Graph-theoretic method for merging security system specifications
Information Sciences: an International Journal
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Special Issue: The First Provenance Challenge
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Towards semantics for provenance security
TAPP'09 First workshop on on Theory and practice of provenance
Grouping Provenance Information to Improve Efficiency of Access Control
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
A characterization of the problem of secure provenancemanagement
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Provenance as first class cloud data
ACM SIGOPS Operating Systems Review
Privacy issues in scientific workflow provenance
Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science
FAST'10 Proceedings of the 8th USENIX conference on File and storage technologies
Trusted computing and provenance: better together
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Layering in provenance systems
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Document provenance in the cloud: constraints and challenges
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
A provenance-based approach to resource discovery in distributed molecular dynamics workflows
RED'09 Proceedings of the 2nd international conference on Resource discovery
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
Intrusion recovery using selective re-execution
OSDI'10 Proceedings of the 9th USENIX conference on Operating systems design and implementation
Proceedings of the 14th International Conference on Database Theory
A language for provenance access control
Proceedings of the first ACM conference on Data and application security and privacy
Non-interactive editable signatures for assured data provenance
Proceedings of the first ACM conference on Data and application security and privacy
W3P: Building an OPM based provenance model for the Web
Future Generation Computer Systems
Provenance security guarantee from origin up to now in the e-Science environment
Journal of Systems Architecture: the EUROMICRO Journal
Provenance views for module privacy
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Transforming provenance using redaction
Proceedings of the 16th ACM symposium on Access control models and technologies
Surrogate parenthood: protected and informative graphs
Proceedings of the VLDB Endowment
Securing data provenance in the cloud
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Probing attacks on multi-agent systems using electronic institutions
DALT'11 Proceedings of the 9th international conference on Declarative Agent Languages and Technologies
A cloud-based RDF policy engine for assured information sharing
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Provenance as a security control
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Dependency path patterns as the foundation of access control in provenance-aware systems
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Tracking and constraining authorization provenance
IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
Tracing where and who provenance in Linked Data: A calculus
Theoretical Computer Science
Design and implementation of a cloud-based assured information sharing system
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
Engineering access control policies for provenance-aware systems
Proceedings of the third ACM conference on Data and application security and privacy
Towards Next Generation Provenance Systems for e-Science
International Journal of Information System Modeling and Design
Supporting secure provenance update by keeping "provenance" of the provenance
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 3rd international workshop on Trustworthy embedded devices
BNCOD'13 Proceedings of the 29th British National conference on Big Data
Interaction provenance model for unified authentication factors in service oriented computing
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of these applications call for security, but existing security models are not up to the task. Provenance is a causality graph with annotations. The causality graph connects the various participating objects describing the process that produced an object's present state. Each node represents an object and each edge represents a relationship between two objects. This graph is an immutable directed acyclic graph (DAG). Existing security models do not apply to DAGs nor do they easily extend to DAGs. Any model to control access to the structure of the graph must integrate with existing security models for the objects. We need to develop an access control model tailored to provenance and study how it interacts with existing access control models. This paper frames the problem and identifies issues requiring further research.