Abstract
In this paper we propose a fine-grained workflow model, based on context-free graph grammars, in which the dependency relation between the inputs and outputs of a module is explicitly specified as a bipartite graph. Using this model, we develop an access control mechanism that supports provenance-aware security views. Our security model not only protects sensitive data and modules from unauthorized access, but also provides the flexibility to expose correct or partially correct data dependency relationships within the provenance information.
Original language | English |
---|---|
State | Published - 2011 |
Event | 3rd Workshop on the Theory and Practice of Provenance, TaPP 2011 - Heraklion, Crete, Greece Duration: 20 Jun 2011 → 21 Jun 2011 |
Conference
Conference | 3rd Workshop on the Theory and Practice of Provenance, TaPP 2011 |
---|---|
Country/Territory | Greece |
City | Heraklion, Crete |
Period | 20/06/11 → 21/06/11 |