
99
Chapter 8
Scalable and Efficient
RBAC for Provenance
8.1 Overview
In Section I we discussed the supporting technologies needed for the concepts in
this book. In particular, we looked at access control models and Semantic Web
technologies as well as data provenance, RBAC, and a discussion of the inference
problem. In this section we discuss one of the major objectives of this book, which
is secure data provenance. In particular, the design and implementation of our
system based on Semantic Web technologies that enforces RBAC on provenance
data will be described.
In this chapter, we first discuss the drawbacks of using the current access con-
trol ...