Provenance-Aware Policy Definition and Execution
نویسندگان
چکیده
The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. In the Internet, policies provide means to control how and by whom data is processed. Conditions of policies may depend on the previous processing of the data and thus on the temporal structure of processing histories. However, existing policy languages do not provide means to express the temporal aspects of such conditions. Thus, in this article we discuss how to connect policies and histories of data processing and how to address the temporal structure by mapping it to a graph structure.
منابع مشابه
PAPEL: A Language and Model for Provenance-Aware Policy Definition and Execution
The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. Policies provide means to control how and by whom data is processed. Conditions of policies may depend on the previous processing of the data. However, existing policy languages do not provide means to express such conditions. In this work we present a formal model and language allo...
متن کاملTrustworthy Whole-System Provenance for the Linux Kernel
In a provenance-aware system, mechanisms gather and report metadata that describes the history of each object being processed on the system, allowing users to understand how data objects came to exist in their present state. However, while past work has demonstrated the usefulness of provenance, less attention has been given to securing provenance-aware systems. Provenance itself is a ripe atta...
متن کاملTransparently Gathering Provenance with Provenance Aware Condor
We observed that the Condor batch execution system exposes a lot of information about the jobs that run in the system. This observation led us to explore whether this system information could be used for provenance. The result of our explorations is Provenance Aware Condor (PAC), a system that transparently gathers provenance while jobs run in Condor. Transparent provenance gathering requires t...
متن کاملTAP: Time-aware Provenance for Distributed Systems
In this paper, we explore the use of provenance for analyzing execution dynamics in distributed systems. We argue that provenance could have significant practical benefits for system administrators, e.g., for reasoning about changes in a system’s state, diagnosing protocol misconfigurations, detecting intrusions, and pinpointing performance bottlenecks. However, to realize this vision, we must ...
متن کاملPAPEL: Syntax and Semantics for Provenance-Aware Policy Definition
The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. Policies provide means to control how and by whom data is processed. Conditions of policies may depend on the previous processing of the data. However, existing policy languages do not provide means to express such conditions. In this work we present a formal model and language allo...
متن کامل