Sciweavers

Share
TSC
2010

Secure Abstraction Views for Scientific Workflow Provenance Querying

9 years 5 months ago
Secure Abstraction Views for Scientific Workflow Provenance Querying
bstraction Views for Scientific Workflow Provenance Querying Artem Chebotko, Member, IEEE, Shiyong Lu, Senior Member, IEEE, Seunghan Chang, Farshad Fotouhi, Member, IEEE, and Ping Yang, Member, IEEE Provenance has become increasingly important in scientific workflows and services computing to capture the derivation history of a data product, including the original data sources, intermediate data products, and the steps that were applied to produce the data product. In many cases, both scientific results and the used protocol are sensitive and effective access control mechanisms are essential to protect their confidentiality. In this paper, we propose: 1) a formal scientific workflow provenance model as the basis for querying and access control for workflow provenance; 2) a security model for fine-grained access control for multilevel provenance and an algorithm for the derivation of a full security specification based on inheritance, overriding, and conflict resolution; 3) a formalizat...
Artem Chebotko, Shiyong Lu, Seunghan Chang, Farsha
Added 22 May 2011
Updated 22 May 2011
Type Journal
Year 2010
Where TSC
Authors Artem Chebotko, Shiyong Lu, Seunghan Chang, Farshad Fotouhi, Ping Yang
Comments (0)
books