Abstract:
Provenance, describes how a data item came to be its current state. A Directed Acyclic Graph, nature of the provenance poses challenges to access control models and query...Show MoreMetadata
Abstract:
Provenance, describes how a data item came to be its current state. A Directed Acyclic Graph, nature of the provenance poses challenges to access control models and querying languages. Access control policies are needed to protect the security of data provenance. In this paper, we apply proposed notions of regular expression for provenance as the structure of a provenance graph is very large. We use an extending access control language for data provenance, and semantic Web technologies to effectively query provenances. Finally, we tailored an access control language by using the regular expressions through a medical example.
Published in: 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD)
Date of Conference: 04-06 May 2016
Date Added to IEEE Xplore: 15 September 2016
ISBN Information: