메뉴 건너뛰기




Volumn , Issue , 2008, Pages 349-356

Scientific workflow provenance querying with security views

Author keywords

[No Author keywords available]

Indexed keywords

ABSTRACTING; ACCESS CONTROL; ADMINISTRATIVE DATA PROCESSING; INFORMATION SCIENCE; MANAGEMENT; MANAGEMENT INFORMATION SYSTEMS; MECHANISMS; METADATA; PUBLIC POLICY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 51849083449     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/WAIM.2008.41     Document Type: Conference Paper
Times cited : (37)

References (41)
  • 1
    • 51849096843 scopus 로고    scopus 로고
    • Workflow security consideration - white paper. In Workflow Management Coalition, February 1998. WFMC-TC-1019.
    • Workflow security consideration - white paper. In Workflow Management Coalition, February 1998. WFMC-TC-1019.
  • 5
    • 0033887763 scopus 로고    scopus 로고
    • A semantic-based execution model for multilevel secure workflows
    • V. Atluri, W. Huang, and E. Bertino. A semantic-based execution model for multilevel secure workflows. Journal of Computer Security, 8(1), 2000.
    • (2000) Journal of Computer Security , vol.8 , Issue.1
    • Atluri, V.1    Huang, W.2    Bertino, E.3
  • 7
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri. The specification and enforcement of authorization constraints in workflow management systems. ACM Trans. Inf. Syst. Secur., 2(1):65-104, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 9
    • 24344453002 scopus 로고    scopus 로고
    • Lineage retrieval for scientific data processing: A survey
    • R. Bose and J. Frew. Lineage retrieval for scientific data processing: a survey. ACM Comput. Surv., 37(1):1-28, 2005.
    • (2005) ACM Comput. Surv , vol.37 , Issue.1 , pp. 1-28
    • Bose, R.1    Frew, J.2
  • 11
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • R. A. Botha and J. H. P. Eloff. Separation of duties for access control enforcement in workflow environments. End-to-end Security, 40(3), 2001.
    • (2001) End-to-end Security , vol.40 , Issue.3
    • Botha, R.A.1    Eloff, J.H.P.2
  • 12
    • 33750035572 scopus 로고    scopus 로고
    • A security model for provenance
    • Technical Report TR-04-06, Harvard University
    • U. Braun and A. Shinna. A security model for provenance. Technical Report TR-04-06, Harvard University, 2006.
    • (2006)
    • Braun, U.1    Shinna, A.2
  • 14
    • 33747510016 scopus 로고    scopus 로고
    • Refactoring service-based systems: How to avoid trusting a workflow service
    • H. Chivers and J. McDermid. Refactoring service-based systems: how to avoid trusting a workflow service. Concurr. Comput.: Pract. Exper., 18(10):1255-1275, 2006.
    • (2006) Concurr. Comput.: Pract. Exper , vol.18 , Issue.10 , pp. 1255-1275
    • Chivers, H.1    McDermid, J.2
  • 22
    • 0033329699 scopus 로고    scopus 로고
    • Modelling, specifying and implementing workflow security in cyberspace
    • E. Gudes, M. Olivier, and R. Riet. Modelling, specifying and implementing workflow security in cyberspace. Journal of Computer Security, 7(4):287-315, 1999.
    • (1999) Journal of Computer Security , vol.7 , Issue.4 , pp. 287-315
    • Gudes, E.1    Olivier, M.2    Riet, R.3
  • 32
    • 34547489807 scopus 로고    scopus 로고
    • The requirements of recording and using provenance in e-science experiments
    • S. Miles, P. Groth, M. Branco, and L. Moreau. The requirements of recording and using provenance in e-science experiments. Journal of Grid Computing, 2006.
    • (2006) Journal of Grid Computing
    • Miles, S.1    Groth, P.2    Branco, M.3    Moreau, L.4
  • 33
    • 85142139500 scopus 로고    scopus 로고
    • T. M. Oinn, M. Addis, J. Ferris, D. Marvin, M. Senger, R. M. Greenwood, T. Carver, K. Glover, M. R. Pocock, A. Wipat, and P. Li. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(17):3045-3054, 2004.
    • T. M. Oinn, M. Addis, J. Ferris, D. Marvin, M. Senger, R. M. Greenwood, T. Carver, K. Glover, M. R. Pocock, A. Wipat, and P. Li. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(17):3045-3054, 2004.
  • 36
    • 31444456909 scopus 로고    scopus 로고
    • A survey of data provenance in e-science
    • Y. Simmhan, B. Plale, and D. Gannon. A survey of data provenance in e-science. SIGMOD Rec., 34(3):31-36, 2005.
    • (2005) SIGMOD Rec , vol.34 , Issue.3 , pp. 31-36
    • Simmhan, Y.1    Plale, B.2    Gannon, D.3
  • 38
    • 0348209180 scopus 로고    scopus 로고
    • J. Wainer, P. Barthelmess, and A. Kumar. W_RBAC - a workflow security model incorporating controlled overriding of constraints. Int. J. Cooperative Inf. Syst., 12(4):455-485, 2003.
    • J. Wainer, P. Barthelmess, and A. Kumar. W_RBAC - a workflow security model incorporating controlled overriding of constraints. Int. J. Cooperative Inf. Syst., 12(4):455-485, 2003.
  • 40
    • 0036161253 scopus 로고    scopus 로고
    • Authorization and access control of application data in workflow systems
    • S. Wu, A. Sheth, J. Miller, and Z. Luo. Authorization and access control of application data in workflow systems. Journal of Intelligent Information Systems, 18(1):71-94, 2002.
    • (2002) Journal of Intelligent Information Systems , vol.18 , Issue.1 , pp. 71-94
    • Wu, S.1    Sheth, A.2    Miller, J.3    Luo, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.