Security-control methods for statistical databases: a comparative study
ACM Computing Surveys (CSUR)
ACM SIGMOD Record - Directions for future database research & development
Privacy-preserving data mining
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Chimera: AVirtual Data System for Representing, Querying, and Automating Data Derivation
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
A protocol for recording provenance in service-oriented grids
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
A model of process documentation to determine provenance in mash-ups
ACM Transactions on Internet Technology (TOIT)
A Model for Sharing of Confidential Provenance Information in a Query Based System
Provenance and Annotation of Data and Processes
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Towards semantics for provenance security
TAPP'09 First workshop on on Theory and practice of provenance
Grouping Provenance Information to Improve Efficiency of Access Control
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
Fine-grained sticky provenance architecture for office documents
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
Trusted computing and provenance: better together
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Towards a secure and efficient system for end-to-end provenance
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Data provenance architecture to support information assurance in a multi-level secure environment
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
Representing distributed systems using the Open Provenance Model
Future Generation Computer Systems
Transforming provenance using redaction
Proceedings of the 16th ACM symposium on Access control models and technologies
Surrogate parenthood: protected and informative graphs
Proceedings of the VLDB Endowment
Towards low overhead provenance tracking in near real-time stream filtering
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Securing data provenance in the cloud
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
Supporting secure provenance update by keeping "provenance" of the provenance
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Hi-index | 0.00 |
Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments). One of the salient issues related to provenance use within any given system is its security. Provenance presents some unique security requirements of its own, which are additionally dependent on the architectural and environmental context that a provenance system operates in. We discuss the security considerations pertaining to a Service Oriented Architecture based provenance system. Concurrently, we outline possible approaches to address them.