2011 IEEE 24th Computer Security Foundations Symposium 2011
DOI: 10.1109/csf.2011.26
|View full text |Cite
|
Sign up to set email alerts
|

A Formal Framework for Provenance Security

Abstract: Abstract-Provenance, or information about the origin, derivation, or history of data, is becoming an important topic especially for shared scientific or public data on the Web. It clearly has implications on security (and vice versa) yet these implications are not well-understood. A great deal of work has focused on mechanisms for recording, managing or using some kind of provenance information, but relatively little progress has been made on foundational models that define provenance and relate it to security… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
47
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 53 publications
(49 citation statements)
references
References 36 publications
0
47
0
1
Order By: Relevance
“…In this article, we build on, and refine, the provenance security framework previously introduced by Cheney [15]. We introduce a core language with replayable execution traces for a call-by-value, higher-order functional language, and make the following technical contributions:…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…In this article, we build on, and refine, the provenance security framework previously introduced by Cheney [15]. We introduce a core language with replayable execution traces for a call-by-value, higher-order functional language, and make the following technical contributions:…”
Section: Discussionmentioning
confidence: 99%
“…There is also some work directly addressing security for provenance [20,32,15,23,6,24]. Chong [20] gave (to our knowledge) the first candidate formal definitions of data security and provenance security using a trace semantics, based in part on earlier, unpublished work of ours on traces and provenance [16].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Our paper [17] explored connections to programming languages, security, incremental, and bidirectional computation research [1,5,25]. More recently, we have investigated foundations for provenance security [14], building on work by Chong [19]. We believe language-based provenance security to be a fruitful area for future work, possibly extending the derivation trace model in this paper.…”
Section: Related Workmentioning
confidence: 99%
“…Several recent works have considered formal semantics of provenance [9,8]. Cheney [12] presents a framework for provenance, built on a notion of system traces. Recently, W3C has proposed a data model for provenance, called PROV [5], which enjoys a formal description of its specified constraints and inferences in first-order logic, [13], however the given semantics does not cover the relationship between the provenance record and the actual system behavior.…”
Section: Related Workmentioning
confidence: 99%