2011
DOI: 10.1007/978-3-642-22351-8_13
|View full text |Cite
|
Sign up to set email alerts
|

ProPub: Towards a Declarative Approach for Publishing Customized, Policy-Aware Provenance

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
31
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(31 citation statements)
references
References 25 publications
0
31
0
Order By: Relevance
“…The problem of abstracting over provenance in such a more general setting has been addressed in later work, notably the ProPub system [3]. Here the main goal is to ensure that sensitive elements of the trace are abstracted out, by means of a redaction process.…”
Section: Abstracting Provenancementioning
confidence: 99%
See 1 more Smart Citation
“…The problem of abstracting over provenance in such a more general setting has been addressed in later work, notably the ProPub system [3]. Here the main goal is to ensure that sensitive elements of the trace are abstracted out, by means of a redaction process.…”
Section: Abstracting Provenancementioning
confidence: 99%
“…Following common practice, we view a set I of such binary relation instances as a digraph G = (V, E), where V = En ∪ Act and E is a set of labelled edges, and where x r ← − y ∈ E iff r(x, y) ∈ I. 3 Finally, we denote the set of all such provenance graphs as PG gu/ea , to indicate that they only contain genBy and used relations amongst En and Act nodes. Fig.…”
Section: Essential Provmentioning
confidence: 99%
“…For instance, if a → b and b → c for some transitive relation, confidential information in b, and subsequent deletion of b, will prevent us from inferring a → c. Such a problem is being referred to as false independency [7] since the transformed graph may lead us to believe that a and c are unrelated (in the sense that one has no influence over the other [1]). Likewise, one needs to ensure that a transformed provenance graph does not enable the inference of nodes or edges that cannot be inferred from the original graph, a problem referred to as false dependency [8]. The problems of false dependency and independency have not been considered together by previous work on provenance privacy protection [5,9], but should critically be addressed in order to maintain the usefulness of provenance in establishing trust of data.…”
Section: Introductionmentioning
confidence: 99%
“…There is also some work directly addressing security for provenance [20,32,15,23,6,24]. Chong [20] gave (to our knowledge) the first candidate formal definitions of data security and provenance security using a trace semantics, based in part on earlier, unpublished work of ours on traces and provenance [16].…”
Section: Introductionmentioning
confidence: 99%
“…Blaustein et al [6] studied the problem of rewriting provenance graphs to hide information while still satisfying some plausibility constraints. Dey et al [24] studied provenance publishing policies, aimed at giving users greater control over what information is shown and hidden. They developed a system called ProPub equipped with well-defined publishing and hiding operators, along with constraints that such policies should satisfy.…”
Section: Introductionmentioning
confidence: 99%