Grouping provenance information to improve efficiency of access Control

Amril Syalim, Yoshiaki Hori, Kouichi Sakurai

研究成果: 著書/レポートタイプへの貢献会議での発言

10 引用 (Scopus)

抄録

Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.

元の言語英語
ホスト出版物のタイトルAdvances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings
ページ51-59
ページ数9
DOI
出版物ステータス出版済み - 11 9 2009
イベント3rd International Conference on Information Security and Assurance, ISA 2009 - Seoul, 大韓民国
継続期間: 6 25 20096 27 2009

出版物シリーズ

名前Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
5576 LNCS
ISSN(印刷物)0302-9743
ISSN(電子版)1611-3349

その他

その他3rd International Conference on Information Security and Assurance, ISA 2009
大韓民国
Seoul
期間6/25/096/27/09

Fingerprint

Provenance
Access Control
Access control
Grouping
Directed Acyclic Graph
Relational Database
Graph in graph theory
File System
Database Systems
Model

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

これを引用

Syalim, A., Hori, Y., & Sakurai, K. (2009). Grouping provenance information to improve efficiency of access Control. : Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings (pp. 51-59). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 5576 LNCS). https://doi.org/10.1007/978-3-642-02617-1_6

Grouping provenance information to improve efficiency of access Control. / Syalim, Amril; Hori, Yoshiaki; Sakurai, Kouichi.

Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. p. 51-59 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻 5576 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Syalim, A, Hori, Y & Sakurai, K 2009, Grouping provenance information to improve efficiency of access Control. : Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 巻. 5576 LNCS, pp. 51-59, 3rd International Conference on Information Security and Assurance, ISA 2009, Seoul, 大韓民国, 6/25/09. https://doi.org/10.1007/978-3-642-02617-1_6
Syalim A, Hori Y, Sakurai K. Grouping provenance information to improve efficiency of access Control. : Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. p. 51-59. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/978-3-642-02617-1_6
Syalim, Amril ; Hori, Yoshiaki ; Sakurai, Kouichi. / Grouping provenance information to improve efficiency of access Control. Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings. 2009. pp. 51-59 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{5de7c5d9e0204acb910bfb0398b17dcd,
title = "Grouping provenance information to improve efficiency of access Control",
abstract = "Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.",
author = "Amril Syalim and Yoshiaki Hori and Kouichi Sakurai",
year = "2009",
month = "11",
day = "9",
doi = "10.1007/978-3-642-02617-1_6",
language = "English",
isbn = "3642026168",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "51--59",
booktitle = "Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings",

}

TY - GEN

T1 - Grouping provenance information to improve efficiency of access Control

AU - Syalim, Amril

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2009/11/9

Y1 - 2009/11/9

N2 - Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.

AB - Provenance is defined in some literature as a complete documentation of process that led to an object. Provenance has been utilized in some contexts, i.e. database systems, file systems and grid systems. Provenance can be represented by a directed acyclic graph (DAG). In this paper we show an access control method to the provenance information that is represented by a directed acyclic graph and a method to improve efficiency of access control by grouping the provenance information. The idea of our model is that by controlling access to nodes, edges and paths in the provenance graph we may build an expressive access control model to the provenance graph. We improve the efficiency of access control model by grouping some provenance information. In our model, the provenance information is stored in a relational database. Before explaining our idea, we describe provenance store, provenance representation, and how to store provenance graph in a relational database.

UR - http://www.scopus.com/inward/record.url?scp=70350655747&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=70350655747&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-02617-1_6

DO - 10.1007/978-3-642-02617-1_6

M3 - Conference contribution

AN - SCOPUS:70350655747

SN - 3642026168

SN - 9783642026164

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 51

EP - 59

BT - Advances in Information Security and Assurance - Third International Conference and Workshops, ISA 2009, Proceedings

ER -