Secure Data Provenance and Inference Control with Semantic Web

With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains.The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhancethe scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.

[1]  Shouhuai Xu,et al.  An Access Control Language for a General Provenance Model , 2009, Secure Data Management.

[2]  Bijan Parsia,et al.  Optimizations for Answering Conjunctive ABox Queries , 2006, Description Logics.

[3]  Ana Luna Alonso,et al.  I. Administration Policies , 2011 .

[4]  Arif Ghafoor,et al.  Scalable and effective test generation for access control systems , 2006 .

[5]  C. M. Sperberg-McQueen,et al.  Extensible Markup Language (XML) , 1997, World Wide Web J..

[6]  Juliana Freire,et al.  Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.

[7]  GilYolanda,et al.  Special Issue: The First Provenance Challenge , 2008 .

[8]  Margo I. Seltzer,et al.  Securing Provenance , 2008, HotSec.

[9]  Dennis G. Kafura,et al.  First experiences using XACML for access control in distributed systems , 2003, XMLSEC '03.

[10]  Manfred Nagl,et al.  Graph-Grammars and Their Application to Computer Science , 1982, Lecture Notes in Computer Science.

[11]  Jeffrey M. Bradshaw,et al.  Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.

[12]  Luciano Serafini,et al.  DRAGO: Distributed Reasoning Architecture for the Semantic Web , 2005, ESWC.

[13]  Mohamed F. Mokbel,et al.  RDF Data-Centric Storage , 2009, 2009 IEEE International Conference on Web Services.

[14]  Dorothea Blostein,et al.  Issues in the Practical Use of Graph Rewriting , 1994, TAGT.

[15]  Sabrina De Capitani di Vimercati,et al.  An algebra for composing access control policies , 2002, TSEC.

[16]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[17]  Edith Schonberg,et al.  Scalable Grounded Conjunctive Query Evaluation over Large and Expressive Knowledge Bases , 2008, SEMWEB.

[18]  Martín Abadi,et al.  Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..

[19]  James A. Hendler,et al.  A Semantic Web approach to the provenance challenge , 2008, Concurr. Comput. Pract. Exp..

[20]  Frank Hermann,et al.  Sesqui-Pushout Rewriting , 2006, ICGT.

[21]  Luigi V. Mancini,et al.  Graph-based specification of access control policies , 2005, J. Comput. Syst. Sci..

[22]  Chen Zhao,et al.  Representation and Reasoning on RBAC: A Description Logic Approach , 2005, ICTAC.

[23]  Geoffrey C. Fox,et al.  Examining the Challenges of Scientific Workflows , 2007, Computer.

[24]  Bhavani M. Thuraisingham,et al.  ROWLBAC: representing role based access control in OWL , 2008, SACMAT '08.

[25]  C. M. Sperberg-McQueen,et al.  Extensible markup language , 1997 .

[26]  Francesco Parisi-Presicce,et al.  UML specification of access control policies and their formal verification , 2006, Software & Systems Modeling.

[27]  Bijan Parsia,et al.  Optimizations for answering conjunctive ABox queries: First results , 2006 .

[28]  Anne Bridgman Click Here To Buy. , 2000 .

[29]  Paul T. Groth,et al.  Security Issues in a SOA-Based Provenance System , 2006, IPAW.

[30]  Luc Moreau,et al.  The Foundations for Provenance on the Web , 2010, Found. Trends Web Sci..

[31]  Frank van Harmelen,et al.  Marvin: Distributed reasoning over large-scale Semantic Web data , 2009, J. Web Semant..

[32]  Grigoris Antoniou,et al.  Nonmonotonic reasoning , 1997 .

[33]  Kouichi Sakurai,et al.  Grouping Provenance Information to Improve Efficiency of Access Control , 2009, ISA.

[34]  Yogesh L. Simmhan,et al.  The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..

[35]  Detlef Plump,et al.  Graph Transformation in Constant Time , 2006, ICGT.

[36]  Manolis Koubarakis,et al.  RDFS Reasoning and Query Answering on Top of DHTs , 2008, SEMWEB.

[37]  Paul T. Groth,et al.  An Architecture for Provenance Systems , 2006 .

[38]  Viktor K. Prasanna,et al.  A Data Partitioning Approach for Parallelizing Rule Based Inferencing for Materialized OWL Knowledge Bases , 2008, ISCA PDCCS.

[39]  Bhavani M. Thuraisingham,et al.  A language for provenance access control , 2011, CODASPY '11.

[40]  Yogesh L. Simmhan,et al.  A survey of data provenance techniques , 2005 .

[41]  James A. Hendler,et al.  N3Logic: A logical framework for the World Wide Web , 2007, Theory and Practice of Logic Programming.

[42]  Tao Xie,et al.  Xengine: a fast and scalable XACML policy evaluation engine , 2008, SIGMETRICS '08.

[43]  Arnon Rosenthal,et al.  PLUS: Synthesizing privacy, lineage, uncertainty and security , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.

[44]  Roberto Tamassia,et al.  A Role and Attribute Based Access Control System Using Semantic Web Technologies , 2007, OTM Workshops.

[45]  Michael Hicks,et al.  Combining Provenance and Security Policies in a Web-based Document Management System , 2007 .

[46]  Uri Braun,et al.  A Security Model for Provenance , 2006 .

[47]  Heiko Dörr,et al.  Efficient Graph Rewriting and Its Implementation , 1995, Lecture Notes in Computer Science.

[48]  Allen S. Mandel Comment … , 1978, British heart journal.

[49]  Ravishankar K. Iyer,et al.  Experimental evaluation , 1995 .

[50]  James A. Hendler,et al.  Analyzing web access control policies , 2007, WWW '07.

[51]  J. Heflin,et al.  A Scalable Approach for Partitioning OWL Knowledge Bases , 2006 .

[52]  Andy Seaborne,et al.  Clustered TDB: A Clustered Triple Store for Jena , 2008 .

[53]  C. M. Sperberg-McQueen,et al.  eXtensible Markup Language (XML) 1.0 (Second Edition) , 2000 .

[54]  Adriane Chapman,et al.  Scalable Access Controls for Lineage , 2009, Workshop on the Theory and Practice of Provenance.

[55]  Marianne Winslett,et al.  Introducing secure provenance: problems and challenges , 2007, StorageSS '07.