2009
DOI: 10.1007/978-3-642-04219-5_5
|View full text |Cite
|
Sign up to set email alerts
|

An Access Control Language for a General Provenance Model

Abstract: Abstract. Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in the context of data security research. One important challenge in provenance access control is the lack of an access control language that supports its specific requirements, e.g., the support of both fine-grained policies and personal preferences, and decision aggregation from different applicable policies. In this paper, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2010
2010
2016
2016

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 48 publications
(33 citation statements)
references
References 22 publications
0
30
0
Order By: Relevance
“…Cadenhead et al [35] proposes an extension to the ACL [36] with regular expression grammar, to operate on provenance graphs (OPM). This allows the policies to take OPM's node and edge names into account when declaring policies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Cadenhead et al [35] proposes an extension to the ACL [36] with regular expression grammar, to operate on provenance graphs (OPM). This allows the policies to take OPM's node and edge names into account when declaring policies.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [17], the authors used the formal properties of graph transformation to detect and resolve inconsistencies within the specification of access control policies. References [4,26,21] focus on the unique features of provenance with respect to the security of provenance itself. While [21] prescribes a generalized access control model, the flow of information between various sources and the causal relationships among entities are not immediately obvious in this work.…”
Section: Related Workmentioning
confidence: 99%
“…References [4,26,21] focus on the unique features of provenance with respect to the security of provenance itself. While [21] prescribes a generalized access control model, the flow of information between various sources and the causal relationships among entities are not immediately obvious in this work. Our work is also motivated by [4,6,20,27] where the focus is on representing provenance as a directed graph structure.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Nagappan et al [10] present a model for sharing provenance data that uses role-based access control techniques where the user dynamically select its confidentiality level. A common approach for protecting provenance information [2] [10] [11] is to use access control mechanisms to prevent unauthorized access to this information. None of these approaches allow for non-restricted dissemination of provenance information with maintenance of correct attribution, a requirement in the context of e-Science.…”
Section: Security Requirements For Provenance Systemsmentioning
confidence: 99%