Transparent Personal Data Processing: The Road Ahead. Bonatti, P., Kirrane, S., Polleres, A., & Wenning, R. In TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity @ SAFECOMP2017, volume 10489, of Lecture Notes in Computer Science (LNCS), pages 337-349, Trento, Italy, September, 2017. springer. Paper abstract bibtex The European General Data Protection Regulation defines a set of obligations for personal data controllers and processors. Primary obligations include: obtaining explicit consent from the data subject for the processing of personal data, providing full transparency with respect to the processing, and enabling data rectification and erasure (albeit only in certain circumstances). At the core of any transparency architecture is the logging of events in relation to the processing and sharing of personal data. The logs should enable verification that data processors abide by the access and usage control policies that have been associated with the data based on the data subject’s consent and the applicable regulations. In this position paper, we: (i) identify the requirements that need to be satisfied by such a transparency architecture, (ii) examine the suitability of existing logging mechanisms in light of said requirements, and (iii) present a number of open challenges and opportunities.
@inproceedings{bona-etal-2017TELERISE,
title = {Transparent Personal Data Processing: The Road Ahead},
author = {Piero Bonatti and Sabrina Kirrane and Axel Polleres and Rigo Wenning},
booktitle = {TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity @ SAFECOMP2017},
year = 2017,
month = sep,
day = 12,
pages = {337-349},
publisher = springer,
series = lncs,
volume = 10489,
abstract = {The European General Data Protection Regulation defines
a set of obligations for personal data controllers and processors. Primary
obligations include: obtaining explicit consent from the data subject for
the processing of personal data, providing full transparency with respect
to the processing, and enabling data rectification and erasure (albeit only
in certain circumstances). At the core of any transparency architecture is
the logging of events in relation to the processing and sharing of personal
data. The logs should enable verification that data processors abide by
the access and usage control policies that have been associated with the
data based on the data subject’s consent and the applicable regulations.
In this position paper, we: (i) identify the requirements that need to be
satisfied by such a transparency architecture, (ii) examine the suitability
of existing logging mechanisms in light of said requirements, and (iii)
present a number of open challenges and opportunities.},
address = {Trento, Italy},
url = {http://polleres.net/publications/bona-etal-2017TELERISE.pdf}
}
Downloads: 0
{"_id":"yK4eddaeNa2mWudJd","bibbaseid":"bonatti-kirrane-polleres-wenning-transparentpersonaldataprocessingtheroadahead-2017","downloads":0,"creationDate":"2017-07-01T02:42:00.405Z","title":"Transparent Personal Data Processing: The Road Ahead","author_short":["Bonatti, P.","Kirrane, S.","Polleres, A.","Wenning, R."],"year":2017,"bibtype":"inproceedings","biburl":"www.polleres.net/mypublications.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","title":"Transparent Personal Data Processing: The Road Ahead","author":[{"firstnames":["Piero"],"propositions":[],"lastnames":["Bonatti"],"suffixes":[]},{"firstnames":["Sabrina"],"propositions":[],"lastnames":["Kirrane"],"suffixes":[]},{"firstnames":["Axel"],"propositions":[],"lastnames":["Polleres"],"suffixes":[]},{"firstnames":["Rigo"],"propositions":[],"lastnames":["Wenning"],"suffixes":[]}],"booktitle":"TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity @ SAFECOMP2017","year":"2017","month":"September","day":"12","pages":"337-349","publisher":"springer","series":"Lecture Notes in Computer Science (LNCS)","volume":"10489","abstract":"The European General Data Protection Regulation defines a set of obligations for personal data controllers and processors. Primary obligations include: obtaining explicit consent from the data subject for the processing of personal data, providing full transparency with respect to the processing, and enabling data rectification and erasure (albeit only in certain circumstances). At the core of any transparency architecture is the logging of events in relation to the processing and sharing of personal data. The logs should enable verification that data processors abide by the access and usage control policies that have been associated with the data based on the data subject’s consent and the applicable regulations. In this position paper, we: (i) identify the requirements that need to be satisfied by such a transparency architecture, (ii) examine the suitability of existing logging mechanisms in light of said requirements, and (iii) present a number of open challenges and opportunities.","address":"Trento, Italy","url":"http://polleres.net/publications/bona-etal-2017TELERISE.pdf","bibtex":"@inproceedings{bona-etal-2017TELERISE,\ntitle = {Transparent Personal Data Processing: The Road Ahead},\nauthor = {Piero Bonatti and Sabrina Kirrane and Axel Polleres and Rigo Wenning},\nbooktitle = {TELERISE: 3rd International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity @ SAFECOMP2017},\nyear = 2017,\nmonth = sep,\nday = 12,\npages = {337-349},\npublisher = springer,\nseries = lncs,\nvolume = 10489,\nabstract = {The European General Data Protection Regulation defines\na set of obligations for personal data controllers and processors. Primary\nobligations include: obtaining explicit consent from the data subject for\nthe processing of personal data, providing full transparency with respect\nto the processing, and enabling data rectification and erasure (albeit only\nin certain circumstances). At the core of any transparency architecture is\nthe logging of events in relation to the processing and sharing of personal\ndata. The logs should enable verification that data processors abide by\nthe access and usage control policies that have been associated with the\ndata based on the data subject’s consent and the applicable regulations.\nIn this position paper, we: (i) identify the requirements that need to be\nsatisfied by such a transparency architecture, (ii) examine the suitability\nof existing logging mechanisms in light of said requirements, and (iii)\npresent a number of open challenges and opportunities.},\naddress = {Trento, Italy},\nurl = {http://polleres.net/publications/bona-etal-2017TELERISE.pdf}\n}\n\n","author_short":["Bonatti, P.","Kirrane, S.","Polleres, A.","Wenning, R."],"key":"bona-etal-2017TELERISE","id":"bona-etal-2017TELERISE","bibbaseid":"bonatti-kirrane-polleres-wenning-transparentpersonaldataprocessingtheroadahead-2017","role":"author","urls":{"Paper":"http://polleres.net/publications/bona-etal-2017TELERISE.pdf"},"metadata":{"authorlinks":{"polleres, a":"https://bibbase.org/show?bib=www.polleres.net/mypublications.bib"}},"downloads":0,"html":""},"search_terms":["transparent","personal","data","processing","road","ahead","bonatti","kirrane","polleres","wenning"],"keywords":[],"authorIDs":["545720922abc8e9f370000ae","5PFMiHGwfvbGBZwWF","5de7280d97054edf010000c3","5e02b1a419da8edf01000028","5e048450db7916df010000b1","5e06d565a0810cde0100009b","5e10e27445c12cde01000062","5e123345c196d3de01000074","5e14ba61e55ed8de01000072","5e189b4e779abfdf0100013f","5e216f7e5a651cdf010000eb","5e25b9fdf299d4de01000001","5e2d64605e7586df01000083","5e36e5e9b26a0fde0100005e","5e37d23b56571fde010000de","5e4ded1052c311f20100018e","5e51a3102793ecde010000e0","5e59a6b5ad6c7fde01000114","5e5d588ead47bcde01000072","5e60e857839e59df010000f1","A5AFuDAiNR4HEYiFD","BtzwZ6TFPsASbdqvo","DLdeXAmrbA4niYQzH","FyLDFGg993nDS2Spf","NCjPvWahWRjdP3ghB","XcyP3jptz7zE4ZLws","aiXjXMLP63k5WCt84","fTDcT5K3oSTcdxSBj","fbKNfWffDzdzubrER","haaAs2rQaQA7EaZva","nQX2P8WzFeKwcpLqd","nuWuyLnGu7YzMrn4d","pfENTBFWo85mRy3ik","rX6EShFR2rMFmQL2C","w6wHZukTjqqera7BR","woa42kCD35yCmdQTj","yPgvarsL7KAT9yfZd","yzkCNJMYNL8B3bni2","zDG3tj87ZfYXo7u9c"],"dataSources":["cBfwyqsLFQQMc4Fss","gixxkiKt6rtWGoKSh","QfLT6siHZuHw9MqvK"]}