Abstract. Recent work has begun exploring the characterization and utilization of provenance in systems based on the Service Oriented Architecture (such as Web Services and Grid based environments). One of the salient issues related to provenance use within any given system is its security. Provenance presents some unique security requirements of its own, which are additionally dependent on the architectural and environmental context that a provenance system operates in. We discuss the security considerations pertaining to a Service Oriented Architecture based provenance system. Concurrently, we outline possible approaches to address them.
Service Oriented Architectures (SOAs) have become the defacto standard for defining interoperable ar...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
The widespread development of Service-Oriented Architecture (SOA) and web services is changing the t...
Recent work has begun exploring the characterization and utilization of provenance in systems based ...
Data (or information) provenance has many important applications. However, prior work on data proven...
In a service-oriented architecture (SOA), parts of software applications are made available as servi...
Abstract. Security is likely becoming a critical factor in the future adoption of provenance technol...
While provenance research is common in distributed systems, many proposed solutions do not address t...
Most security models are designed to protect data. Some also deal with traditional metadata. Provena...
Service Oriented Architectures are gaining popularity, and are used to realise corporate networks, i...
Can, Ozgu/0000-0002-8064-2905WOS: 000513714100001Provenance determines the origin of the data by tra...
Healthcare organizations need to handle many kinds of information and integrate different support sy...
This work addresses the existing research gap regarding the security of service oriented architectur...
Modern organizations increasingly depend heavily on information stored and processed in distributed,...
Abstract—In computing, the software elements like objects and components emphasize on reusability us...
Service Oriented Architectures (SOAs) have become the defacto standard for defining interoperable ar...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
The widespread development of Service-Oriented Architecture (SOA) and web services is changing the t...
Recent work has begun exploring the characterization and utilization of provenance in systems based ...
Data (or information) provenance has many important applications. However, prior work on data proven...
In a service-oriented architecture (SOA), parts of software applications are made available as servi...
Abstract. Security is likely becoming a critical factor in the future adoption of provenance technol...
While provenance research is common in distributed systems, many proposed solutions do not address t...
Most security models are designed to protect data. Some also deal with traditional metadata. Provena...
Service Oriented Architectures are gaining popularity, and are used to realise corporate networks, i...
Can, Ozgu/0000-0002-8064-2905WOS: 000513714100001Provenance determines the origin of the data by tra...
Healthcare organizations need to handle many kinds of information and integrate different support sy...
This work addresses the existing research gap regarding the security of service oriented architectur...
Modern organizations increasingly depend heavily on information stored and processed in distributed,...
Abstract—In computing, the software elements like objects and components emphasize on reusability us...
Service Oriented Architectures (SOAs) have become the defacto standard for defining interoperable ar...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
The widespread development of Service-Oriented Architecture (SOA) and web services is changing the t...