
350 ◾ Secure Data Provenance and Inference Control
24.3 Directions for Secure Data Provenance
and Inference Control
ere are many directions for secure data provenance and inference control. We
discuss some of them for each topic addressed in this book. Figure 24.3 illustrates
the directions and challenges.
With respect to the discussion in Section II, the major challenges include devel-
oping appropriate security models for provenance data. Our focus was mainly on
RBAC. Furthermore, the provenance data were represented as RDF graphs. e
questions that need to be addressed include, What are the most suitable security
models? Should we explore ...