2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications 2014
DOI: 10.1109/trustcom.2014.101
|View full text |Cite
|
Sign up to set email alerts
|

Towards Policy Retrieval for Provenance Based Access Control Model

Abstract: Provenance Based Access Control (PBAC) is a new access control mechanism wherein the access control decisions are made based on a set of assertions about provenance traces. Manually designing a variety of provenance based security policies is not trivial work for big data applications with large amount of provenance entity types and complex provenance dependencies. Policy retrieval can reduce such manual labor by automatically "learning" policies from previous provenance traces. In this paper, we look into the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 13 publications
(18 reference statements)
0
4
0
Order By: Relevance
“…Used in # of studies Percentage SVM [51], [39], [56], [65], [46], [64], [40], [59], [38], [74], [8], [75], [62], [76], [77], [37] 16 25 % RF [50], [41], [44], [26], [64], [29], [59], [60], [10], [33], [34], [13], [37], [69] 14 22 % DT [9], [42], [25], [71], [72], [49], [66], [33], [77] 9 14 % KNN [41], [45] , [46], [66], [59], [10] [8], [77], [43], [70], [73], S15, [53],…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Used in # of studies Percentage SVM [51], [39], [56], [65], [46], [64], [40], [59], [38], [74], [8], [75], [62], [76], [77], [37] 16 25 % RF [50], [41], [44], [26], [64], [29], [59], [60], [10], [33], [34], [13], [37], [69] 14 22 % DT [9], [42], [25], [71], [72], [49], [66], [33], [77] 9 14 % KNN [41], [45] , [46], [66], [59], [10] [8], [77], [43], [70], [73], S15, [53],…”
Section: Methodsmentioning
confidence: 99%
“…% AnonyT, APRP, AuthT, completeness, coverage, ERP, EUR, fitness, generality, InACRR, incompleteness, MER, NRD/P, PCR, RAUti, RPA, scalability, stability, WAP [48], [60], [55], [49], [54], [58], [58], [61], [54], [50], [73], [68], [55], [10], [75], [51], [63], [54], [44] (respectively) 1 each metric 30 % evaluation metrics were often used within a single study, supporting the results depicted in Figure 10.…”
Section: H Performance Metrics (Rq8)mentioning
confidence: 99%
“…It provides dynamic separation of duties, origin-based control and objects versioning in environments like WBSNs. Pei et al [25] define a framework to capture data provenance and create access control policies from collected data being possible its application in WBSNs. Cheng et al [9] look for the administrative management of a relationship-based access control model including provenance management.…”
Section: Related Workmentioning
confidence: 99%
“…We believe that by allowing more flexible control of approximated data provenance summarization using entropy measurements, a wide scope of provenancerelated tasks, for example, provenance based access control rules retrieval [24], provenance visualization [25], and provenance storage [26,27], can be performed both more effectively and more efficiently.…”
Section: Related Workmentioning
confidence: 99%