Enforcing Scientific Data Sharing Agreements

There are currently strong drivers from funding bodies for the scientific community to both preserve data and make it available more widely, whilst ensuring that privacy and confidentiality are maintained. Institutional data sharing policies will be required to encapsulate the response of individual institutions to these pressures. When organisations share data they adopt these policies into data sharing agreements between institutions which must then be enforced. The approach to enforcing scientific data sharing agreements presented here is based upon a combination of trust, leading-edge technology, licensing and legal frameworks. The scientific community must decide what balance between these components it wants to adopt.

[1]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[2]  Arnon Rosenthal,et al.  A Data Sharing Agreement Framework , 2006, ICISS.

[3]  Christian Geuer-Pollmann,et al.  An Assured Environment for Collaborative Engineering Using Web Services , 2006, ISPE CE.

[4]  Kerstin Kleese van Dam,et al.  ICAT: Integrating Data Infrastructure for Facilities Based Science , 2009, 2009 Fifth IEEE International Conference on e-Science.

[5]  Ilaria Matteucci,et al.  CNL4DSA: a controlled natural language for data sharing agreements , 2010, SAC '10.

[6]  David W. Chadwick,et al.  A controlled natural language interface for authoring access control policies , 2011, SAC.

[7]  Emil C. Lupu,et al.  Secure cross-domain data sharing architecture for crisis management , 2010, DRM '10.

[8]  Álvaro Enrique Arenas,et al.  An Event-B Approach to Data Sharing Agreements , 2010, IFM.

[9]  N. Hawkins,et al.  Data sharing in genomics — re-shaping scientific practice , 2009, Nature Reviews Genetics.

[10]  Clare-Marie Karat,et al.  Evaluating assistance of natural language policy authoring , 2008, SOUPS '08.

[11]  Álvaro Enrique Arenas,et al.  SecPAL4DSA: A Policy Language for Specifying Data Sharing Agreements , 2011, STA.

[12]  Fabio Martinelli,et al.  Usage Control, Risk and Trust , 2010, TrustBus.

[13]  Karsten Loer,et al.  Towards usable and relevant model checking techniques for the analysis of dependable interactive systems , 2002, Proceedings 17th IEEE International Conference on Automated Software Engineering,.

[14]  Reihaneh Safavi-Naini,et al.  Digital Rights Management for Content Distribution , 2003, ACSW.

[15]  Emil C. Lupu,et al.  A Labelling System for Derived Data Control , 2010, DBSec.

[16]  Julia Lane,et al.  Using a Remote Access Data Enclave for Data Dissemination , 2007, Int. J. Digit. Curation.

[17]  Jim Buckley,et al.  An empirical investigation of the comprehensibility of requirements specifications , 2005, 2005 International Symposium on Empirical Software Engineering, 2005..

[18]  Awadhesh Kumar Singh,et al.  Verifying mutual exclusion and liveness properties with split preconditions , 2004, Journal of Computer Science and Technology.

[19]  David W. Chadwick,et al.  Expressions of expertness: the virtuous circle of natural language for access control policy specification , 2008, SOUPS '08.

[20]  Álvaro Enrique Arenas,et al.  Contracts as Trust Substitutes in Collaborative Business , 2008, Computer.

[21]  Brian Matthews,et al.  Enhancing the Core Scientific Metadata Model to Incorporate Derived Data , 2010, 2010 IEEE Sixth International Conference on e-Science.

[22]  P. Cochat,et al.  Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.