Conference Paper

Towards a Threat Model for Provenance in e-Science

DOI: 10.1007/978-3-642-17819-1_32 Conference: Provenance and Annotation of Data and Processes - Third International Provenance and Annotation Workshop, IPAW 2010, Troy, NY, USA, June 15-16, 2010. Revised Selected Papers
Source: DBLP


Scientists increasingly rely on workflow management systems to perform large-scale computational scientific experiments. These
systems often collect provenance information that is useful in the analysis and reproduction of such experiments. On the other
hand, this provenance data may be exposed to security threats which can result, for instance, in compromising the analysis
of these experiments, or in illegitimate claims of attribution. In this work, we describe our ongoing work to trace security
requirements for provenance systems in the context of e-Science, and propose some security controls to fulfill them.

Download full-text


Available from: Ian Foster,