Secure Scientific Workflow Provenance Querying With Security Views
Source: Wayne State University
In this work, the authors studied the problem of protecting scientific workflow provenance, including both data products and their provenance. First, this paper formalized scientific workflow provenance that builds the basis for querying and access control. Second, this paper proposed a security specification mechanism for provenance at various granularity levels and the derivation of a full security specification based on inheritance, overriding, and conflict resolution rules. Third, this paper proposed the notion of security views of provenance to serve as the mechanism for enforcing security specification for scientific workflow run provenance.