Grouping provenance information to improve efficiency of access Control

Amril Syalim, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.

Original languageEnglish
Title of host publicationAdvances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
Pages51-59
Number of pages9
DOIs
Publication statusPublished - Nov 9 2009
Event3rd International Conference on Information Security and Assurance, ISA 2009 - Seoul, Korea, Republic of
Duration: Jun 25 2009Jun 27 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5576 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other3rd International Conference on Information Security and Assurance, ISA 2009
CountryKorea, Republic of
CitySeoul
Period6/25/096/27/09

Fingerprint

Provenance
Access Control
Access control
Grouping
Directed Acyclic Graph
Relational Database
Graph in graph theory
File System
Database Systems
Model

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Syalim, A., Hori, Y., & Sakurai, K. (2009). Grouping provenance information to improve efficiency of access Control. In Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings (pp. 51-59). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5576 LNCS). https://doi.org/10.1007/978-3-642-02617-1_6

Grouping provenance information to improve efficiency of access Control. / Syalim, Amril; Hori, Yoshiaki; Sakurai, Kouichi.

Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. p. 51-59 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 5576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Syalim, A, Hori, Y & Sakurai, K 2009, Grouping provenance information to improve efficiency of access Control. in Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 5576 LNCS, pp. 51-59, 3rd International Conference on Information Security and Assurance, ISA 2009, Seoul, Korea, Republic of, 6/25/09. https://doi.org/10.1007/978-3-642-02617-1_6
Syalim A, Hori Y, Sakurai K. Grouping provenance information to improve efficiency of access Control. In Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. p. 51-59. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-02617-1_6
Syalim, Amril ; Hori, Yoshiaki ; Sakurai, Kouichi. / Grouping provenance information to improve efficiency of access Control. Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. pp. 51-59 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{5de7c5d9e0204acb910bfb0398b17dcd,
title = "Grouping provenance information to improve efficiency of access Control",
abstract = "Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.",
author = "Amril Syalim and Yoshiaki Hori and Kouichi Sakurai",
year = "2009",
month = "11",
day = "9",
doi = "10.1007/978-3-642-02617-1_6",
language = "English",
isbn = "3642026168",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "51--59",
booktitle = "Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings",

}

TY - GEN

T1 - Grouping provenance information to improve efficiency of access Control

AU - Syalim, Amril

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2009/11/9

Y1 - 2009/11/9

N2 - Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.

AB - Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.

UR - http://www.scopus.com/inward/record.url?scp=70350655747&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70350655747&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-02617-1_6

DO - 10.1007/978-3-642-02617-1_6

M3 - Conference contribution

SN - 3642026168

SN - 9783642026164

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 51

EP - 59

BT - Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings

ER -