Title
Analysis of Scientific Workflow Provenance Access Control Policies
Abstract
Provenance has become an important concept for services computing in general, and for scientific workflows in particular. Provenance often contains confidential data and dependencies whose access needs to be protected. Provenance access control policies control who can access which provenance information. Correct specification of provenance access control policies is critical to ensure system security. However, due to the sheer size of provenance, it is often difficult to comprehend the full effects of an access control policy by manual inspection alone due to complex multi-step dependencies and their interactions. In this paper, we present automated analysis algorithms and complexity results for three provenance analysis problems. We have also developed incremental strategies for these algorithms for evolving provenance and access control policies.
Year
DOI
Venue
2012
10.1109/SCC.2012.60
IEEE SCC
Keywords
Field
DocType
security system,manual inspection,control policies,complex multi-step dependency,scientific workflow provenance access control policies analysis,scientific workflow provenance,full effect,services computing,provenance information,correct specification,provenance access control policy,scientific workflow provenance access,access control policy,automated analysis algorithm,authorisation,confidential data,complexity result,provenance analysis problem,automated analysis algorithms,complex multistep dependencies,policy analysis,polynomials,algorithm design and analysis,access control,inspection,dna,genomics
Data science,Services computing,World Wide Web,Confidentiality,Computer science,Authorization,Policy analysis,Provenance,Access control,Workflow
Conference
ISBN
Citations 
PageRank 
978-1-4673-3049-7
3
0.45
References 
Authors
18
4
Name
Order
Citations
PageRank
Ruiqi Luo1433.15
Ping Yang25210.62
Lu, Shiyong32022126.17
Mikhail I. Gofman41498.98