Filters








13 Hits in 5.3 sec

ODRL Profile for Expressing Consent through Granular Access Control Policies in Solid

Beatriz Esteves, Harshvardhan J. Pandit, Victor Rodrı́guez-Doncel
2021 Zenodo  
Solid, the emerging technology for organizing data in decentralized stores, relies on a simple authorization mechanism for granting access to data.  ...  Solid's personal online datastores (Pods) are ideal for keeping personal data, as they allow individuals to represent the access permissions in a very simple manner using Access Control Language (ACL)  ...  Scope The scope of this profile is limited to the definition of an ODRL Profile for Access Control in Solid.  ... 
doi:10.5281/zenodo.5111539 fatcat:c2rpozyz5bbolalkvesdlidnjq

D1.3 - Policy, transparency and compliance guidelines V1

Piero Bonatti, Sabrina Kirrane, Rigo Wenning
2017 Zenodo  
This document includes details on the policy and transparency considerations of the use case, and the compliance requirements against policies.  ...  [42] provide a comprehensive survey of existing access control proposals for RDF, although many of the policy languages presented therein could potentially be used to express and reason over usage policies  ...  Indeed, vocabularies for expressing policies such as ODRL [38] currently in the process for standardisation by the W3C's Permissions and Obligations working group still suffer partially from semantic  ... 
doi:10.5281/zenodo.2549531 fatcat:qnqbkvcfqzgvtgkc5r5t2upmgq

Representing Activities associated with Processing of Personal Data and Consent using Semantic Web for GDPR Compliance

Harshvardhan J. Pandit, Dave Lewis, Declan O'Sullivan
2020 Zenodo  
In particular, it addresses three deficits within the current state of the art for utilising linked data approaches for GDPR compliance.  ...  In addition to these, if consent is used as a legal basis to justify the processing, then information about how that consent was obtained also needs to be recorded in order to evaluate and demonstrate  ...  ACKNOWLEDGEMENTS The first and foremost acknowledgement I would like to make is in thanking my supervisors -Dave Lewis and Declan O'Sullivan.  ... 
doi:10.5281/zenodo.3795513 fatcat:qmyotfakhjcdxoksp6pff2uzfm

D1.7 - Policy, transparency and compliance guidelines V2

Piero Bonatti, Sabrina Kirrane, Rigo Wenning, Philip Raschke
2018 Zenodo  
This document includes details on the policy and transparency considerations of the use case, and the compliance requirements against policies (T1.3).  ...  Indeed, vocabularies for expressing policies such as ODRL [90] currently in the process for standardisation by the W3C's Permissions and Obligations working group still suffer partially from semantic  ...  PD Control Access Control Access Control RDB2RDF / R2RML / RML H2020-ICT-2016-2017 : ICT- Project No. 318097 see 2017/0003(COD) Respect for private life and the protection of personal  ... 
doi:10.5281/zenodo.2549549 fatcat:5xwvoijxubb7xg4xerjdtekjq4

D5.6 Report on application guidelines

Rigo Wenning
2020 Zenodo  
Because data protection and data processing potentially can cover every aspect of live, boundaries for the comprehensive approach have to be found.  ...  Because SPECIAL uses known technologies and extends them in specific ways, an implementer needs to understand the basic ideas behind it.  ...  What granularity is needed and how to cluster location information into the profile for the recommender engine and how to attach policy information to it.  ... 
doi:10.5281/zenodo.4586113 fatcat:pdr4pdwoyfaudfqivvdz2ddjje

Semantic-enabled architecture for auditable privacy-preserving data analysis

Fajar J. Ekaputra, Andreas Ekelhart, Rudolf Mayer, Tomasz Miksa, Tanja Šarčević, Sotirios Tsepelakis, Laura Waltersdorfer, Michel Dumontier, Sabrina Kirrane, Oshani Seneviratne
2022 Semantic Web Journal  
for users' sensitive data with explicit consent, and delivers a trusted, auditable analysis environment for executing data analytic processes in a privacy-preserving manner.  ...  , automatic checking of usage policies or data anonymisation.  ...  The authors thank the funders for their generous support.  ... 
doi:10.3233/sw-212883 fatcat:w7ga3gktffesvk5vgrtlgrgepa

D3.7: Updates to Policy-Supporting Services [article]

Leo Mack, Elli Papadopoulou
2019 Zenodo  
This report presents updates of the policy supporting services developed in Task 3.2 of EOSCpilot.  ...  The purpose of this deliverable is thus to present an updated and integrated vision for the EOSCpilot Policy Supporting Services, including the Open Science Monitor, Policy Registry, and Toolkit.  ...  Relevance for Policy Registry The ODRL offers a structured language to represent the contents and, more specifically, the permissions, prohibitions, and duties of users expressed in a policy.  ... 
doi:10.5281/zenodo.3387580 fatcat:7rel7cax4vh6leogl7hms7ciiq

The need for a digital rights management framework for the next generation of e-government services

Habtamu Abie, Bent Foyn, Jon Bing, Bernd Blobel, Peter Pharow, Jaime Delgado, Stamatis Karnouskos, Olli Pitkanen, Dimitrios Tzovaras
2004 Electronic Government, an International Journal  
Therefore, we propose to establish a Network of Excellence (NoE) for a Framework for Policy, Privacy, Security, Trust and Risk Management for DRM.  ...  In this context the goal is to: orchestrate better the dissemination of information among different agencies and co-operating organisations and individuals; provide greater access to government information  ...  ODRL, XrML). It is possible to describe very complex sets of rules using those powerful and expressive languages. A rights description resembles a computer program.  ... 
doi:10.1504/eg.2004.004134 fatcat:znwwvrbf3ffdzbarqafhtdzsbq

Abstract of Doctoral Dissertation

1977 The Financial Review  
Therefore challenges in legal areas such as tax law or competition law do not appear although in practice they can be relevant.  ...  Also, some specific characteristics of particular companies cannot be considered in a general method like this.  ...  offer a limited access to the Internet based on the access providers' policies.  ... 
doi:10.1111/j.1540-6288.1977.tb00954.x fatcat:ytm3zbtttjft5euxe4qwiu3lui

IRRODL Volume 4, Number 2

Various Authors
2003 International Review of Research in Open and Distance Learning  
Abstract The widespread diffusion of e-Learning in organizations has encouraged the discovery of more effective ways for conveying digital information to learners, for instance, via the commonly called  ...  Large numbers of courses and students were thus "processed" in correspondence, radio, and televisionbased distance education systems.  ...  This book is a succinct (191 pages, including a useful glossary) description of action learning, and a starter's manual for anyone interested in implementing its elements.  ... 
doi:10.19173/irrodl.v4i2.1086 fatcat:45izhvcg6vbr5fryrletnnprou

Knowledge Graphs [article]

Aidan Hogan, Eva Blomqvist, Michael Cochez, Claudia d'Amato, Gerard de Melo, Claudio Gutierrez, José Emilio Labra Gayo, Sabrina Kirrane, Sebastian Neumaier, Axel Polleres, Roberto Navigli, Axel-Cyrille Ngonga Ngomo (+6 others)
2021 arXiv   pre-print
In this paper we provide a comprehensive introduction to knowledge graphs, which have recently garnered significant attention from both industry and academia in scenarios that require exploiting diverse  ...  We conclude with high-level future research directions for knowledge graphs.  ...  We would also like to thank Matteo Palmonari for feedback on  ... 
arXiv:2003.02320v5 fatcat:ab4hmm2f2bbpvobwkjw4xbrz4u

A Data Protection Architecture for Derived Data Control in Partially Disconnected Networks

Enrico Scalavino, Naranker Dulay, Emil Lupu
2012
In this thesis we propose an ERM architecture that caters for both derived data control and usage control in partially disconnected networks.  ...  We propose the use of a novel policy lattice model based on information flow and mandatory access control.  ...  ODRL ODRL is often used in place of XrML. The elements at the basis of an ODRL policy are assets, rights and parties.  ... 
doi:10.25560/10203 fatcat:m7vttg2utnblvfbbcv5hxykh5i

Schloss Dagstuhl - Jahresbericht / Annual Report 2017

Schloss Dagstuhl-Leibniz-Zentrum Für Informatik
2018
On behalf of all participants the organizers want to express their deep gratitude to the entire Dagstuhl staff for their outstanding support and service accompanying this seminar.  ...  We thank Schloss Dagstuhl for hosting us.  ...  Access Control and Privacy. Solutions to the problem of modeling access control policies for Web resources have been benefited from Semantic Web technologies.  ... 
doi:10.4230/2199-1995.2017 fatcat:im34ekmmxnbrtlgjk3os6u53pq