Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Dr.Aid: Supporting Data-governance Rule Compliance for Decentralized Collaboration in an Automated Way

Published: 18 October 2021 Publication History

Abstract

Collaboration across institutional boundaries is widespread and increasing today. It depends on federations sharing data that often have governance rules or external regulations restricting their use. However, the handling of data governance rules (aka. data-use policies) remains manual, time-consuming and error-prone, limiting the rate at which collaborations can form and respond to challenges and opportunities, inhibiting citizen science and reducing data providers' trust in compliance. Using an automated system to facilitate compliance handling reduces substantially the time needed for such non-mission work, thereby accelerating collaboration and improving productivity. We present a framework, Dr.Aid, that helps individuals, organisations and federations comply with data rules, using automation to track which rules are applicable as data is passed between processes and as derived data is generated. It encodes data-governance rules using a formal language and performs reasoning on multi-input-multi-output data-flow graphs in decentralised contexts. We test its power and utility by working with users performing cyclone tracking and earthquake modelling to support mitigation and emergency response. We query standard provenance traces to detach Dr.Aid from details of the tools and systems they are using, as these inevitably vary across members of a federation and through time. We evaluate the model in three aspects by encoding real-life data-use policies from diverse fields, showing its capability for real-world usage and its advantages compared with traditional frameworks. We argue that this approach will lead to more agile, more productive and more trustworthy collaborations and show that the approach can be adopted incrementally. This, in-turn, will allow more appropriate data policies to emerge opening up new forms of collaboration.

Supplementary Material

ZIP File (v5cscw460aux.zip)
The supplementary file contains the figures in the original size, which are too large to be properly readable in the paper.

References

[1]
[n.d.]. Chapter 3 -- Rights of the data subject. https://gdpr-info.eu/chapter-3/
[2]
[n.d.]. Citing the ISC. http://www.isc.ac.uk/citations/
[3]
[n.d.]. CMIP6 Terms of Use. https://pcmdi.llnl.gov/CMIP6/TermsOfUse/TermsOfUse6--1.html
[4]
[n.d.]. CORDEX Data access. http://www.cordex.org/data-access/
[5]
[n.d.]. Creative Commons - Attribution 4.0 International - CC BY 4.0. https://creativecommons.org/licenses/by/4.0/
[6]
[n.d.]. Data access | CPRD. https://www.cprd.com/Data-access
[7]
[n.d.]. Earthquake List with real-time updates » INGV Osservatorio Nazionale Terremoti. http://cnt.rm.ingv.it/en
[8]
[n.d.]. EIDA Data Policy. http://www.orfeus-eu.org/data/eida/acknowledgements/
[9]
[n.d.]. Global Centroid Moment Tensor Project Citation Information. https://www.globalcmt.org/CMTcite.html
[10]
[n.d.]. INGV - RCMT. http://rcmt2.bo.ingv.it/
[11]
[n.d.]. IRIS Citations | IRIS. https://www.iris.edu/hq/iris_citations
[12]
[n.d.]. ISMD - Citation. http://ismd.mi.ingv.it/citation.php
[13]
[n.d.]. MIMIC Dataset Acknowledgements. https://mimic.physionet.org/about/acknowledgments/
[14]
[n.d.]. Open Government Licence. http://www.nationalarchives.gov.uk/doc/open-government-licence/version/3/
[15]
[n.d.]. Pima Indians Diabetes Database | Kaggle. https://www.kaggle.com/uciml/pima-indians-diabetes-database
[16]
[n.d.]. Terms of Use for Datasets. https://www.worldbank.org/en/about/legal/terms-of-use-for-datasets
[17]
2013. eXtensible Access Control Markup Language (XACML) Version 3.0. https://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html
[18]
2018. ODRL Information Model 2.2. https://www.w3.org/TR/odrl-model/
[19]
Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. 2016. Deep Learning with Differential Privacy. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). Association for Computing Machinery, New York, NY, USA, 308--318. https://doi.org/10.1145/2976749.2978318
[20]
Imtiaz Ahmad, Rosta Farzan, Apu Kapadia, and Adam J. Lee. 2020. Tangible Privacy: Towards User-Centric Sensor Designs for Bystander Privacy. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2 (Oct. 2020), 116:1--116:28. https://doi.org/10.1145/3415187
[21]
Peter Amstutz, Michael R. Crusoe, Neboj?a Tijani?, Brad Chapman, John Chilton, Michael Heuer, Andrey Kartashov, Dan Leehr, Hervé Ménager, Maya Nedeljkovich, Matt Scales, Stian Soiland-Reyes, and Luka Stojanovic. 2016. Common Workflow Language, v1.0. (July 2016). https://doi.org/10.6084/m9.figshare.3115156.v2 Publisher: figshare.
[22]
Malcolm Atkinson, Sandra Gesing, Johan Montagnat, and Ian Taylor. 2017. Scientific workflows: Past, present and future. Future Generation Computer Systems 75 (Oct. 2017), 216 -- 227. https://doi.org/10.1016/j.future.2017.05.041
[23]
Malcolm Atkinson, Iraklis Klampanos, Valentina Andries, Aurora Constantin, Rosa Filgueira, André Genünd, Ellen Gottschämmer, Vangelis Karkaletsis, Antonis Koukourikos, Amélie Levray, Mike Linder, Federica Magnoni, Christian Pagé, Andreas Rietbrock, Alessandro Spinuso, Chrysoula Themeli, Xenofon Tsilimparis, and Fabian Wolf. 2020. Dare Architecture and Technology D2.2. Technical Report. https://doi.org/10.5281/zenodo.4733801
[24]
Malcolm P. Atkinson, Rosa Filgueira, Iraklis A. Klampanos, Antonis Koukourikos, Amrey Krause, Federica Magnoni, Christian Pagé, Andreas Rietbrock, and Alessandro Spinuso. 2019. Comprehensible Control for Researchers and Developers Facing Data Challenges. In 15th International Conference on eScience, eScience 2019, San Diego, CA, USA, September 24--27, 2019. IEEE, 311--320. https://doi.org/10.1109/eScience.2019.00042
[25]
Tim Baarslag, Alper T. Alan, Richard Gomer, Muddasser Alam, Charith Perera, Enrico H. Gerding, and m.c. schraefel. 2017. An Automated Negotiation Agent for Permission Management. In Proceedings of the 16th Conference on Autonomous Agents and MultiAgent Systems (AAMAS '17). International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 380--390. http://dl.acm.org/citation.cfm?id=3091125.3091184
[26]
Cesare Bartolini, Gabriele Lenzini, and Livio Robaldo. 2019. The DAta Protection REgulation COmpliance Model. IEEE Security & Privacy 17, 6 (Nov. 2019), 37--45. https://doi.org/10.1109/MSEC.2019.2937756
[27]
Sean Bechhofer, Iain Buchan, David De Roure, Paolo Missier, John Ainsworth, Jiten Bhagat, Philip Couch, Don Cruickshank, Mark Delderfield, Ian Dunlop, Matthew Gamble, Danius Michaelides, Stuart Owen, David Newman, Shoaib Sufi, and Carole Goble. 2013. Why linked data is not enough for scientists. Future Generation Computer Systems 29, 2 (Feb. 2013), 599--611. https://doi.org/10.1016/j.future.2011.08.004
[28]
Daniel J. Dougherty, Kathi Fisler, and Shriram Krishnamurthi. 2007. Obligations and Their Interaction with Programs. In Computer Security -- ESORICS 2007 (Lecture Notes in Computer Science), Joachim Biskup and Javier López (Eds.). Springer, Berlin, Heidelberg, 375--389. https://doi.org/10.1007/978--3--540--74835--9_25
[29]
Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, and Peter Druschel. 2016. Thoth: Comprehensive Policy Compliance in Data Retrieval Systems. In Proceedings of the 25th USENIX Conference on Security Symposium (SEC'16). USENIX Association, Berkeley, CA, USA, 637--654. https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/elnikety
[30]
Yehia Elrakaiby, Frédéric Cuppens, and Nora Cuppens-Boulahia. 2012. Formal enforcement and management of obligation policies. Data & Knowledge Engineering 71, 1 (Jan. 2012), 127--147. https://doi.org/10.1016/j.datak.2011.09.001
[31]
Christopher James Ewin. 2018. Optimizing projection in the situation calculus. (2018). http://minerva-access.unimelb.edu.au/handle/11343/219204 Accepted: 2018--12-04T23:16:35Z.
[32]
Sebastian S. Feger, Pawel W. Wozniak, Lars Lischke, and Albrecht Schmidt. 2020. 'Yes, I comply!': Motivations and Practices around Research Data Management and Reuse across Scientific Fields. Proceedings of the ACM on Human-Computer Interaction 4, CSCW2 (Oct. 2020), 141:1--141:26. https://doi.org/10.1145/3415212
[33]
Melanie Feinberg, Will Sutherland, Sarah Beth Nelson, Mohammad Hossein Jarrahi, and Arcot Rajasekar. 2020. The New Reality of Reproducibility: The Role of Data Work in Scientific Research. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (May 2020), 035:1--035:22. https://doi.org/10.1145/3392840
[34]
Rosa Filguiera, Iraklis Klampanos, Amrey Krause, Mario David, Alexander Moreno, and Malcolm Atkinson. 2014. Dispel4Py: A Python Framework for Data-intensive Scientific Computing. In Proceedings of the 2014 International Workshop on Data Intensive Scalable Computing Systems (DISCS '14). IEEE Press, Piscataway, NJ, USA, 9--16. https://doi.org/10.1109/DISCS.2014.12
[35]
Daniel Garijo, Yolanda Gil, and Oscar Corcho. 2017. Abstract, link, publish, exploit: An end to end framework for workflow sharing. Future Generation Computer Systems 75 (Oct. 2017), 271--283. https://doi.org/10.1016/j.future.2017.01.008
[36]
Daniel Garijo, Maximiliano Osorio, Deborah Khider, Varun Ratnakar, and Yolanda Gil. 2019. OKG-Soft: An Open Knowledge Graph with Machine Readable Scientific Software Metadata. In 2019 15th International Conference on eScience (eScience). 349--358. https://doi.org/10.1109/eScience.2019.00046
[37]
Yolanda Gil, Daniel Garijo, Varun Ratnakar, Rajiv Mayani, Ravali Adusumilli, Hunter Boyce, and Parag Mallick. 2016. Automated Hypothesis Testing with Large Scientific Data Repositories. In Proceedings of the Fourth Annual Conference on Advances in Cognitive Systems (ACS). 16. http://dgarijo.com/papers/acs2016.pdf
[38]
Anthony J. G. Hey (Ed.). 2009. The fourth paradigm: data-intensive scientific discovery. Microsoft Research, Redmond, Washington.
[39]
Xing Huang, Xianghua Ding, Charlotte P. Lee, Tun Lu, and Ning Gu. 2013. Meanings and boundaries of scientific software sharing. In Proceedings of the 2013 conference on Computer supported cooperative work (CSCW '13). Association for Computing Machinery, New York, NY, USA, 423--434. https://doi.org/10/gk462v
[40]
L. Hutton and T. Henderson. 2018. Toward Reproducibility in Online Social Network Research. IEEE Transactions on Emerging Topics in Computing 6, 1 (Jan. 2018), 156--167. https://doi.org/10.1109/TETC.2015.2458574
[41]
Håvard D. Johansen, Eleanor Birrell, Robbert van Renesse, Fred B. Schneider, Magnus Stenhaug, and Dag Johansen. 2015. Enforcing Privacy Policies with Meta-Code. In Proceedings of the 6th Asia-Pacific Workshop on Systems (APSys '15). ACM Press, Tokyo, Japan, 1--7. https://doi.org/10.1145/2797022.2797040
[42]
Catholijn M. Jonker, Valentin Robu, and Jan Treur. 2007. An Agent Architecture for Multi-attribute Negotiation Using Incomplete Preference Information. Autonomous Agents and Multi-Agent Systems 15, 2 (Oct. 2007), 221--252. https://doi.org/10.1007/s10458-006--9009-y
[43]
Günter Karjoth, Matthias Schunter, and Michael Waidner. 2002. Platform for Enterprise Privacy Practices: Privacy-Enabled Management of Customer Data. In Privacy Enhancing Technologies (Lecture Notes in Computer Science). Springer, Berlin, Heidelberg, 69--84. https://doi.org/10.1007/3--540--36467--6_6
[44]
Donald A. Keefer and Karen M. Wickett. 2020. Adapting research process models for the design of knowledge engineering applications. Proceedings of the Association for Information Science and Technology 57, 1 (2020), e317. https://doi.org/10.1002/pra2.317 _eprint: https://asistdl.onlinelibrary.wiley.com/doi/pdf/10.1002/pra2.317.
[45]
Iraklis A. Klampanos, Chrysoula Themeli, Alessandro Spinuso, Rosa Filgueira, Malcolm Atkinson, André Gemünd, and Vangelis Karkaletsis. 2020. DARE Platform a Developer-Friendly and Self-Optimising Workflows-as-a-Service Framework for e-Science on the Cloud. Journal of Open Source Software 5, 54 (2020), 2664. https://doi.org/10.21105/joss.02664
[46]
Nadin Kökciyan and P"nar Yolum. 2017. Context-Based Reasoning on Privacy in Internet of Things. In Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence (IJCAI). 4738--4744. https://www.ijcai.org/proceedings/2017/660
[47]
Janne Lahtiranta, Sami Hyrynsalmi, and Jani Koskinen. 2017. The False Prometheus: Customer Choice, Smart Devices, and Trust. SIGCAS Comput. Soc. 47, 3 (Sept. 2017), 86--97. https://doi.org/10.1145/3144592.3144601
[48]
Jean-Baptiste Lamy. 2017. Owlready: Ontology-oriented programming in Python with automatic classification and high level constructs for biomedical ontologies. Artificial Intelligence in Medicine 80 (July 2017), 11--28. https://doi.org/10/gb4pjz
[49]
Hector J. Levesque, Raymond Reiter, Yves Lespérance, Fangzhen Lin, and Richard B. Scherl. 1997. GOLOG: A logic programming language for dynamic domains. The Journal of Logic Programming 31, 1 (1997), 59 -- 83. https://doi.org/10.1016/S0743--1066(96)00121--5
[50]
T. Li, A. K. Sahu, A. Talwalkar, and V. Smith. 2020. Federated Learning: Challenges, Methods, and Future Directions. IEEE Signal Processing Magazine 37, 3 (May 2020), 50--60. https://doi.org/10.1109/MSP.2020.2975749 Conference Name: IEEE Signal Processing Magazine.
[51]
Y. Li, W. Dai, Z. Ming, and M. Qiu. 2016. Privacy Protection for Preventing Data Over-Collection in Smart City. IEEE Trans. Comput. 65, 5 (May 2016), 1339--1350. https://doi.org/10.1109/TC.2015.2470247
[52]
Bradley Malin, David Karp, and Richard H. Scheuermann. 2010. Technical and Policy Approaches to Balancing Patient Privacy and Data Sharing in Clinical and Translational Research. Journal of Investigative Medicine 58, 1 (Jan. 2010), 11--18. https://doi.org/10.2310/JIM.0b013e3181c9b2ea
[53]
Phillip Mates, Emanuele Santos, Juliana Freire, and Cláudio T. Silva. 2011. CrowdLabs: Social Analysis and Visualization for the Sciences. In Scientific and Statistical Database Management (Lecture Notes in Computer Science), Judith Bayard Cushing, James French, and Shawn Bowers (Eds.). Springer, Berlin, Heidelberg, 555--564. https://doi.org/10.1007/978--3--642--22351--8_38
[54]
John McCarthy. 1963. Situations, Actions, and Causal Laws. Technical Report. STANFORD UNIV CA DEPT OF COMPUTER SCIENCE. https://apps.dtic.mil/sti/citations/AD0785031 Section: Technical Reports.
[55]
John McCarthy. 1969. Some philosophical problems from the standpoint of artificial intelligence. University, Edinburgh.
[56]
M. C. Mont, S. Pearson, and P. Bramhall. 2003. Towards accountable management of identity and privacy: sticky policies and enforceable tracing services. In 14th International Workshop on Database and Expert Systems Applications, 2003. Proceedings. 377--382. https://doi.org/10.1109/DEXA.2003.1232051
[57]
Andrew C. Myers and Barbara Liskov. 1997. A Decentralized Model for Information Flow Control. In Proceedings of the Sixteenth ACM Symposium on Operating Systems Principles (SOSP '97). ACM, New York, NY, USA, 129--142. https://doi.org/10.1145/268998.266669
[58]
Andrew B. Neang, Will Sutherland, Michael W. Beach, and Charlotte P. Lee. 2021. Data Integration as Coordination: The Articulation of Data Work in an Ocean Science Collaboration. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (Jan. 2021), 256:1--256:25. https://doi.org/10.1145/3432955
[59]
Jonathan A. Obar and Anne Oeldorf-Hirsch. 2020. The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society 23, 1 (Jan. 2020), 128--147. https://doi.org/10.1080/1369118X.2018.1486870
[60]
Object Management Group. 2013. Business Process Model and Notation (BPMN), Version 2.0.2. https://www.omg.org/spec/BPMN/.
[61]
Jaehong Park and Ravi Sandhu. 2004. The UCON ABC usage control model. ACM Transactions on Information and System Security 7, 1 (Feb. 2004), 128--174. https://doi.org/10.1145/984334.984339
[62]
Thomas F. J.-M. Pasquier, Jatinder Singh, David Eyers, and Jean Bacon. 2017. CamFlow: Managed Data-sharing for Cloud Services. IEEE Transactions on Cloud Computing 5, 3 (July 2017), 472--484. https://doi.org/10.1109/TCC.2015.2489211 arXiv: 1506.04391.
[63]
S. Pearson and M. Casassa-Mont. 2011. Sticky Policies: An Approach for Managing Privacy across Multiple Parties. Computer 44, 9 (Sept. 2011), 60--68. https://doi.org/10.1109/MC.2011.225
[64]
D. Peter, D. Komatitsch, Y. Luo, R. Martin, N. Le Goff, E. Casarotti, P. Le Loher, F. Magnoni, Q. Liu, C. Blitz, T. Nissen-Meyer, P. Basini, and J. Tromp. 2011. Forward and adjoint simulations of seismic wave propagation on fully unstructured hexahedral meshes. 186 (2011), 721--739.
[65]
Raymond Reiter. 1991. The frame problem in situation the calculus: a simple solution (sometimes) and a completeness result for goal regression. In Artificial intelligence and mathematical theory of computation: papers in honor of John McCarthy. Academic Press Professional, Inc., USA, 359--380.
[66]
Livio Robaldo and Xin Sun. 2017. Reified Input/Output logic: Combining Input/Output logic and Reification to represent norms coming from existing legislation. Journal of Logic and Computation 27, 8 (Dec. 2017), 2471--2503. https://doi.org/10.1093/logcom/exx009
[67]
Gokhan Sagirlar, Barbara Carminati, and Elena Ferrari. 2018. Decentralizing privacy enforcement for Internet of Things smart objects. Computer Networks 143 (Oct. 2018), 112--125. https://doi.org/10.1016/j.comnet.2018.07.019
[68]
S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer Networks 76 (Jan. 2015), 146--164. https://doi.org/10.1016/j.comnet.2014.11.008
[69]
Mark R. Sinclair. 2004. Extratropical Transition of Southwest Pacific Tropical Cyclones. Part II: Midlatitude Circulation Characteristics. Monthly Weather Review 132, 9 (Sept. 2004), 2145--2168. https://doi.org/10.1175/1520-0493(2004) 1322145:ETOSPT2.0.CO;2 Publisher: American Meteorological Society Section: Monthly Weather Review.
[70]
Michael Thielscher. 1999. From situation calculus to fluent calculus: State update axioms as a solution to the inferential frame problem. Artificial Intelligence 111, 1--2 (July 1999), 277--299. https://doi.org/10.1016/S0004--3702(99)00033--8
[71]
Tim Berners-Lee. 2009. Linked Data - Design Issues. https://www.w3.org/DesignIssues/LinkedData.html
[72]
Luca Trani, Mathijs Koymans, Malcolm Atkinson, Reinoud Sleeman, and Rosa Filgueira. 2017. WFCatalog: A catalogue for seismological waveform data. Computers & Geosciences 106 (Sept. 2017), 101--108. https://doi.org/10.1016/j.cageo.2017.06.008
[73]
W3C. 2013. PROV-O: The PROV Ontology. https://www.w3.org/TR/2013/REC-prov-o-20130430/
[74]
W3C. 2013. SPARQL 1.1 Query Language. https://www.w3.org/TR/sparql11-query/
[75]
Mark D. Wilkinson, Michel Dumontier, IJsbrand Jan Aalbersberg, Gabrielle Appleton, Myles Axton, Arie Baak, Niklas Blomberg, Jan-Willem Boiten, Luiz Bonino da Silva Santos, Philip E. Bourne, Jildau Bouwman, Anthony J. Brookes, Tim Clark, Mercè Crosas, Ingrid Dillo, Olivier Dumon, Scott Edmunds, Chris T. Evelo, Richard Finkers, Alejandra Gonzalez-Beltran, Alasdair J.G. Gray, Paul Groth, Carole Goble, Jeffrey S. Grethe, Jaap Heringa, Peter A.C 't Hoen, Rob Hooft, Tobias Kuhn, Ruben Kok, Joost Kok, Scott J. Lusher, Maryann E. Martone, Albert Mons, Abel L. Packer, Bengt Persson, Philippe Rocca-Serra, Marco Roos, Rene van Schaik, Susanna-Assunta Sansone, Erik Schultes, Thierry Sengstag, Ted Slater, George Strawn, Morris A. Swertz, Mark Thompson, Johan van der Lei, Erik van Mulligen, Jan Velterop, Andra Waagmeester, Peter Wittenburg, Katherine Wolstencroft, Jun Zhao, and Barend Mons. 2016. The FAIR Guiding Principles for scientific data management and stewardship. Scientific Data 3 (March 2016), 160018. https://doi.org/10.1038/sdata.2016.18
[76]
Christine T. Wolf, Julia Bullard, Stacy Wood, Amelia Acker, Drew Paine, and Charlotte P. Lee. 2019. Mapping the "How" of Collaborative Action: Research Methods for Studying Contemporary Sociotechnical Processes. In Conference Companion Publication of the 2019 on Computer Supported Cooperative Work and Social Computing (CSCW '19). Association for Computing Machinery, New York, NY, USA, 528--532. https://doi.org/10.1145/3311957.3359441
[77]
Amy X. Zhang, M. Muller, and Dakuo Wang. 2020. How do Data Science Workers Collaborate? Roles, Workflows, and Tools. Proc. ACM Hum. Comput. Interact. (2020). https://doi.org/10.1145/3392826
[78]
Rui Zhao and Malcolm Atkinson. 2019. Towards a Computer-Interpretable Actionable Formal Model to Encode Data Governance Rules. In Proceedings of 2019 15th International Conference on eScience (eScience). 594--603. https://doi.org/10.1109/eScience.2019.00082
[79]
Serena Zheng, Noah Apthorpe, Marshini Chetty, and Nick Feamster. 2018. User Perceptions of Smart Home IoT Privacy. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (Nov. 2018), 1--20. https://doi.org/10.1145/3274469 arXiv: 1802.08182.

Cited By

View all
  • (2024)Push the Limit of Highly Accurate Ranging on Commercial UWB DevicesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596028:2(1-27)Online publication date: 15-May-2024
  • (2024)Exploiting Anchor Links for NLOS Combating in UWB LocalizationACM Transactions on Sensor Networks10.1145/365763920:3(1-22)Online publication date: 6-May-2024
  • (2024)WAIS: Leveraging WiFi for Resource-Efficient SLAMProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661895(561-574)Online publication date: 3-Jun-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 5, Issue CSCW2
CSCW2
October 2021
5376 pages
EISSN:2573-0142
DOI:10.1145/3493286
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 18 October 2021
Published in PACMHCI Volume 5, Issue CSCW2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. automated reasoning
  2. data governance
  3. data policy
  4. formal model
  5. obligation policy

Qualifiers

  • Research-article

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)57
  • Downloads (Last 6 weeks)1
Reflects downloads up to 24 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Push the Limit of Highly Accurate Ranging on Commercial UWB DevicesProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36596028:2(1-27)Online publication date: 15-May-2024
  • (2024)Exploiting Anchor Links for NLOS Combating in UWB LocalizationACM Transactions on Sensor Networks10.1145/365763920:3(1-22)Online publication date: 6-May-2024
  • (2024)WAIS: Leveraging WiFi for Resource-Efficient SLAMProceedings of the 22nd Annual International Conference on Mobile Systems, Applications and Services10.1145/3643832.3661895(561-574)Online publication date: 3-Jun-2024
  • (2024)mmSign: mmWave-based Few-Shot Online Handwritten Signature VerificationACM Transactions on Sensor Networks10.1145/360594520:4(1-31)Online publication date: 11-May-2024
  • (2024)Perennial Semantic Data Terms of Use for Decentralized WebProceedings of the ACM Web Conference 202410.1145/3589334.3645631(2238-2249)Online publication date: 13-May-2024
  • (2024)Utilization of Data Governance as Support for Quality Assurance in the Systems Engineering Program at the Universidad Cooperativa de Colombia, Ibagué Espinal Campus2024 IEEE VII Congreso Internacional en Inteligencia Ambiental, Ingeniería de Software y Salud Electrónica y Móvil (AmITIC)10.1109/AmITIC62658.2024.10747646(1-7)Online publication date: 25-Sep-2024
  • (2023)XRLoc: Accurate UWB Localization to Realize XR DeploymentsProceedings of the 21st ACM Conference on Embedded Networked Sensor Systems10.1145/3625687.3625810(459-473)Online publication date: 12-Nov-2023
  • (2023)mmHSV: In-Air Handwritten Signature Verification via Millimeter-Wave RadarACM Transactions on Internet of Things10.1145/36144434:4(1-22)Online publication date: 22-Nov-2023
  • (2023)RoFin: 3D Hand Pose Reconstructing via 2D Rolling FingertipsProceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services10.1145/3581791.3596838(330-342)Online publication date: 18-Jun-2023
  • (2022)LASenseProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35172536:1(1-27)Online publication date: 29-Mar-2022

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media