2015
DOI: 10.1007/978-3-319-16462-5_10
|View full text |Cite
|
Sign up to set email alerts
|

A Provenance-Based Policy Control Framework for Cloud Services

Abstract: Abstract. In the context of software, provenance holds the key to retaining a mirror instance of the lifespan of a service, which can be replayed/reproduced from the beginning. This entails the nature of invocations that took place, how/where the data were created, modified, updated and the user's engagement with the service. With such an encyclopedia of information, it opens up a diversity of value-added features (compliance control, accountability) that can improve the usability of a service.In this paper, w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…In the security discussion, three papers were presented: [56] is a survey for security in seven provenance systems, [45] proposes a policy control framework for integrating and developing services that generate and use provenance. [63] provides security controls for protecting provenance information.…”
Section: Provenancementioning
confidence: 99%
“…In the security discussion, three papers were presented: [56] is a survey for security in seven provenance systems, [45] proposes a policy control framework for integrating and developing services that generate and use provenance. [63] provides security controls for protecting provenance information.…”
Section: Provenancementioning
confidence: 99%
“…Provenance on cloud computing can help in running forensic analysis of past events if recorded separately in addition to the data generated by the events [24]. This can ensure transparency, data fidelity and protection, privacy issues of the data collected, quality control, and intellectual property protection [25]. In cloud manufacturing, the IIoTs and the cyber physical systems enabled by them can be tracked closely using their provenance data [26][27][28].…”
mentioning
confidence: 99%