Access control and view generation for provenance graphs

@article{Mercaderes2015AccessCA,
  title={Access control and view generation for provenance graphs},
  author={Roxana D{\'a}nger Mercaderes and Vasa Curcin and Paolo Missier and Jeremy Bryans},
  journal={Future Generation Comp. Syst.},
  year={2015},
  volume={49},
  pages={8-27}
}
Data provenance refers to the knowledge about data source and operations carried out to obtain some piece of data. A provenance-enabled system maintains record of the interoperation of processes across different modules, stages and authorities to capture the full lineage of the resulting data, and typically allows data-focused audits using semantic technologies, such as ontologies, that capture domain knowledge. However, regulating access to the captured provenance data is a non-trivial problem… CONTINUE READING
BETA

Topics from this paper.

Citations

Publications citing this paper.
SHOWING 1-10 OF 10 CITATIONS

A Templating System to Generate Provenance

VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Provenance Network Analytics

  • Data Mining and Knowledge Discovery
  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

Taming the Costs of Trustworthy Provenance through Policy Reduction

  • ACM Trans. Internet Techn.
  • 2017
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 28 REFERENCES

The Open Provenance Model: An Overview

VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

A provenance-based access control model

  • 2012 Tenth Annual International Conference on Privacy, Security and Trust
  • 2012
VIEW 2 EXCERPTS

Advantages of a non-technical XACML notation in role-based models

  • 2011 Ninth Annual International Conference on Privacy, Security and Trust
  • 2011
VIEW 2 EXCERPTS

An Access Control Framework for the Web of Data

  • 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
  • 2011
VIEW 3 EXCERPTS

Similar Papers

Loading similar papers…