MetadataShow full item record
CitationBraun, Uri, Avraham Shinnar, and Margo Seltzer. 2008. Securing provenance. In Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (HotSec '08), July 29, 2008, San Jose, CA. Berkeley, CA: USENIX Association.
AbstractProvenance describes how an object came to be in its present state. Intelligence dossiers, medical records and corporate ﬁnancial reports capture provenance information. Many of these applications call for security, but existing security models are not up to the task. Provenance is a causality graph with annotations. The causality graph connects the various participating objects describing the process that produced an object’s present state. Each node represents an object and each edge represents a relationship between two objects. This graph is an immutable directed acyclic graph (DAG). Existing security models do not apply to DAGs nor do they easily extend to DAGs. Any model to control access to the structure of the graph must integrate with existing security models for the objects. We need to develop an access control model tailored to provenance and study how it interacts with existing access control models. This paper frames the problem and identiﬁes issues requiring further research.
Citable link to this pagehttp://nrs.harvard.edu/urn-3:HUL.InstRepos:8811835
- FAS Scholarly Articles