About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

How to Trust the Re-use of Data

Edited by Foresti, Sara

From

Department of Applied Mathematics and Computer Science, Technical University of Denmark1

Language-Based Technology, Department of Applied Mathematics and Computer Science, Technical University of Denmark2

Department of Informatics and Mathematical Modeling, Technical University of Denmark3

Research in natural sciences and life sciences involve carrying out experiments to collect data as well as carrying out analysis to interpret the data. Increasingly data is being made available to other scientists in big databases. The scientific process builds on the idea that research results can be independently validated by other researchers.

However, the concern about the correct re-use of data is also increasing. As illustrated by a currently evolving case of alleged scientific mispractice there is a need to support a reliable re-use of data. To solve this challenge we introduce an enriched coordination language based on Klaim, that can model the coordination of the re-use of data in the research community.

We define the formal semantics of our language and develop a static analysis that can be used to check whether we have a trustable re-use of data.

Language: English
Publisher: Springer
Year: 2015
Pages: 72-88
Proceedings: 11th International Workshop on Security and Trust Management (STM 2015)International Workshop on Security and Trust Management
Series: Lecture Notes in Computer Science
ISBN: 331924857X , 331924857x , 3319248588 , 9783319248578 and 9783319248585
ISSN: 03029743
Types: Conference paper
DOI: 10.1007/978-3-319-24858-5_5
ORCIDs: Nielson, Hanne Riis and Nielson, Flemming

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis