Abstract | ||
---|---|---|
Provenance has become an important concept for services computing in general, and for scientific workflows in particular. Provenance often contains confidential data and dependencies whose access needs to be protected. Provenance access control policies control who can access which provenance information. Correct specification of provenance access control policies is critical to ensure system security. However, due to the sheer size of provenance, it is often difficult to comprehend the full effects of an access control policy by manual inspection alone due to complex multi-step dependencies and their interactions. In this paper, we present automated analysis algorithms and complexity results for three provenance analysis problems. We have also developed incremental strategies for these algorithms for evolving provenance and access control policies. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1109/SCC.2012.60 | IEEE SCC |
Keywords | Field | DocType |
security system,manual inspection,control policies,complex multi-step dependency,scientific workflow provenance access control policies analysis,scientific workflow provenance,full effect,services computing,provenance information,correct specification,provenance access control policy,scientific workflow provenance access,access control policy,automated analysis algorithm,authorisation,confidential data,complexity result,provenance analysis problem,automated analysis algorithms,complex multistep dependencies,policy analysis,polynomials,algorithm design and analysis,access control,inspection,dna,genomics | Data science,Services computing,World Wide Web,Confidentiality,Computer science,Authorization,Policy analysis,Provenance,Access control,Workflow | Conference |
ISBN | Citations | PageRank |
978-1-4673-3049-7 | 3 | 0.45 |
References | Authors | |
18 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ruiqi Luo | 1 | 43 | 3.15 |
Ping Yang | 2 | 52 | 10.62 |
Lu, Shiyong | 3 | 2022 | 126.17 |
Mikhail I. Gofman | 4 | 149 | 8.98 |