Obscuring Provenance Confidential Information via Graph Transformation

Abstract : Provenance is a record that describes the people, institutions, entities, and activities involved in producing, influencing, or delivering a piece of data or a thing. In particular, the provenance of information is crucial in deciding whether information is to be trusted. PROV is a recent W3C specification for sharing provenance over the Web. However, provenance records may expose confidential information, such as identity of agents or specific attributes of entities or activities. It is therefore essential for confidential information to be obscured before sharing provenance. This paper describes PROV-GTS, a provenance graph transformation system, whose principled definition is based on PROV properties, and which seeks to avoid false independencies and false dependencies. PROV-GTS is shown to preserve graph integrity, to be terminating and to be confluent.
Type de document :
Communication dans un congrès
Christian Damsgaard Jensen; Stephen Marsh; Theo Dimitrakos; Yuko Murayama. 9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. IFIP Advances in Information and Communication Technology, AICT-454, pp.109-125, 2015, Trust Management IX. 〈10.1007/978-3-319-18491-3_8〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01416217
Contributeur : Hal Ifip <>
Soumis le : mercredi 14 décembre 2016 - 11:08:33
Dernière modification le : mercredi 14 décembre 2016 - 11:15:46
Document(s) archivé(s) le : mercredi 15 mars 2017 - 13:26:44

Fichier

337890_1_En_8_Chapter.pdf
Fichiers produits par l'(les) auteur(s)

Licence


Distributed under a Creative Commons Paternité 4.0 International License

Identifiants

Citation

Jamal Hussein, Luc Moreau, Vladimiro Sassone. Obscuring Provenance Confidential Information via Graph Transformation. Christian Damsgaard Jensen; Stephen Marsh; Theo Dimitrakos; Yuko Murayama. 9th IFIP International Conference on Trust Management (TM), May 2015, Hamburg, Germany. IFIP Advances in Information and Communication Technology, AICT-454, pp.109-125, 2015, Trust Management IX. 〈10.1007/978-3-319-18491-3_8〉. 〈hal-01416217〉

Partager

Métriques

Consultations de la notice

30

Téléchargements de fichiers

1