mu
We acknowledge support from the Strategic Basic Research (SBO) Programme of the Flemish Agency for Innovation through Science and Technology (IWT) in the context of the SPION project 6 under grant agreement ... Staddon, ""I hereby leave my email to. . . ": Data Usage Control and the Digital Estate," in Proc. of the 2013 IEEE Security and Privacy Workshops (SPW'13), pp. 42-44, 2013. ... Giving users control over their "digital estate" is becoming more and more important as the volume and importance of digital artifacts grows. ...fatcat:yg5vvzymuvcibirco4nawxes4m