喵ID:1Qol55免责声明

A Core Calculus for Provenance

起源的核心计算

基本信息

DOI:
10.3233/jcs-130487
发表时间:
2012
期刊:
ArXiv
影响因子:
--
通讯作者:
Roly Perera
中科院分区:
文献类型:
--
作者: Umut A. Acar;Amal Ahmed;J. Cheney;Roly Perera研究方向: -- MeSH主题词: --
关键词: --
来源链接:pubmed详情页地址

文献摘要

Provenance is an increasing concern due to the ongoing revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer systems will need to become provenance-aware in order to provide satisfactory accountability, reproducibility, and trust for scientific or other high-value data. To date, there is not a consensus concerning appropriate formal models or security properties for provenance. In previous work, we introduced a formal framework for provenance security and proposed formal definitions of properties called disclosure and obfuscation.In this article, we study refined notions of positive and negative disclosure and obfuscation in a concrete setting, that of a general-purpose programing language. Previous models of provenance have focused on special-purpose languages such as workflows and database queries. We consider a higher-order, functional language with sums, products, and recursive types and functions, and equip it with a tracing semantics in which traces themselves can be replayed as computations. We present an annotation-propagation framework that supports many provenance views over traces, including standard forms of provenance studied previously. We investigate some relationships among provenance views and develop some partial solutions to the disclosure and obfuscation problems, including correct algorithms for disclosure and positive obfuscation based on trace slicing.
由于在网络和其他计算机系统中共享和处理科学数据的持续革命,出处是一个越来越多的关注点。建议许多计算机系统需要成为出处,以便为科学或其他高价值数据提供令人满意的问责制,可重复性和信任。迄今为止,尚无关于适当的正式模型或出处的安全属性的共识。在先前的工作中,我们介绍了一个正式的出处安全性框架,并提出了称为披露和混淆的物业的正式定义。在本文中,我们研究了在具体环境中的正面和负面披露和混淆的精致概念,语言。以前的出处模型专注于专用语言,例如工作流和数据库查询。我们考虑一种具有总和,产品和递归类型和功能的高阶,功能性语言,并为其配备了一个追踪语义,其中可以将痕迹本身作为计算重录。我们提出了一个注释传播框架,该框架支持对痕迹的许多出处视图,包括先前研究的标准形式。我们研究了出处观点之间的一些关系,并为披露和混淆问题开发了一些部分解决方案,包括根据痕量切片的正确披露算法和阳性混淆的算法。
参考文献(3)
被引文献(54)
Provenance as a Security Control
出处作为安全控制
DOI:
发表时间:
2012
期刊:
the 4th USENIX Workshop on the Theory and Practice of Provenance
影响因子:
0
作者:
Martin A
通讯作者:
Martin A
Functional programs that explain their work
解释其工作的函数式程序
DOI:
10.1145/2364527.2364579
发表时间:
2012
期刊:
影响因子:
0
作者:
Perera R
通讯作者:
Perera R
A Graph Model of Data and Workflow Provenance
DOI:
发表时间:
2010-02
期刊:
影响因子:
0
作者:
Umut A. Acar;P. Buneman;J. Cheney;J. V. D. Bussche;Natalia Kwasnikowska;Stijn Vansummeren
通讯作者:
Umut A. Acar;P. Buneman;J. Cheney;J. V. D. Bussche;Natalia Kwasnikowska;Stijn Vansummeren

数据更新时间:{{ references.updateTime }}

Roly Perera
通讯地址:
--
所属机构:
--
电子邮件地址:
--
免责声明免责声明
1、猫眼课题宝专注于为科研工作者提供省时、高效的文献资源检索和预览服务;
2、网站中的文献信息均来自公开、合规、透明的互联网文献查询网站,可以通过页面中的“来源链接”跳转数据网站。
3、在猫眼课题宝点击“求助全文”按钮,发布文献应助需求时求助者需要支付50喵币作为应助成功后的答谢给应助者,发送到用助者账户中。若文献求助失败支付的50喵币将退还至求助者账户中。所支付的喵币仅作为答谢,而不是作为文献的“购买”费用,平台也不从中收取任何费用,
4、特别提醒用户通过求助获得的文献原文仅用户个人学习使用,不得用于商业用途,否则一切风险由用户本人承担;
5、本平台尊重知识产权,如果权利所有者认为平台内容侵犯了其合法权益,可以通过本平台提供的版权投诉渠道提出投诉。一经核实,我们将立即采取措施删除/下架/断链等措施。
我已知晓