Sciweavers

872 search results - page 2 / 175
» An Access Control Language for a General Provenance Model
Sort
View
EDBT
2010
ACM
164views Database» more  EDBT 2010»
13 years 8 months ago
Techniques for efficiently querying scientific workflow provenance graphs
A key advantage of scientific workflow systems over traditional scripting approaches is their ability to automatically record data and process dependencies introduced during workf...
Manish Kumar Anand, Shawn Bowers, Bertram Ludä...
CODASPY
2011
12 years 9 months ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
BPM
2010
Springer
155views Business» more  BPM 2010»
13 years 6 months ago
PAPEL: A Language and Model for Provenance-Aware Policy Definition and Execution
The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. Policies provide means to control how and by whom data is processe...
Christoph Ringelstein, Steffen Staab
IJSEKE
2011
165views more  IJSEKE 2011»
12 years 8 months ago
Model Checking for Verification of Mandatory Access Control Models and Properties
rather wide gap in abstraction between policies and mechanisms. In this paper, we propose a general approach for property verification for MAC models. The approach defines a stan...
Vincent C. Hu, D. Richard Kuhn, Tao Xie, JeeHyun H...
USS
2008
13 years 7 months ago
Securing Provenance
Provenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate financial reports capture provenance information. Many of ...
Uri Braun, Avraham Shinnar, Margo I. Seltzer