2016
DOI: 10.1109/tdsc.2015.2410793
|View full text |Cite
|
Sign up to set email alerts
|

A Provenance-Aware Access Control Framework with Typed Provenance

Abstract: Provenance is a directed graph that captures historical information about data items in Provenance-Aware Systems (PAS). A variety of access control models and policy languages specific to PAS have been recently discussed in literature. However, it is still not clear how to efficiently specify provenance-aware access control policies and how to effectively enforce these policies with respect to complex provenance graph that can only be captured at run-time. To this end, we design and implement a provenance-awar… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Sun et al [23] propose an provenance-aware policy analysis method based on the UML model, which formally models the provenance semantics as an abstract provenance type, and can specify and refine access control policies at a higher level. Sun et al [24] further implement an provenance-aware access control framework that supports an extended XACML and allows users to define access control policies using a typed provenance model.…”
Section: B Provenance-based Access Controlmentioning
confidence: 99%
“…Sun et al [23] propose an provenance-aware policy analysis method based on the UML model, which formally models the provenance semantics as an abstract provenance type, and can specify and refine access control policies at a higher level. Sun et al [24] further implement an provenance-aware access control framework that supports an extended XACML and allows users to define access control policies using a typed provenance model.…”
Section: B Provenance-based Access Controlmentioning
confidence: 99%
“…In a centralized setting where provenance is collected and stored in an authoritative center, the main concerns are security and traceability because the trustworthiness of the shared provenance graphs is tacitly ensured by the authoritative center. Most existing researches focused on ensuring provenance security by techniques of encryption [19,20], sanitization [21], and access control [22,23]. Some researches further considered the issue of achieving both security and traceability [24].…”
Section: Related Workmentioning
confidence: 99%
“…Parket et al 14 proposed a provenance‐based access control model that used provenance data to implement access control. Sun et al 15,16 designed and implemented a provenance‐aware access control framework that included a typed provenance model (TPM) and a set of TPM interpreters. The TPM treated provenance types as special attributes for the adoption of provenance‐aware access control in existing attribute‐based access control (ABAC) frameworks.…”
Section: Related Workmentioning
confidence: 99%