Towards usage control models: beyond traditional access control
SACMAT '02 Proceedings of the seventh ACM symposium on Access control models and technologies
Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
Chimera: AVirtual Data System for Representing, Querying, and Automating Data Derivation
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
Originator Control in Usage Control
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Privacy and Contextual Integrity: Framework and Applications
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Provenance management in curated databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
The provenance of electronic data
Communications of the ACM - The psychology of security: why do good users make bad decisions?
Databases with uncertainty and lineage
The VLDB Journal — The International Journal on Very Large Data Bases
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Efficient lineage tracking for scientific workflows
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
An obligation model bridging access control policies and privacy policies
Proceedings of the 13th ACM symposium on Access control models and technologies
A data model and architecture for long-term preservation
Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
A formal framework for reflective database access control policies
Proceedings of the 15th ACM conference on Computer and communications security
Towards Provenance-Enabling ParaView
Provenance and Annotation of Data and Processes
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
D-algebra for composing access control policy decisions
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
A characterization of the problem of secure provenancemanagement
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
An algebra for enterprise privacy policies closed under composition and conjunction
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Conditional privacy-aware role based access control
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A language for provenance access control
Proceedings of the first ACM conference on Data and application security and privacy
xfACL: an extensible functional language for access control
Proceedings of the 16th ACM symposium on Access control models and technologies
Transforming provenance using redaction
Proceedings of the 16th ACM symposium on Access control models and technologies
Dependency path patterns as the foundation of access control in provenance-aware systems
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Tracking and constraining authorization provenance
IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
A comprehensive model for provenance
IPAW'12 Proceedings of the 4th international conference on Provenance and Annotation of Data and Processes
Towards provenance and risk-awareness in social computing
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
A comprehensive model for provenance
ER'12 Proceedings of the 2012 international conference on Advances in Conceptual Modeling
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
Engineering access control policies for provenance-aware systems
Proceedings of the third ACM conference on Data and application security and privacy
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
Hi-index | 0.00 |
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in the context of data security research. One important challenge in provenance access control is the lack of an access control language that supports its specific requirements, e.g., the support of both fine-grained policies and personal preferences, and decision aggregation from different applicable policies. In this paper, we propose an access control language tailored to these requirements.