TY - GEN
T1 - Grouping provenance information to improve efficiency of access Control
AU - Syalim, Amril
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2009
Y1 - 2009
N2 - Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.
AB - Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.
KW - Access Control
KW - Data Provenance
UR - http://www.scopus.com/inward/record.url?scp=70350655747&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-02617-1_6
DO - 10.1007/978-3-642-02617-1_6
M3 - Conference contribution
AN - SCOPUS:70350655747
SN - 3642026168
SN - 9783642026164
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 51
EP - 59
BT - Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
T2 - 3rd International Conference on Information Security and Assurance, ISA 2009
Y2 - 25 June 2009 through 27 June 2009
ER -