Abstract
There is a range of reasons for securing data and systems, from those already common nowadays (IPR, licenses, privacy, confidentiality, etc.) to others likely to appear in the future (distributed trust, reputation building, social collaboration, etc.). The systems need to manage the data according to these restrictions while maintaining other requirements for data infrastructures (e.g., scalability, interoperability, provenance), and also the systems themselves need to be secured against potential external attacks.
DOI: https://doi.org/10.2481/dsj.GRDI-012 | Journal eISSN: 1683-1470
Language: English
Published on: Jul 30, 2013
Published by: Ubiquity Press
In partnership with: Paradigm Publishing Services
Publication frequency: 1 issue per year
© 2013 Diego Lopez, published by Ubiquity Press
This work is licensed under the Creative Commons Attribution 4.0 License.
