Title :
Analysis of Scientific Workflow Provenance Access Control Policies
Author :
Luo, Ruiqi ; Yang, Ping ; Lu, Shiyong ; Gofman, Mikhail
Author_Institution :
Comput. Sci., State Univ. of New York at Binghamton, Binghamton, NY, USA
Abstract :
Provenance has become an important concept for services computing in general, and for scientific workflows in particular. Provenance often contains confidential data and dependencies whose access needs to be protected. Provenance access control policies control who can access which provenance information. Correct specification of provenance access control policies is critical to ensure system security. However, due to the sheer size of provenance, it is often difficult to comprehend the full effects of an access control policy by manual inspection alone due to complex multi-step dependencies and their interactions. In this paper, we present automated analysis algorithms and complexity results for three provenance analysis problems. We have also developed incremental strategies for these algorithms for evolving provenance and access control policies.
Keywords :
authorisation; automated analysis algorithms; complex multistep dependencies; confidential data; manual inspection; scientific workflow provenance access control policies analysis; security system; services computing; Access control; Algorithm design and analysis; Complexity theory; DNA; Genomics; Inspection; Polynomials; policy analysis; scientific workflow provenance;
Conference_Titel :
Services Computing (SCC), 2012 IEEE Ninth International Conference on
Conference_Location :
Honolulu, HI
Print_ISBN :
978-1-4673-3049-7
DOI :
10.1109/SCC.2012.60