An Access Control Model for Protecting Provenance Graphs
- Submitting institution
-
University of Aberdeen
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 67130779
- Type
- E - Conference contribution
- DOI
-
10.1109/PST.2015.7232963
- Title of conference / published proceedings
- 2015 13th Annual Conference on Privacy, Security and Trust (PST)
- First page
- 125
- Volume
- -
- Issue
- -
- ISSN
- -
- Open access status
- -
- Month of publication
- July
- Year of publication
- 2015
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
3
- Research group(s)
-
-
- Citation count
- 0
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- The significance of this paper lies in its focus on provenance graphs as data assets that require access control, due to the potentially sensitive nature of such data. It represents the first attempt to define protected objects within a provenance graph by taking into account validity constraints of the graph
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -