Usage Control / Policy Requirements #878
Replies: 21 comments 10 replies
-
Dear Julia, unfortunately the IDS-G link seems to be broken, it returns 404 |
Beta Was this translation helpful? Give feedback.
-
[MUST] Policy use-case for EONA-XContextEONA-X is a mobility data space which is gathering partners from the travel industry. A demonstrator for EONA-X is under development and centered around a fictive company, which develops web application enabling users to build and manage multi-modal (i.e. working with multiple transportation modes such as flights, trains, bus...) journeys. Initial setup
In order to showcase the policy enforcement capabilities offered by the EDC, we would like to add a geographic usage restriction on some assets currently exposed by the partners in order to limit their consumption to partners located in EU. Demo
Technical aspect
|
Beta Was this translation helpful? Give feedback.
-
I am adding some inputs we collected. I will add them in several comments here. The first comment (this) will describe a use-case and some general preliminary requirements (may not be necessarily all related to the EDC). The following comments will contain user-stories according to the template above. Use-case: Sovereign health Dataspace
Similar Gaia-X use-case
|
Beta Was this translation helpful? Give feedback.
-
User-story 1: constrained data-transferType: Use CasesAs a home patient, I want to send my continuous vitals readings to the hospital to have my personal doctor review them only from the hospital lab (within the hospital IP range) and within working hours. (usage control, data-processing, must) |
Beta Was this translation helpful? Give feedback.
-
User-story 2: Delegation of authorityType: Use CasesAs a home patient, I want to send my continuous vitals readings to the hospital to have my personal doctor review them only from the As an admitted patient, in emergency cases, I want to authorize (delegate) my emergency contact to allow/deny usage requests on my medical data. (usage control, data-processing, would) |
Beta Was this translation helpful? Give feedback.
-
User-story 3: Consent + privacy-preserving obligationsType: Use CasesAs a home patient, I want to give (or deny) consent for requests by pharmaceutical companies to process my data, and revoke this access whenever I wish. As a hospital patient, I want my medical data to be anonymized before being shared with local officials. |
Beta Was this translation helpful? Give feedback.
-
User-story 4: Consent + privacy-preserving obligationsType: Use CasesAs a volunteer, I want to participate in research clinical trials only if my data is stored on a secure hardware in my city, and the data is deleted after 3 months. (control after transfer) (access control, data-processing, must) |
Beta Was this translation helpful? Give feedback.
-
Block an offer or resource from being consumedType: access control Use CasesAs an Organzational Operator I want to block a data offering if the data e.g. is illegal or appears to be stolen. Further informationThe organizational operator is legally responsible for data shared in the IDS. By providing the platform, the operator is also forced to supress certain illegal data from being exchanged. |
Beta Was this translation helpful? Give feedback.
-
Meta-data access controlType: access control Use CasesAs a Data Provider I want my data to be found only by specific participants of the data space since the knowledge that I own the data tells others which technical processes I use. Further informationPolicies should be available for meta-data as well. Participants don't want their competitors to see what data they offer. |
Beta Was this translation helpful? Give feedback.
-
Usage Policies for down-stream (third-party) Data ConsumersType: usage control Use caseAs a Data Provider I want to be able to create Usage Policies for third-party Data Consumers in case the Data Consumer transfers data to them to control the usage of my data by third-party Data Consumers. As a Data Provider I want to add a contract to my resource that must be used by Data Consumers if they want to further sell my data or derivatives of the data to others to make sure this happens to my conditions. |
Beta Was this translation helpful? Give feedback.
-
Allow access to individualsType: access control Use caseAs a Data Owner I want to share my data only with certain individuals from another company (or scientific instititute) to keep my data secret. Further informationEspecially in domains with sensitive data it is crucial for participants to know that they can restrict the data access to trusted individuals from another company and not to the whole company or business unit. |
Beta Was this translation helpful? Give feedback.
-
Allow access to groupsType: access control Use caseAs a Data Owner I want to share my data only with a team or organizational group from another company (or scientific instititute) to keep my data secret. |
Beta Was this translation helpful? Give feedback.
-
Access policies on graph data structureType: access control Use caseAs a Data Provider I need authorization profiles for partial graphs stored in triple-store/graph-databases to describe access policies to my stored data. Further informationE.g. In the field of materials research, data is stored in graph databases. There is a need to define access rules that allows access to certain parts of that graph. |
Beta Was this translation helpful? Give feedback.
-
Multiple Usage Policies for a resourceType: access control Use caseAs a Data Provider I want to add multiple Usage Policies to a resource. |
Beta Was this translation helpful? Give feedback.
-
Usage Policies using vocabulariesType: access control Use caseAs a Data Provider I want to write Usage Policies based on a vocabulary (Usage Policies that might not be able to express with the means of the Infomodel). |
Beta Was this translation helpful? Give feedback.
-
Request certified processingType: access control Use caseAs a Data Provider I want my data to be processable by certified apps only. |
Beta Was this translation helpful? Give feedback.
-
Remote AttestationType: access control Use caseAs a Data Provider I want a "Remote Attestation Result" for the integrity of the IDS instance that processes my data (also if processed in a chain with many pocessors). If the Remote Attestation fails I want to deny usage of/access to my data. |
Beta Was this translation helpful? Give feedback.
-
Restrict access to specific participantsType: access control Use caseAs a Data Provider I want to restrict the access to a resource to a specificly named participant. |
Beta Was this translation helpful? Give feedback.
-
Restrict to specific User RolesType: access control Use caseAs a Data Provider I want to restrict the access to a resource to a specific role in an organization. |
Beta Was this translation helpful? Give feedback.
-
Location-based UsageType: usage control Use caseAs a Data Provider I want to offer my resource within a specified region for legal reasons. |
Beta Was this translation helpful? Give feedback.
-
Share data for a specific computationType: usage control Use caseAs a Data Provider I want to offer my CO2 data to downstream users in the production line only for the use of calculating the CO2 footprint of a product to follow regulations. |
Beta Was this translation helpful? Give feedback.
-
As decided yesterday, this discussion should provide the possibility to collect requirements for further usage control implementations. We talked about the XAMCL data flow illustration and took a short look at existing IDS policy classes. For further details, please see the following links:
Before being able to refine implementation details, requirements need to be derived from existing use cases and prioritized.
How to collaborate
For each needed policy, please create a new comment. This way, it is possible to discussion different topics in different threads.
To prevent duplicates, please first check if a policy request already exists and add your information, ideas, use cases.
Prioritization
Stick to the following template by copying the following lines and replacing the cursive words.
Title (e.g., restrict data usage to geo-location)
access control
orusage control
must
,should
,could
, orwould
(see above for explanation)Use Cases
Please describe use cases that should and will be implemented with the EDC to understand the context of the desired policy - brief but clearly comprehensible.
More Information
Add further information that is not covered by this template.
Beta Was this translation helpful? Give feedback.
All reactions