How to Trust the Re-use of Data

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

Research in natural sciences and life sciences involve carrying out experiments to collect data as well as carrying out analysis to interpret the data. Increasingly data is being made available to other scientists in big databases. The scientific process builds on the idea that research results can be independently validated by other researchers. However, the concern about the correct re-use of data is also increasing. As illustrated by a currently evolving case of alleged scientific mispractice there is a need to support a reliable re-use of data. To solve this challenge we introduce an enriched coordination language based on Klaim, that can model the coordination of the re-use of data in the research community. We define the formal semantics of our language and develop a static analysis that can be used to check whether we have a trustable re-use of data.
Original languageEnglish
Title of host publicationProceedings of the 11th International Workshop on Security and Trust Management (STM 2015)
EditorsSara Foresti
PublisherSpringer
Publication date2015
Pages72-88
ISBN (Print)978-3-319-24857-8
ISBN (Electronic)978-3-319-24858-5
DOIs
Publication statusPublished - 2015
Event11th International Workshop on Security and Trust Management (STM 2015) - Vienna, Austria
Duration: 21 Sep 201522 Sep 2015
Conference number: 11
http://stm2015.di.unimi.it/

Workshop

Workshop11th International Workshop on Security and Trust Management (STM 2015)
Number11
CountryAustria
CityVienna
Period21/09/201522/09/2015
Internet address
SeriesLecture Notes in Computer Science
Volume9331
ISSN0302-9743

Cite this

Karafili, E., Nielson, H. R., & Nielson, F. (2015). How to Trust the Re-use of Data. In S. Foresti (Ed.), Proceedings of the 11th International Workshop on Security and Trust Management (STM 2015) (pp. 72-88). Springer. Lecture Notes in Computer Science, Vol.. 9331 https://doi.org/10.1007/978-3-319-24858-5_5
Karafili, Erisa ; Nielson, Hanne Riis ; Nielson, Flemming. / How to Trust the Re-use of Data. Proceedings of the 11th International Workshop on Security and Trust Management (STM 2015). editor / Sara Foresti. Springer, 2015. pp. 72-88 (Lecture Notes in Computer Science, Vol. 9331).
@inproceedings{a6a7832b9fe04dacb267f15c41eb501f,
title = "How to Trust the Re-use of Data",
abstract = "Research in natural sciences and life sciences involve carrying out experiments to collect data as well as carrying out analysis to interpret the data. Increasingly data is being made available to other scientists in big databases. The scientific process builds on the idea that research results can be independently validated by other researchers. However, the concern about the correct re-use of data is also increasing. As illustrated by a currently evolving case of alleged scientific mispractice there is a need to support a reliable re-use of data. To solve this challenge we introduce an enriched coordination language based on Klaim, that can model the coordination of the re-use of data in the research community. We define the formal semantics of our language and develop a static analysis that can be used to check whether we have a trustable re-use of data.",
author = "Erisa Karafili and Nielson, {Hanne Riis} and Flemming Nielson",
year = "2015",
doi = "10.1007/978-3-319-24858-5_5",
language = "English",
isbn = "978-3-319-24857-8",
pages = "72--88",
editor = "Foresti, {Sara }",
booktitle = "Proceedings of the 11th International Workshop on Security and Trust Management (STM 2015)",
publisher = "Springer",

}

Karafili, E, Nielson, HR & Nielson, F 2015, How to Trust the Re-use of Data. in S Foresti (ed.), Proceedings of the 11th International Workshop on Security and Trust Management (STM 2015). Springer, Lecture Notes in Computer Science, vol. 9331, pp. 72-88, 11th International Workshop on Security and Trust Management (STM 2015), Vienna, Austria, 21/09/2015. https://doi.org/10.1007/978-3-319-24858-5_5

How to Trust the Re-use of Data. / Karafili, Erisa; Nielson, Hanne Riis; Nielson, Flemming.

Proceedings of the 11th International Workshop on Security and Trust Management (STM 2015). ed. / Sara Foresti. Springer, 2015. p. 72-88 (Lecture Notes in Computer Science, Vol. 9331).

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

TY - GEN

T1 - How to Trust the Re-use of Data

AU - Karafili, Erisa

AU - Nielson, Hanne Riis

AU - Nielson, Flemming

PY - 2015

Y1 - 2015

N2 - Research in natural sciences and life sciences involve carrying out experiments to collect data as well as carrying out analysis to interpret the data. Increasingly data is being made available to other scientists in big databases. The scientific process builds on the idea that research results can be independently validated by other researchers. However, the concern about the correct re-use of data is also increasing. As illustrated by a currently evolving case of alleged scientific mispractice there is a need to support a reliable re-use of data. To solve this challenge we introduce an enriched coordination language based on Klaim, that can model the coordination of the re-use of data in the research community. We define the formal semantics of our language and develop a static analysis that can be used to check whether we have a trustable re-use of data.

AB - Research in natural sciences and life sciences involve carrying out experiments to collect data as well as carrying out analysis to interpret the data. Increasingly data is being made available to other scientists in big databases. The scientific process builds on the idea that research results can be independently validated by other researchers. However, the concern about the correct re-use of data is also increasing. As illustrated by a currently evolving case of alleged scientific mispractice there is a need to support a reliable re-use of data. To solve this challenge we introduce an enriched coordination language based on Klaim, that can model the coordination of the re-use of data in the research community. We define the formal semantics of our language and develop a static analysis that can be used to check whether we have a trustable re-use of data.

U2 - 10.1007/978-3-319-24858-5_5

DO - 10.1007/978-3-319-24858-5_5

M3 - Article in proceedings

SN - 978-3-319-24857-8

SP - 72

EP - 88

BT - Proceedings of the 11th International Workshop on Security and Trust Management (STM 2015)

A2 - Foresti, Sara

PB - Springer

ER -

Karafili E, Nielson HR, Nielson F. How to Trust the Re-use of Data. In Foresti S, editor, Proceedings of the 11th International Workshop on Security and Trust Management (STM 2015). Springer. 2015. p. 72-88. (Lecture Notes in Computer Science, Vol. 9331). https://doi.org/10.1007/978-3-319-24858-5_5