Access control and view generation for provenance graphs

@article{Mercaderes2015AccessCA,
  title={Access control and view generation for provenance graphs},
  author={Roxana D{\'a}nger Mercaderes and V. Curcin and P. Missier and J. Bryans},
  journal={Future Gener. Comput. Syst.},
  year={2015},
  volume={49},
  pages={8-27}
}
  • Roxana Dánger Mercaderes, V. Curcin, +1 author J. Bryans
  • Published 2015
  • Computer Science
  • Future Gener. Comput. Syst.
  • Data provenance refers to the knowledge about data sources and operations carried out to obtain some piece of data. A provenance-enabled system maintains record of the interoperation of processes across different modules, stages and authorities to capture the full lineage of the resulting data, and typically allows data-focused audits using semantic technologies, such as ontologies, that capture domain knowledge. However, regulating access to captured provenance data is a non-trivial problem… CONTINUE READING
    14 Citations

    Figures, Tables, and Topics from this paper.

    Corroboration via Provenance Patterns
    • 1
    • PDF
    A template-based graph transformation system for the PROV data model
    • 4
    • PDF
    Taming the Costs of Trustworthy Provenance through Policy Reduction
    • 6
    • PDF
    A Templating System to Generate Provenance
    • 22
    • Highly Influenced
    • PDF
    Templates as a method for implementing data provenance in decision support systems
    • 19
    • PDF
    Provenance Network Analytics
    • 9
    • PDF

    References

    SHOWING 1-10 OF 39 REFERENCES
    Enabling Privacy in Provenance-Aware Workflow Systems
    • 32
    • PDF
    Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems
    • 34
    • PDF
    A provenance-based access control model
    • 83
    • PDF
    Provenance Explorer - Customized Provenance Views Using Semantic Inferencing
    • 29
    • PDF
    Engineering access control policies for provenance-aware systems
    • 14
    • PDF
    A language for provenance access control
    • 62
    • Highly Influential
    • PDF
    Securing Provenance
    • 148
    • PDF
    Querying and Managing Provenance through User Views in Scientific Workflows
    • 151
    • PDF