An algebra for composing access control policies
ACM Transactions on Information and System Security (TISSEC)
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
LICS '03 Proceedings of the 18th Annual IEEE Symposium on Logic in Computer Science
Role-Based Access Control
First experiences using XACML for access control in distributed systems
Proceedings of the 2003 ACM workshop on XML security
Jena: implementing the semantic web recommendations
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
SPARQLeR: Extended Sparql for Semantic Association Discovery
ESWC '07 Proceedings of the 4th European conference on The Semantic Web: Research and Applications
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Scalable access controls for lineage
TAPP'09 First workshop on on Theory and practice of provenance
Extending SPARQL with regular expression patterns (for querying RDF)
Web Semantics: Science, Services and Agents on the World Wide Web
Grouping Provenance Information to Improve Efficiency of Access Control
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
The Open Provenance Model core specification (v1.1)
Future Generation Computer Systems
A cloud-based RDF policy engine for assured information sharing
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Tag-based information flow analysis for document classification in provenance
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Dependency path patterns as the foundation of access control in provenance-aware systems
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Cloud-Centric assured information sharing
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Design and implementation of a cloud-based assured information sharing system
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Access control for OPM provenance graphs
IPAW'12 Proceedings of the 4th international conference on Provenance and Annotation of Data and Processes
Towards provenance and risk-awareness in social computing
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
Engineering access control policies for provenance-aware systems
Proceedings of the third ACM conference on Data and application security and privacy
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
Hi-index | 0.00 |
Provenance is a directed acyclic graph that explains how a resource came to be in its current form. Traditional access control does not support provenance graphs. We cannot achieve all the benefits of access control if the relationships between the data and their sources are not protected. In this paper, we propose a language that complements and extends existing access control languages to support provenance. This language also provides access to data based on integrity criteria. We have also built a prototype to show that this language can be implemented effectively using Semantic Web technologies.