Abstract | ||
---|---|---|
Provenance has become increasingly important in scientific workflows and services computing to capture the derivation history of a data product, including the original data sources, intermediate data products, and the steps that were applied to produce the data product. In many cases, both scientific results and the used protocol are sensitive and effective access control mechanisms are essential to protect their confidentiality. In this paper, we propose: 1) a formal scientific workflow provenance model as the basis for querying and access control for workflow provenance; 2) a security model for fine-grained access control for multilevel provenance and an algorithm for the derivation of a full security specification based on inheritance, overriding, and conflict resolution; 3) a formalization of the notion of security views and an algorithm for security view derivation; and 4) a formalization of the notion of secure abstraction views and an algorithm for its computation. A prototype called SecProv has been developed, and experiments show the effectiveness and efficiency of our approach. |
Year | DOI | Venue |
---|---|---|
2010 | 10.1109/TSC.2010.38 | IEEE T. Services Computing |
Keywords | DocType | Volume |
workflow provenance,Secure Abstraction Views,security view derivation,multilevel provenance,data product,original data source,formal scientific workflow provenance,security view,security model,intermediate data product,full security specification,Scientific Workflow Provenance Querying | Journal | 3 |
Issue | ISSN | Citations |
4 | 1939-1374 | 3 |
PageRank | References | Authors |
0.48 | 0 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Artem Chebotko | 1 | 444 | 30.14 |
Lu, Shiyong | 2 | 2022 | 126.17 |
Seunghan Chang | 3 | 27 | 2.16 |
Farshad Fotouhi | 4 | 1023 | 122.73 |
Ping Yang | 5 | 52 | 10.62 |