Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies

Salvato in:
Dettagli Bibliografici
Pubblicato in:Data & Policy vol. 6 (Dec 2024)
Autore principale: Guitton, Florian
Altri autori: Oehmichen, Axel, Bossé, Étienne, Guo, Yike
Pubblicazione:
Cambridge University Press
Soggetti:
Accesso online:Citation/Abstract
Full Text
Full Text - PDF
Tags: Aggiungi Tag
Nessun Tag, puoi essere il primo ad aggiungerne!!

MARC

LEADER 00000nab a2200000uu 4500
001 3149093010
003 UK-CbPIL
022 |a 2632-3249 
024 7 |a 10.1017/dap.2024.68  |2 doi 
035 |a 3149093010 
045 2 |b d20241201  |b d20241231 
100 1 |a Guitton, Florian  |u Data Science Institute, Imperial College London, London, United Kingdom 
245 1 |a Honest Computing: achieving demonstrable data lineage and provenance for driving data and process-sensitive policies 
260 |b Cambridge University Press  |c Dec 2024 
513 |a Journal Article 
520 3 |a Data is the foundation of any scientific, industrial, or commercial process. Its journey flows from collection to transport, storage, and processing. While best practices and regulations guide its management and protection, recent events have underscored their vulnerabilities. Academic research and commercial data handling have been marred by scandals, revealing the brittleness of data management. Data is susceptible to undue disclosures, leaks, losses, manipulation, or fabrication. These incidents often occur without visibility or accountability, necessitating a systematic structure for safe, honest, and auditable data management. We introduce the concept of Honest Computing as the practice and approach that emphasizes transparency, integrity, and ethical behaviour within the realm of computing and technology. It ensures that computer systems and software operate honestly and reliably without hidden agendas, biases, or unethical practices. It enables privacy and confidentiality of data and code by design and default. We also introduce a reference framework to achieve demonstrable data lineage and provenance, contrasting it with Secure Computing, a related but differently orientated form of computing. At its core, Honest Computing leverages Trustless Computing, Confidential Computing, Distributed Computing, Cryptography, and AAA security concepts. Honest Computing opens new ways of creating technology-based processes and workflows which permit the migration of regulatory frameworks for data protection from principle-based approaches to rule-based ones. Addressing use cases in many fields, from AI model protection and ethical layering to digital currency formation for finance and banking, trading, and healthcare, this foundational layer approach can help define new standards for appropriate data custody and processing. 
653 |a Scandals 
653 |a Transparency 
653 |a Data processing 
653 |a Cryptography 
653 |a Principles 
653 |a Manipulation 
653 |a Visibility 
653 |a Ethical conduct 
653 |a Best practice 
653 |a Automation 
653 |a Privacy 
653 |a Rules 
653 |a Confidentiality 
653 |a Ethical standards 
653 |a Digital currencies 
653 |a Distributed processing 
653 |a Ethics 
653 |a Accountability 
653 |a Computer program integrity 
653 |a Data management 
653 |a Storage 
653 |a Data integrity 
653 |a Health care 
653 |a Regulation 
653 |a Migration 
653 |a Enforcement 
653 |a Decision making 
653 |a Empowerment 
653 |a Morality 
653 |a Fabrication 
653 |a Compliance 
653 |a Banking 
653 |a Management 
653 |a Technology 
653 |a Lineage 
653 |a Digital technology 
653 |a Data 
653 |a Protection 
653 |a Health services 
700 1 |a Oehmichen, Axel  |u Data Science Institute, Imperial College London, London, United Kingdom; Secretarium Ltd, London, United Kingdom 
700 1 |a Bossé, Étienne  |u Secretarium Ltd, London, United Kingdom 
700 1 |a Guo, Yike  |u Hong Kong University of Science and Technology, Clear Water Bay, Hong Kong 
773 0 |t Data & Policy  |g vol. 6 (Dec 2024) 
786 0 |d ProQuest  |t Political Science Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3149093010/abstract/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text  |u https://www.proquest.com/docview/3149093010/fulltext/embedded/6A8EOT78XXH2IG52?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3149093010/fulltextPDF/embedded/6A8EOT78XXH2IG52?source=fedsrch