{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T17:02:00Z","timestamp":1761238920422,"version":"3.41.2"},"reference-count":79,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW2","license":[{"start":{"date-parts":[[2021,10,13]],"date-time":"2021-10-13T00:00:00Z","timestamp":1634083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","award":["777413"],"award-info":[{"award-number":["777413"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2021,10,13]]},"abstract":"<jats:p>Collaboration across institutional boundaries is widespread and increasing today. It depends on federations sharing data that often have governance rules or external regulations restricting their use. However, the handling of data governance rules (aka. data-use policies) remains manual, time-consuming and error-prone, limiting the rate at which collaborations can form and respond to challenges and opportunities, inhibiting citizen science and reducing data providers' trust in compliance. Using an automated system to facilitate compliance handling reduces substantially the time needed for such non-mission work, thereby accelerating collaboration and improving productivity. We present a framework, Dr.Aid, that helps individuals, organisations and federations comply with data rules, using automation to track which rules are applicable as data is passed between processes and as derived data is generated. It encodes data-governance rules using a formal language and performs reasoning on multi-input-multi-output data-flow graphs in decentralised contexts. We test its power and utility by working with users performing cyclone tracking and earthquake modelling to support mitigation and emergency response. We query standard provenance traces to detach Dr.Aid from details of the tools and systems they are using, as these inevitably vary across members of a federation and through time. We evaluate the model in three aspects by encoding real-life data-use policies from diverse fields, showing its capability for real-world usage and its advantages compared with traditional frameworks. We argue that this approach will lead to more agile, more productive and more trustworthy collaborations and show that the approach can be adopted incrementally. This, in-turn, will allow more appropriate data policies to emerge opening up new forms of collaboration.<\/jats:p>","DOI":"10.1145\/3479604","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T02:46:19Z","timestamp":1634611579000},"page":"1-43","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Dr.Aid: Supporting Data-governance Rule Compliance for Decentralized Collaboration in an Automated Way"],"prefix":"10.1145","volume":"5","author":[{"given":"Rui","family":"Zhao","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Malcolm","family":"Atkinson","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Petros","family":"Papapanagiotou","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Federica","family":"Magnoni","sequence":"additional","affiliation":[{"name":"INGV, Rome, Italy"}]},{"given":"Jacques","family":"Fleuriot","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2021,10,18]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"[n.d.]. Chapter 3 -- Rights of the data subject. https:\/\/gdpr-info.eu\/chapter-3\/"},{"key":"e_1_2_2_2_1","unstructured":"[n.d.]. Citing the ISC. http:\/\/www.isc.ac.uk\/citations\/"},{"key":"e_1_2_2_3_1","unstructured":"[n.d.]. CMIP6 Terms of Use. https:\/\/pcmdi.llnl.gov\/CMIP6\/TermsOfUse\/TermsOfUse6--1.html"},{"key":"e_1_2_2_4_1","unstructured":"[n.d.]. CORDEX Data access. http:\/\/www.cordex.org\/data-access\/"},{"key":"e_1_2_2_5_1","unstructured":"[n.d.]. Creative Commons - Attribution 4.0 International - CC BY 4.0. https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"key":"e_1_2_2_6_1","unstructured":"[n.d.]. Data access | CPRD. https:\/\/www.cprd.com\/Data-access"},{"key":"e_1_2_2_7_1","unstructured":"[n.d.]. Earthquake List with real-time updates \u00bb INGV Osservatorio Nazionale Terremoti. http:\/\/cnt.rm.ingv.it\/en"},{"key":"e_1_2_2_8_1","unstructured":"[n.d.]. EIDA Data Policy. http:\/\/www.orfeus-eu.org\/data\/eida\/acknowledgements\/"},{"key":"e_1_2_2_9_1","unstructured":"[n.d.]. Global Centroid Moment Tensor Project Citation Information. https:\/\/www.globalcmt.org\/CMTcite.html"},{"key":"e_1_2_2_10_1","unstructured":"[n.d.]. INGV - RCMT. http:\/\/rcmt2.bo.ingv.it\/"},{"key":"e_1_2_2_11_1","unstructured":"[n.d.]. IRIS Citations | IRIS. https:\/\/www.iris.edu\/hq\/iris_citations"},{"key":"e_1_2_2_12_1","unstructured":"[n.d.]. ISMD - Citation. http:\/\/ismd.mi.ingv.it\/citation.php"},{"key":"e_1_2_2_13_1","unstructured":"[n.d.]. MIMIC Dataset Acknowledgements. https:\/\/mimic.physionet.org\/about\/acknowledgments\/"},{"key":"e_1_2_2_14_1","unstructured":"[n.d.]. Open Government Licence. http:\/\/www.nationalarchives.gov.uk\/doc\/open-government-licence\/version\/3\/"},{"key":"e_1_2_2_15_1","unstructured":"[n.d.]. Pima Indians Diabetes Database | Kaggle. https:\/\/www.kaggle.com\/uciml\/pima-indians-diabetes-database"},{"key":"e_1_2_2_16_1","unstructured":"[n.d.]. Terms of Use for Datasets. https:\/\/www.worldbank.org\/en\/about\/legal\/terms-of-use-for-datasets"},{"key":"e_1_2_2_17_1","unstructured":"2013. eXtensible Access Control Markup Language (XACML) Version 3.0. https:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html"},{"key":"e_1_2_2_18_1","unstructured":"2018. ODRL Information Model 2.2. https:\/\/www.w3.org\/TR\/odrl-model\/"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978318"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.6084\/m9.figshare.3115156.v2"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.05.041"},{"key":"e_1_2_2_23_1","unstructured":"Malcolm Atkinson Iraklis Klampanos Valentina Andries Aurora Constantin Rosa Filgueira Andr\u00e9 Gen\u00fcnd Ellen Gottsch\u00e4mmer Vangelis Karkaletsis Antonis Koukourikos Am\u00e9lie Levray Mike Linder Federica Magnoni Christian Pag\u00e9 Andreas Rietbrock Alessandro Spinuso Chrysoula Themeli Xenofon Tsilimparis and Fabian Wolf. 2020. Dare Architecture and Technology D2.2. Technical Report. https:\/\/doi.org\/10.5281\/zenodo.4733801"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2019.00042"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/3091125.3091184"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2937756"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2011.08.004"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--540--74835--9_25"},{"key":"e_1_2_2_29_1","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium (SEC'16)","author":"Elnikety Eslam","year":"2016","unstructured":"Eslam Elnikety, Aastha Mehta, Anjo Vahldiek-Oberwagner, Deepak Garg, and Peter Druschel. 2016. Thoth: Comprehensive Policy Compliance in Data Retrieval Systems. In Proceedings of the 25th USENIX Conference on Security Symposium (SEC'16). USENIX Association, Berkeley, CA, USA, 637--654. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/elnikety"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2011.09.001"},{"key":"e_1_2_2_31_1","unstructured":"Christopher James Ewin. 2018. Optimizing projection in the situation calculus. (2018). http:\/\/minerva-access.unimelb.edu.au\/handle\/11343\/219204 Accepted: 2018--12-04T23:16:35Z."},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415212"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392840"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCS.2014.12"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.01.008"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2019.00046"},{"key":"e_1_2_2_37_1","volume-title":"Proceedings of the Fourth Annual Conference on Advances in Cognitive Systems (ACS). 16","author":"Gil Yolanda","year":"2016","unstructured":"Yolanda Gil, Daniel Garijo, Varun Ratnakar, Rajiv Mayani, Ravali Adusumilli, Hunter Boyce, and Parag Mallick. 2016. Automated Hypothesis Testing with Large Scientific Data Repositories. In Proceedings of the Fourth Annual Conference on Advances in Cognitive Systems (ACS). 16. http:\/\/dgarijo.com\/papers\/acs2016.pdf"},{"key":"e_1_2_2_38_1","unstructured":"Anthony J. G. Hey (Ed.). 2009. The fourth paradigm: data-intensive scientific discovery. Microsoft Research Redmond Washington."},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441825"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2458574"},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2797022.2797040"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-006--9009-y"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--36467--6_6"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/pra2.317"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.02664"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/660"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144592.3144601"},{"key":"e_1_2_2_48_1","volume-title":"Owlready: Ontology-oriented programming in Python with automatic classification and high level constructs for biomedical ontologies. Artificial Intelligence in Medicine 80 (July","author":"Lamy Jean-Baptiste","year":"2017","unstructured":"Jean-Baptiste Lamy. 2017. Owlready: Ontology-oriented programming in Python with automatic classification and high level constructs for biomedical ontologies. Artificial Intelligence in Medicine 80 (July 2017), 11--28. https:\/\/doi.org\/10\/gb4pjz"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0743--1066(96)00121--5"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2020.2975749"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470247"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.2310\/JIM.0b013e3181c9b2ea"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--22351--8_38"},{"key":"e_1_2_2_54_1","doi-asserted-by":"crossref","unstructured":"John McCarthy. 1963. Situations Actions and Causal Laws. Technical Report. STANFORD UNIV CA DEPT OF COMPUTER SCIENCE. https:\/\/apps.dtic.mil\/sti\/citations\/AD0785031 Section: Technical Reports.","DOI":"10.21236\/AD0785031"},{"volume-title":"Some philosophical problems from the standpoint of artificial intelligence","author":"McCarthy John","key":"e_1_2_2_55_1","unstructured":"John McCarthy. 1969. Some philosophical problems from the standpoint of artificial intelligence. University, Edinburgh."},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2003.1232051"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266669"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3432955"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"issue":"0","key":"e_1_2_2_60_1","first-page":"2","article-title":"Business Process Model and Notation (BPMN)","volume":"2","author":"Object Management Group","year":"2013","unstructured":"Object Management Group. 2013. Business Process Model and Notation (BPMN), Version 2.0.2. https:\/\/www.omg.org\/spec\/BPMN\/.","journal-title":"Version"},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2015.2489211"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.225"},{"key":"e_1_2_2_64_1","doi-asserted-by":"crossref","unstructured":"D. Peter D. Komatitsch Y. Luo R. Martin N. Le Goff E. Casarotti P. Le Loher F. Magnoni Q. Liu C. Blitz T. Nissen-Meyer P. Basini and J. Tromp. 2011. Forward and adjoint simulations of seismic wave propagation on fully unstructured hexahedral meshes. 186 (2011) 721--739.","DOI":"10.1111\/j.1365-246X.2011.05044.x"},{"volume-title":"Artificial intelligence and mathematical theory of computation: papers in honor of John McCarthy","author":"Reiter Raymond","key":"e_1_2_2_65_1","unstructured":"Raymond Reiter. 1991. The frame problem in situation the calculus: a simple solution (sometimes) and a completeness result for goal regression. In Artificial intelligence and mathematical theory of computation: papers in honor of John McCarthy. Academic Press Professional, Inc., USA, 359--380."},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exx009"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.07.019"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","unstructured":"S. Sicari A. Rizzardi L. A. Grieco and A. Coen-Porisini. 2015. Security privacy and trust in Internet of Things: The road ahead. Computer Networks 76 (Jan. 2015) 146--164. https:\/\/doi.org\/10.1016\/j.comnet.2014.11.008","DOI":"10.1016\/j.comnet.2014.11.008"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0493(2004)"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0004--3702(99)00033--8"},{"key":"e_1_2_2_71_1","unstructured":"Tim Berners-Lee. 2009. Linked Data - Design Issues. https:\/\/www.w3.org\/DesignIssues\/LinkedData.html"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2017.06.008"},{"key":"e_1_2_2_73_1","unstructured":"W3C. 2013. PROV-O: The PROV Ontology. https:\/\/www.w3.org\/TR\/2013\/REC-prov-o-20130430\/"},{"key":"e_1_2_2_74_1","unstructured":"W3C. 2013. SPARQL 1.1 Query Language. https:\/\/www.w3.org\/TR\/sparql11-query\/"},{"key":"e_1_2_2_75_1","doi-asserted-by":"publisher","unstructured":"Mark D. Wilkinson Michel Dumontier IJsbrand Jan Aalbersberg Gabrielle Appleton Myles Axton Arie Baak Niklas Blomberg Jan-Willem Boiten Luiz Bonino da Silva Santos Philip E. Bourne Jildau Bouwman Anthony J. Brookes Tim Clark Merc\u00e8 Crosas Ingrid Dillo Olivier Dumon Scott Edmunds Chris T. Evelo Richard Finkers Alejandra Gonzalez-Beltran Alasdair J.G. Gray Paul Groth Carole Goble Jeffrey S. Grethe Jaap Heringa Peter A.C 't Hoen Rob Hooft Tobias Kuhn Ruben Kok Joost Kok Scott J. Lusher Maryann E. Martone Albert Mons Abel L. Packer Bengt Persson Philippe Rocca-Serra Marco Roos Rene van Schaik Susanna-Assunta Sansone Erik Schultes Thierry Sengstag Ted Slater George Strawn Morris A. Swertz Mark Thompson Johan van der Lei Erik van Mulligen Jan Velterop Andra Waagmeester Peter Wittenburg Katherine Wolstencroft Jun Zhao and Barend Mons. 2016. The FAIR Guiding Principles for scientific data management and stewardship. Scientific Data 3 (March 2016) 160018. https:\/\/doi.org\/10.1038\/sdata.2016.18","DOI":"10.1038\/sdata.2016.18"},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311957.3359441"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3392826"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2019.00082"},{"key":"e_1_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479604","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3479604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T05:00:11Z","timestamp":1752469211000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3479604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,13]]},"references-count":79,"journal-issue":{"issue":"CSCW2","published-print":{"date-parts":[[2021,10,13]]}},"alternative-id":["10.1145\/3479604"],"URL":"https:\/\/doi.org\/10.1145\/3479604","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2021,10,13]]},"assertion":[{"value":"2021-10-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}