메뉴 건너뛰기




Volumn 3, Issue 4, 2010, Pages 338-352

Secure abstraction views for scientific workflow provenance querying

Author keywords

abstraction; access control; provenance; Scientific workflows; secure querying; security

Indexed keywords

ABSTRACTION; PROVENANCE; SCIENTIFIC WORKFLOWS; SECURE QUERYING; SECURITY;

EID: 78649990066     PISSN: 19391374     EISSN: None     Source Type: Journal    
DOI: 10.1109/TSC.2010.45     Document Type: Article
Times cited : (10)

References (61)
  • 2
    • 42449141856 scopus 로고    scopus 로고
    • Karma2: Provenance management for data-driven workflows
    • Y. Simmhan, B. Plale, and D. Gannon, "Karma2: Provenance Management for Data-Driven Workflows", Int'l J. Web Services Research, vol. 5, no. 2, pp. 1-22, 2008.
    • (2008) Int'l J. Web Services Research , vol.5 , Issue.2 , pp. 1-22
    • Simmhan, Y.1    Plale, B.2    Gannon, D.3
  • 4
    • 31444456909 scopus 로고    scopus 로고
    • A survey of data provenance in E-science
    • Y. Simmhan, B. Plale, and D. Gannon, "A Survey of Data Provenance in E-Science", SIGMOD Record, vol. 34, no. 3, pp. 31-36, 2005.
    • (2005) SIGMOD Record , vol.34 , Issue.3 , pp. 31-36
    • Simmhan, Y.1    Plale, B.2    Gannon, D.3
  • 5
    • 24344453002 scopus 로고    scopus 로고
    • Lineage retrieval for scientific data processing: A survey
    • R. Bose and J. Frew, "Lineage Retrieval for Scientific Data Processing: A Survey", ACM Computer Surveys, vol. 37, no. 1, pp. 1-28, 2005.
    • (2005) ACM Computer Surveys , vol.37 , Issue.1 , pp. 1-28
    • Bose, R.1    Frew, J.2
  • 6
    • 34250328839 scopus 로고    scopus 로고
    • The requirements of using provenance in E-science experiments
    • S. Miles, P. T. Groth, M. Branco, and L. Moreau, "The Requirements of Using Provenance in E-Science Experiments", J. Grid Computing, vol. 5, no. 1, pp. 1-25, 2007.
    • (2007) J. Grid Computing , vol.5 , Issue.1 , pp. 1-25
    • Miles, S.1    Groth, P.T.2    Branco, M.3    Moreau, L.4
  • 8
    • 0034810791 scopus 로고    scopus 로고
    • Separation of duties for access control enforcement in workflow environments
    • R. A. Botha and J. H. P. Eloff, "Separation of Duties for Access Control Enforcement in Workflow Environments", End-to-End Security, vol. 40, no. 3, pp. 666-682, 2001.
    • (2001) End-to-End Security , vol.40 , Issue.3 , pp. 666-682
    • Botha, R.A.1    Eloff, J.H.P.2
  • 9
    • 20144370775 scopus 로고    scopus 로고
    • White Paper wFMC-TC-1019, Workflow Management Coalition, Feb
    • "Workflow Security Considerations", White Paper wFMC-TC-1019, Workflow Management Coalition, Feb. 1998.
    • (1998) Workflow Security Considerations
  • 10
    • 58149267780 scopus 로고    scopus 로고
    • RECOMBFLOW: A scientific workflow environment for intragenomic gene conversion analysis in bacterial genomes, including the pathogen streptococcus pyogenes
    • J. Alhiyafi, C. Sabesan, S. Lu, and J. L. Ram, "RECOMBFLOW: A Scientific Workflow Environment for Intragenomic Gene Conversion Analysis in Bacterial Genomes, Including the Pathogen Streptococcus Pyogenes", Int'l J. Bioinformatics Research and Applications, vol. 5, no. 1, pp. 1-19, 2009.
    • (2009) Int'l J. Bioinformatics Research and Applications , vol.5 , Issue.1 , pp. 1-19
    • Alhiyafi, J.1    Sabesan, C.2    Lu, S.3    Ram, J.L.4
  • 14
    • 0036161253 scopus 로고    scopus 로고
    • Authorization and access control of application data in workflow systems
    • S. Wu, A. Sheth, J. Miller, and Z. Luo, "Authorization and Access Control of Application Data in Workflow Systems", J. Intelligent Information Systems, vol. 18, no. 1, pp. 71-94, 2002.
    • (2002) J. Intelligent Information Systems , vol.18 , Issue.1 , pp. 71-94
    • Wu, S.1    Sheth, A.2    Miller, J.3    Luo, Z.4
  • 17
    • 0033887763 scopus 로고    scopus 로고
    • A semantic-based execution model for multilevel secure workflows
    • V. Atluri, W. Huang, and E. Bertino, "A Semantic-Based Execution Model for Multilevel Secure Workflows", J. Computer Security, vol. 8, no. 1, pp. 3-41, 2000.
    • (2000) J. Computer Security , vol.8 , Issue.1 , pp. 3-41
    • Atluri, V.1    Huang, W.2    Bertino, E.3
  • 18
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems", ACM Trans. Information and System Security, vol. 2, no. 1, pp. 65-104, 1999.
    • (1999) ACM Trans. Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 19
    • 0348209180 scopus 로고    scopus 로고
    • W-RBAC-A workflow security model incorporating controlled overriding of constraints
    • J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC-A Workflow Security Model Incorporating Controlled Overriding of Constraints", Int'l J. Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, 2003.
    • (2003) Int'l J. Cooperative Information Systems , vol.12 , Issue.4 , pp. 455-485
    • Wainer, J.1    Barthelmess, P.2    Kumar, A.3
  • 21
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • Feb
    • R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models", Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
    • (1996) Computer , vol.29 , Issue.2 , pp. 38-47
    • Sandhu, R.1    Coyne, E.2    Feinstein, H.3    Youman, C.4
  • 23
    • 0033329699 scopus 로고    scopus 로고
    • Modelling, specifying and implementing workflow security in cyberspace
    • E. Gudes, M. Olivier, and R. Riet, "Modelling, Specifying and Implementing Workflow Security in Cyberspace", J. Computer Security, vol. 7, no. 4, pp. 287-315, 1999.
    • (1999) J. Computer Security , vol.7 , Issue.4 , pp. 287-315
    • Gudes, E.1    Olivier, M.2    Riet, R.3
  • 27
    • 33747510016 scopus 로고    scopus 로고
    • Refactoring service-based systems: How to avoid trusting a workflow service
    • H. Chivers and J. McDermid, "Refactoring Service-Based Systems: How to Avoid Trusting a Workflow Service", Concurrency and Computation: Practice and Experience, vol. 18, no. 10, pp. 1255-1275, 2006.
    • (2006) Concurrency and Computation: Practice and Experience , vol.18 , Issue.10 , pp. 1255-1275
    • Chivers, H.1    McDermid, J.2
  • 29
    • 33646038227 scopus 로고    scopus 로고
    • Taverna: Lessons in creating a workflow environment for the life sciences
    • T. M. Oinn et al., "Taverna: Lessons in Creating a Workflow Environment for the Life Sciences", Concurrency and Computation: Practice and Experience, vol. 18, no. 10, pp. 1067-1100, 2006.
    • (2006) Concurrency and Computation: Practice and Experience , vol.18 , Issue.10 , pp. 1067-1100
    • Oinn, T.M.1
  • 35
    • 33750035572 scopus 로고    scopus 로고
    • A security model for provenance
    • Harvard Univ., Jan
    • U. Braun and A. Shinna, "A Security Model for Provenance", Technical Report TR-04-06, Harvard Univ., Jan. 2006.
    • (2006) Technical Report TR-04-06
    • Braun, U.1    Shinna, A.2
  • 36
    • 57149126952 scopus 로고    scopus 로고
    • Provenance and scientific workflows: Challenges and opportunities
    • S. B. Davidson and J. Freire, "Provenance and Scientific Workflows: Challenges and Opportunities", Proc. SIGMOD, pp. 1345-1350, 2008.
    • (2008) Proc. SIGMOD , pp. 1345-1350
    • Davidson, S.B.1    Freire, J.2
  • 37
    • 85131841064 scopus 로고    scopus 로고
    • Inheritance of interorganizational workflows: How to agree or disagree without loosing control?
    • W. van der Aalst, "Inheritance of Interorganizational Workflows: How to Agree or Disagree without Loosing Control?" Information Technology and Management J., vol. 2, no. 3, pp. 195-231, 2002.
    • (2002) Information Technology and Management J. , vol.2 , Issue.3 , pp. 195-231
    • Van Der Aalst, W.1
  • 38
    • 74049155851 scopus 로고    scopus 로고
    • A task abstraction and mapping approach to the shimming problem in scientific workflows
    • C. Lin, S. Lu, X. Fei, D. Pai, and J. Hua, "A Task Abstraction and Mapping Approach to the Shimming Problem in Scientific Workflows", Proc. Int'l Conf. Services Computing (SCC), pp. 284-291, 2009.
    • (2009) Proc. Int'l Conf. Services Computing (SCC) , pp. 284-291
    • Lin, C.1    Lu, S.2    Fei, X.3    Pai, D.4    Hua, J.5
  • 41
    • 62249091004 scopus 로고    scopus 로고
    • A model of process documentation to determine provenance in mash-ups
    • P. T. Groth, S. Miles, and L. Moreau, "A Model of Process Documentation to Determine Provenance in Mash-Ups", ACM Trans. Internet Technology, vol. 9, no. 1, 2009.
    • (2009) ACM Trans. Internet Technology , vol.9 , Issue.1
    • Groth, P.T.1    Miles, S.2    Moreau, L.3
  • 42
    • 78650023837 scopus 로고    scopus 로고
    • Provenance Aware Service Oriented Architecture PASOA Project
    • Provenance Aware Service Oriented Architecture (PASOA) Project, http://www.pasoa.org, 2010.
    • (2010)
  • 45
    • 70449497792 scopus 로고    scopus 로고
    • A reference architecture for scientific workflow management systems and the VIEW SOA solution
    • Jan.-Mar
    • C. Lin, S. Lu, X. Fei, A. Chebotko, D. Pai, Z. Lai, F. Fotouhi, and J. Hua, "A Reference Architecture for Scientific Workflow Management Systems and the VIEW SOA Solution", IEEE Trans. Services Computing, vol. 2, no. 1, pp. 79-92, Jan.-Mar. 2009.
    • (2009) IEEE Trans. Services Computing , vol.2 , Issue.1 , pp. 79-92
    • Lin, C.1    Lu, S.2    Fei, X.3    Chebotko, A.4    Pai, D.5    Lai, Z.6    Fotouhi, F.7    Hua, J.8
  • 48
    • 77955270559 scopus 로고    scopus 로고
    • RDFProv: A relational RDF store for querying and managing scientific workflow provenance
    • to be published in
    • A. Chebotko, S. Lu, X. Fei, and F. Fotouhi, "RDFProv: A Relational RDF Store for Querying and Managing Scientific Workflow Provenance", to be published in Data and Knowledge Eng., vol. 69, no. 8, pp. 836-865, 2010.
    • (2010) Data and Knowledge Eng. , vol.69 , Issue.8 , pp. 836-865
    • Chebotko, A.1    Lu, S.2    Fei, X.3    Fotouhi, F.4
  • 49
    • 78649995565 scopus 로고    scopus 로고
    • Open Provenance Model
    • Open Provenance Model, http://openprovenance.org, 2010.
    • (2010)
  • 57
    • 3142510989 scopus 로고    scopus 로고
    • Administrative scope: A foundation for role-based administrative models
    • J. Crampton and G. Loizou, "Administrative Scope: A Foundation for Role-Based Administrative Models", ACM Trans. Information and System Security, vol. 6, no. 2, pp. 201-231, 2003.
    • (2003) ACM Trans. Information and System Security , vol.6 , Issue.2 , pp. 201-231
    • Crampton, J.1    Loizou, G.2
  • 58
    • 78649991873 scopus 로고    scopus 로고
    • SecProv
    • SecProv, http://www.cs.panam.edu/~artem/SecProv. zip, 2010.
    • (2010)
  • 59
    • 46849121607 scopus 로고    scopus 로고
    • Guarding sensitive information streams through the jungle of composite web services
    • J. Wei, L. Singaravelu, and C. Pu, "Guarding Sensitive Information Streams through the Jungle of Composite Web Services", Proc. Int'l Conf. Web Services (ICWS), pp. 455-462, 2007.
    • (2007) Proc. Int'l Conf. Web Services (ICWS) , pp. 455-462
    • Wei, J.1    Singaravelu, L.2    Pu, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.