Dependency path patterns as the foundation of access control in provenance-aware systems

  • Authors:
  • Dang Nguyen;Jaehong Park;Ravi Sandhu

  • Affiliations:
  • Institute for Cyber Security, University of Texas at San Antonio;Institute for Cyber Security, University of Texas at San Antonio;Institute for Cyber Security, University of Texas at San Antonio

  • Venue:
  • TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

A unique characteristics of provenance data is that it forms a directed acyclic graph (DAG) in accordance with the underlying causality dependencies between entities (acting users, action processes and data objects) involved in transactions. Data provenance raises at least two distinct security-related issues. One is how to control access to provenance data which we call Provenance Access control (PAC). The other is Provenance-based Access Control (PBAC) which focuses on how to utilize provenance data to control access to data objects. Both PAC and PBAC are built on a common foundation that requires security architects to define application-specific dependency path patterns of provenance data. Assigning application-specific semantics to these path patterns provides the foundation for effective security policy specification and administration. This paper elaborates on this common foundation of PAC and PBAC and identifies some of the differences in how this common foundation is applied in these two contexts.