METHOD 2012

Homepage of the 1st IEEE International Workshop on Methods for Establishing Trust with Open Data, which was co-located with COMPSAC 2012 in Izmir, Turkey. The workshop concluded successfully and we did have an overall of nine submissions and accepted five submissions as regular papers and two submissions as short papers (Acceptance Ratio: 78%). During the workshop there were a minimum of 6 up to a maximum of 15 people attending the sessions.

Aims and Scope

Technological advancements enables the gathering and analysis of large amounts of data, as well as the worldwide distribution in a matter of seconds. As a consequence, various information is routinely collected and utilized, for example to calculate more accurate bus schedules, optimise goods storage, have a better public administration, and generally to foster transparency in science, societal and economic processes. There is also strong effort, especially at the level of national and regional administrations, to provide already collected data based on "Open Data" principles. Open data implies that data is available in standardized formats, with liberal licensing models, free for everyone to use, and with no restrictions on its usage. One goal is the creation of a secondary market based on business models that offer new services by combination and enrichment of available open data sets. Unfortunately, by employing large-scale data analysis processes and by giving away control over the provided information, society also becomes increasingly vulnerable to information misuse. This prospect is met with rightful scepticism by the larger population and researchers are not only called upon to find new ways to protect citizen's privacy, but also to prevent data forgery, and identity theft. Solely relying on the structures of the current internet, which is worldwide connected and abundant with information, it is not possible to prove the provenance of data, or to decide if a certain piece of information is true. In other words: it is very hard to make an informed decision on the trustworthiness of a given piece of information.

In the METHOD workshop we plan to discuss approaches and concrete technical means required to establish trust in information that is processed, collected, managed, and provided using open data principles. In doing so, the workshop will bring together experts from two different areas. On the one hand from a technical field, namely trust research and trusted computing. On the other hand, there is the idea of open data, as put forward by researchers, activists and political stakeholders. Combining these two areas raises many interesting questions: Is there a way to assure the trustworthiness of an information source while keeping the identity of the source protected? How would engineers create systems with built-in accountability? Could one apply non-repudiation protocols to applications using linked open data? Is large-scale involvement of citizens a feasible approach to ensure data quality?

Topics

We invited authors to submit original papers that are relevant to both fields: open data and trust research. Contributions from the following list of topics were especially welcome:

Open data provenance

  • Information quality & trustworthiness
  • Attribution and integrity of information
  • Transparency and verification of information flows
  • Smart data

Expressing trust

  • Modeling trust in data-centric applications
  • Trust representation and derivation from open data
  • Attestation for data services and operations

Open trust management

  • Trust management in the semantic web
  • Management of reputation and user ratings
  • Community-based accountability
  • Trustable recommendation systems

Privacy preservation

  • De-identification of data
  • Anonymous authentication
  • Escrow services
  • Criticality assessment for data sets

Program Committee

  • Esteve Almirall, Esade Business School, Spain
  • Nils Barnickel, Fraunhofer FOKUS, Germany
  • Lizzie Coles-Kemp, Royal Holloway University of London, UK
  • Daniel Dietrich, Open Knowledge Foundation, Germany
  • Rino Falcone, Institute of Cognitive Sciences and Technologies, Italy
  • Matthias Fluegge, Fraunhofer FOKUS, Germany
  • Olaf Hartig, Humboldt-Universitaet zu Berlin, Germany
  • Gabriele Lenzini, University of Luxembourg, Luxembourg
  • Florian Marienfeld, Fraunhofer FOKUS, Germany
  • Steve Marsh, Communications Research Centre, Canada
  • Sjouke Mauw, University of Luxembourg, Luxembourg
  • Uwe Nestmann, Technische Universitaet Berlin, Germany
  • Miquel Oliver, Universitat Pompeu Fabra, Spain
  • Graeme John Proudler, HP Labs Bristol, UK
  • Marco Viviani, University of Insubria, Italy
  • Peng Zhang, Xi'an University of Posts and Telecommunications, China
  • Xinwen Zhang, Huawei Research Center, USA

Organisation

Topic attachments
I Attachment Action Size Date Who Comment
METHOD12-Huang.pdfpdf METHOD12-Huang.pdf manage 676.4 K 24 Oct 2012 - 15:54 EdzardHoefig Privacy Preserving Data Publishing for Recommender System - Presentation
METHOD12-Knap.pdfpdf METHOD12-Knap.pdf manage 1912.4 K 24 Oct 2012 - 15:55 EdzardHoefig Linked Open Data Aggregation: Conflict Resolution and Aggregate Quality - Presentation
METHOD12-Lalande.pdfpdf METHOD12-Lalande.pdf manage 1788.2 K 24 Oct 2012 - 15:56 EdzardHoefig Protecting resources in an open and trusted peer-to-peer network - Presentation
METHOD12-Tcholtchev.pdfpdf METHOD12-Tcholtchev.pdf manage 1725.5 K 24 Oct 2012 - 15:56 EdzardHoefig Identification and Utilization of Components for a linked Open Data Platform - Presentation
METHOD12-Zhendong.pdfpdf METHOD12-Zhendong.pdf manage 363.8 K 24 Oct 2012 - 15:56 EdzardHoefig Attack Vectors to Metering Data in Smart Grids under Security Constraints - Presentation
This topic: SE > WorkshopMETHOD12
Topic revision: 24 Oct 2012, EdzardHoefig