Computer Aided Anonymization and Redaction of Judicial Documents

被引:0
作者
Sladic, Goran [1 ]
Gostojic, Stevan [1 ]
Milosavljevic, Branko [1 ]
Konjovic, Zora [1 ]
Milosavljevic, Gordana [1 ]
机构
[1] Univ Novi Sad, Fac Tech Sci, Trg D Obradov 6, Novi Sad 21000, Serbia
关键词
anonymization; redaction; RBAC; judicial documents; XML; AKOMA NTOSO; ACCESS-CONTROL FRAMEWORK; CONTROL MODEL;
D O I
10.2298/CSIS140808038S
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public access to case law is a required prerequisite for the legal certainty and the rule of law. Nevertheless, according to the law, only authorized persons can access judgments in their non-anonymized and unredacted form. This paper proposes a computer aided method for anonymization and redaction of judgments, with an aim to improve efficiency of overall process. The anonymization and redaction procedure is based on the access control mechanism for XML documents. AKOMA NTOSO is chosen as an XML format in order to facilitate integration with other (legal) information systems, but the proposed method can be easily adapted to different document types and different XML formats. The method is verified by a prototype implementation which is validated by employees in a court of law.
引用
收藏
页码:217 / 236
页数:20
相关论文
共 38 条
  • [1] [Anonymous], 2012, OASIS LEGALDOCUMENTM
  • [2] BACCI L, 2009, P LOAIT WORKSH, P45
  • [3] Bai Y, 2008, LECT NOTES ARTIF INT, V5027, P621
  • [4] Belhissi R., 2011, ENG SCI TECHNOLOGY I, V1, P51
  • [5] Bertino E., 2002, ACM Transactions on Information and Systems Security, V5, P290, DOI 10.1145/545186.545190
  • [6] Securing XML documents with author-X
    Bertino, E
    Castano, S
    Ferrari, E
    [J]. IEEE INTERNET COMPUTING, 2001, 5 (03) : 21 - 31
  • [7] Bertino E., 2004, INFORM SECURITY TECH, V9, P19, DOI DOI 10.1016/S1363-4127(04)00029-9
  • [8] XML-Based specification for web services document security
    Bhatti, R
    Bertino, E
    Ghafoor, A
    Joshi, JBD
    [J]. COMPUTER, 2004, 37 (04) : 41 - +
  • [9] Bhatti R, 2003, ICWS'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WEB SERVICES, P243
  • [10] Botha Reinhardt A., 2001, Information Management and Computer Security, V9, P126