A provenance-based access control model
Existence of data provenance information in a system raises at least two security-related
issues. One is how provenance data can be used to enhance security in the system and the …
issues. One is how provenance data can be used to enhance security in the system and the …
An analytical survey of provenance sanitization
Security is likely to be a critical factor in the future adoption of provenance technology,
because of the risk of inadvertent disclosure of sensitive information. In this survey paper we …
because of the risk of inadvertent disclosure of sensitive information. In this survey paper we …
A core calculus for provenance
Provenance is an increasing concern due to the ongoing revolution in sharing and
processing scientific data on the Web and in other computer systems. It is proposed that …
processing scientific data on the Web and in other computer systems. It is proposed that …
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems.
A unique characteristics of provenance data is that it forms a directed acyclic graph (DAG) in
accordance with the underlying causality dependencies between entities (acting users …
accordance with the underlying causality dependencies between entities (acting users …
Plus: A provenance manager for integrated information
A Chapman, BT Blaustein, L Seligman… - … on Information Reuse …, 2011 - ieeexplore.ieee.org
It can be difficult to fully understand the result of integrating information from diverse sources.
When all the information comes from a single organization, there is a collective knowledge …
When all the information comes from a single organization, there is a collective knowledge …
Abstracting PROV provenance graphs: A validity-preserving approach
Data provenance is a structured form of metadata designed to record the activities and
datasets involved in data production, as well as their dependency relationships. The PROV …
datasets involved in data production, as well as their dependency relationships. The PROV …
[HTML][HTML] Privacy-preserving and efficient verification of the outcome in genome-wide association studies
Providing provenance in scientific workflows is essential for reproducibility and auditability
purposes. In this work, we propose a framework that verifies the correctness of the …
purposes. In this work, we propose a framework that verifies the correctness of the …
Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information
MD Allen, A Chapman, L Seligman… - 7th International …, 2011 - ieeexplore.ieee.org
Data collaborations allow users to draw upon diverse resources to solve complex problems.
While collaborations enable a greater ability to manipulate data and services, they also …
While collaborations enable a greater ability to manipulate data and services, they also …
Data provenance, curation and quality in metrology
Data metrology–the assessment of the quality of data–particularly in scientific and industrial
settings, has emerged as an important requirement for the UK National Physical Laboratory …
settings, has emerged as an important requirement for the UK National Physical Laboratory …
Secure provenance using an authenticated data structure approach
Data provenance is information used in reasoning about the present state of a data object,
providing details such as the inputs used, transformations it underwent, entities responsible …
providing details such as the inputs used, transformations it underwent, entities responsible …