A provenance-based access control model

J Park, D Nguyen, R Sandhu - 2012 tenth annual international …, 2012 - ieeexplore.ieee.org
Existence of data provenance information in a system raises at least two security-related
issues. One is how provenance data can be used to enhance security in the system and the …

An analytical survey of provenance sanitization

J Cheney, R Perera - Provenance and Annotation of Data and Processes …, 2015 - Springer
Security is likely to be a critical factor in the future adoption of provenance technology,
because of the risk of inadvertent disclosure of sensitive information. In this survey paper we …

A core calculus for provenance

UA Acar, A Ahmed, J Cheney… - Journal of Computer …, 2013 - content.iospress.com
Provenance is an increasing concern due to the ongoing revolution in sharing and
processing scientific data on the Web and in other computer systems. It is proposed that …

Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems.

D Nguyen, J Park, RS Sandhu - TaPP, 2012 - usenix.org
A unique characteristics of provenance data is that it forms a directed acyclic graph (DAG) in
accordance with the underlying causality dependencies between entities (acting users …

Plus: A provenance manager for integrated information

A Chapman, BT Blaustein, L Seligman… - … on Information Reuse …, 2011 - ieeexplore.ieee.org
It can be difficult to fully understand the result of integrating information from diverse sources.
When all the information comes from a single organization, there is a collective knowledge …

Abstracting PROV provenance graphs: A validity-preserving approach

P Missier, J Bryans, C Gamble, V Curcin - Future Generation Computer …, 2020 - Elsevier
Data provenance is a structured form of metadata designed to record the activities and
datasets involved in data production, as well as their dependency relationships. The PROV …

[HTML][HTML] Privacy-preserving and efficient verification of the outcome in genome-wide association studies

A Halimi, L Dervishi, E Ayday, A Pyrgelis… - … on Privacy Enhancing …, 2022 - ncbi.nlm.nih.gov
Providing provenance in scientific workflows is essential for reproducibility and auditability
purposes. In this work, we propose a framework that verifies the correctness of the …

Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information

MD Allen, A Chapman, L Seligman… - 7th International …, 2011 - ieeexplore.ieee.org
Data collaborations allow users to draw upon diverse resources to solve complex problems.
While collaborations enable a greater ability to manipulate data and services, they also …

Data provenance, curation and quality in metrology

J Cheney, A Chapman, J Davidson… - … and computational tools …, 2021 - World Scientific
Data metrology–the assessment of the quality of data–particularly in scientific and industrial
settings, has emerged as an important requirement for the UK National Physical Laboratory …

Secure provenance using an authenticated data structure approach

F Jamil, A Khan, A Anjum, M Ahmed, F Jabeen… - computers & …, 2018 - Elsevier
Data provenance is information used in reasoning about the present state of a data object,
providing details such as the inputs used, transformations it underwent, entities responsible …