Using provenance for secure data fusion in cooperative systems

Clara Bertolissi, Jerry den Hartog, Nicola Zannone

Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

Uittreksel

In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. Controlling the access to such evolving and variegated data, often under the authority of different entities, is challenging. In this work, we identify a set of access control requirements for multi-source cooperative systems and propose an attribute-based access control model where provenance information is used to specify access constraints that account for both the evolution of data objects and the process of data fusion. We demonstrate the feasibility of the proposed model by showing how it can be implemented within existing access control mechanisms with minimal changes.

TaalEngels
TitelSACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies
Plaats van productieNew York
UitgeverijAssociation for Computing Machinery, Inc
Pagina's185-194
Aantal pagina's10
ISBN van elektronische versie978-1-4503-6753-0
DOI's
StatusGepubliceerd - 28 mei 2019
Evenement24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019 - Toronto, Canada
Duur: 3 jun 20196 jun 2019

Congres

Congres24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019
LandCanada
StadToronto
Periode3/06/196/06/19

Vingerafdruk

Data fusion
Access control

Trefwoorden

    Citeer dit

    Bertolissi, C., den Hartog, J., & Zannone, N. (2019). Using provenance for secure data fusion in cooperative systems. In SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies (blz. 185-194). New York: Association for Computing Machinery, Inc. DOI: 10.1145/3322431.3325100
    Bertolissi, Clara ; den Hartog, Jerry ; Zannone, Nicola. / Using provenance for secure data fusion in cooperative systems. SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York : Association for Computing Machinery, Inc, 2019. blz. 185-194
    @inproceedings{e5da3424e107497e99f7d9ae93f28ac6,
    title = "Using provenance for secure data fusion in cooperative systems",
    abstract = "In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. Controlling the access to such evolving and variegated data, often under the authority of different entities, is challenging. In this work, we identify a set of access control requirements for multi-source cooperative systems and propose an attribute-based access control model where provenance information is used to specify access constraints that account for both the evolution of data objects and the process of data fusion. We demonstrate the feasibility of the proposed model by showing how it can be implemented within existing access control mechanisms with minimal changes.",
    keywords = "ABAC, Data fusion, Provenance",
    author = "Clara Bertolissi and {den Hartog}, Jerry and Nicola Zannone",
    year = "2019",
    month = "5",
    day = "28",
    doi = "10.1145/3322431.3325100",
    language = "English",
    pages = "185--194",
    booktitle = "SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies",
    publisher = "Association for Computing Machinery, Inc",
    address = "United States",

    }

    Bertolissi, C, den Hartog, J & Zannone, N 2019, Using provenance for secure data fusion in cooperative systems. in SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, Inc, New York, blz. 185-194, Toronto, Canada, 3/06/19. DOI: 10.1145/3322431.3325100

    Using provenance for secure data fusion in cooperative systems. / Bertolissi, Clara; den Hartog, Jerry; Zannone, Nicola.

    SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York : Association for Computing Machinery, Inc, 2019. blz. 185-194.

    Onderzoeksoutput: Hoofdstuk in Boek/Rapport/CongresprocedureConferentiebijdrageAcademicpeer review

    TY - GEN

    T1 - Using provenance for secure data fusion in cooperative systems

    AU - Bertolissi,Clara

    AU - den Hartog,Jerry

    AU - Zannone,Nicola

    PY - 2019/5/28

    Y1 - 2019/5/28

    N2 - In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. Controlling the access to such evolving and variegated data, often under the authority of different entities, is challenging. In this work, we identify a set of access control requirements for multi-source cooperative systems and propose an attribute-based access control model where provenance information is used to specify access constraints that account for both the evolution of data objects and the process of data fusion. We demonstrate the feasibility of the proposed model by showing how it can be implemented within existing access control mechanisms with minimal changes.

    AB - In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. Controlling the access to such evolving and variegated data, often under the authority of different entities, is challenging. In this work, we identify a set of access control requirements for multi-source cooperative systems and propose an attribute-based access control model where provenance information is used to specify access constraints that account for both the evolution of data objects and the process of data fusion. We demonstrate the feasibility of the proposed model by showing how it can be implemented within existing access control mechanisms with minimal changes.

    KW - ABAC

    KW - Data fusion

    KW - Provenance

    UR - http://www.scopus.com/inward/record.url?scp=85067202963&partnerID=8YFLogxK

    U2 - 10.1145/3322431.3325100

    DO - 10.1145/3322431.3325100

    M3 - Conference contribution

    SP - 185

    EP - 194

    BT - SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies

    PB - Association for Computing Machinery, Inc

    CY - New York

    ER -

    Bertolissi C, den Hartog J, Zannone N. Using provenance for secure data fusion in cooperative systems. In SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. New York: Association for Computing Machinery, Inc. 2019. blz. 185-194. Beschikbaar vanaf, DOI: 10.1145/3322431.3325100