Please wait a minute...
 首页  期刊介绍 期刊订阅 联系我们
 
最新录用  |  预出版  |  当期目录  |  过刊浏览  |  阅读排行  |  下载排行  |  引用排行  |  百年期刊
Journal of Tsinghua University(Science and Technology)    2017, Vol. 57 Issue (6) : 561-568     DOI: 10.16511/j.cnki.qhdxxb.2017.26.019
COMPUTER SCIENCE AND TECHNOLOGY |
Provenance dependency path pattern mining algorithm based on grammar induction
PEI Jisheng, YE Xiaojun
Institute of Information System & Engineering, School of Software, Tsinghua University, Beijing 100084, China
Download: PDF(1205 KB)  
Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks    
Abstract  Provenance dependency path patterns are the foundations of many provenance based cloud data security measures. This article analyzes the importance of provenance dependency path pattern mining in provenance based security system with a linearization algorithm for provenance graphs that enables grammar induction and parsing of provenance data using automata models. A similarity measurement method is given for dependency paths based on grammar parsing with a dependency path pattern mining algorithm to reduce reliance on the domain knowledge and support automatic provenance rule learning. The feasibility and effectiveness of the approach are demonstrated by experiments.
Keywords data provenance      dependency path pattern      automata      clustering      provenance based rule mining     
ZTFLH:  TP309.2  
Issue Date: 15 June 2017
Service
E-mail this article
E-mail Alert
RSS
Articles by authors
PEI Jisheng
YE Xiaojun
Cite this article:   
PEI Jisheng,YE Xiaojun. Provenance dependency path pattern mining algorithm based on grammar induction[J]. Journal of Tsinghua University(Science and Technology), 2017, 57(6): 561-568.
URL:  
http://jst.tsinghuajournals.com/EN/10.16511/j.cnki.qhdxxb.2017.26.019     OR     http://jst.tsinghuajournals.com/EN/Y2017/V57/I6/561
  
  
  
  
  
  
  
  
  
[1] Park J, Nguyen D, Sandhu R. A provenance-based access control model[C]//Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on. Paris, France:IEEE, 2012:137-144.
[2] Sun L, Park J, Sandhu R. Engineering access control policies for provenance-aware systems[C]//Proceedings of the 3rd ACM conference on data and application security and privacy. San Antonio, CA USA:ACM, 2013:285-292.
[3] Nguyen D, Park J, Sandhu R. Dependency path patterns as the foundation of access control in provenance-aware systems[C]//4th USENIX Workshop on the Theory and Practice of Provenance. Boston, MA USA:USENIX Association, 2012:4.
[4] Nguyen D, Park J, Sandhu R. A provenance-based access control model for dynamic separation of duties[C]//Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. Tarragona, Spain:IEEE, 2013:247-256.
[5] 李斌, 王艺霏, 裴继升, 等. 基于溯源数据的业务流程合规性检测[J]. 清华大学学报(自然科学版), 2013, 53(12):1768-1776. LI Bin, WANG Yifei, PEI Jisheng, et al. Business process compliance checking based on provenance data[J]. J Tsinghua Univ (Sci & Tech), 2013, 53(12):1768-1776. (in Chinese)
url: http://dx.doi.org/nghua Univ (Sci
[6] Muniswamy-Reddy K K, Macko P, Seltzer M I. Provenance for the cloud[C]//8th USENIX Conference on File and Storage Technologies. San Jose, CA USA:USENIX Association, 2010:14-15.
[7] Groth P, Moreau L. PROV-Overview:An Overview of The PROV Family of Documents[R]. Southampton, UK:W3C, 2013.
[8] 叶先一, 张福基. 偏序集上的一种拓扑排序[J]. 数学研究, 2005, 28(4):440-443. YE Xianyi, ZHANG Fuji. A topological sorting in partial order set[J]. Journal of Mathematical Study, 2005, 28(4):440-443. (in Chinese)
[9] Carrasco R C, Oncina J. Learning stochastic regular grammars by means of a state merging method[M]//Grammatical Inference and Applications. Berlin Heidelberg:Springer, 1994:139-152.
[10] Bergmann R, Müller G, Wittkowsky D. Workflow clustering using semantic similarity measures[M]//KI 2013:Advances in Artificial Intelligence. Berlin Heidelberg:Springer, 2013:13-24.
[11] Margo D W, Smogor R. Using provenance to extract semantic file attributes[C]//4th USENIX Workshop on the Theory and Practice of Provenance. San Jose, CA, USA:USENIX Association, 2010:7-7.
[12] Chen P, Plale B, Aktas M S. Temporal representation for mining scientific data provenance[J]. Future Generation Computer Systems, 2014, 36:363-378.
url: http://dx.doi.org/10.1016/j.future.2013.09.032
[1] ZHAO Xingwang, HOU Zhedong, YAO Kaixuan, LIANG Jiye. Two-stage fusion multiview graph clustering based on the attention mechanism[J]. Journal of Tsinghua University(Science and Technology), 2024, 64(1): 1-12.
[2] WANG Liping, SHI Huijie, WANG Dong. Clustering and selection method of microservices for intelligent manufacturing[J]. Journal of Tsinghua University(Science and Technology), 2024, 64(1): 109-116.
[3] JIANG Wenyu, WANG Fei, SU Guofeng, QIAO Yuming, LI Xin, QUAN Wei. Dynamic modeling approach for suppression firing based on cellular automata[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(6): 926-933.
[4] DU Yuji, FU Ming, DUANMU Weike, HOU Longfei, LI Jing. Risk assessment method of gas pipeline networks based on fuzzy analytic hierarchy process and improved coefficient of variation[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(6): 941-950.
[5] LI Congjian, GAO Hang, LIU Yi. Fast reconstruction of a wind field based on numerical simulation and machine learning[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(6): 882-887.
[6] SUN Haobo, YANG Kaiming, ZHU Yu, LU Sen. Modal parameter estimates for a magnetic levitation planar motor based on density clustering[J]. Journal of Tsinghua University(Science and Technology), 2023, 63(1): 33-43.
[7] ZHU Weiyi, ZHANG Xueqin, GU Chunhua. Social network information leakage node probability prediction based on the EDLATrust algorithm[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(2): 355-366.
[8] YU Yong, WANG Yinggang, LUO Zhengguo, YANG Yan, WANG Xinkai, GAO Tao, YU Qian. Link prediction algorithm based on clustering coefficient and node centrality[J]. Journal of Tsinghua University(Science and Technology), 2022, 62(1): 98-104.
[9] XIAO Xi, XU Chen. Speech feature fusion algorithm based on acoustic state likelihood and supervised state modelling[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(6): 476-481.
[10] ZHANG Jiwen, SONG Libin, XU Junjie, SHI Xunlei, LIU Li. Unpredefined ball detection algorithm for humanoid soccer robots[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(4): 298-305.
[11] LUO Xinyuan, CHEN Xin, SHOU Lidan, CHEN Ke, WU Yanjing. Semantic trajectory extraction framework for indoor space[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(3): 186-193.
[12] LI Zihao, TIAN Xiangliang, LI Zhongwen, ZHOU Wei, ZHOU Zhijie, ZHONG Maohua. Risk analysis of metro station passenger flow based on passenger flow patterns[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(10): 854-860.
[13] MA Rui, GAO Haoran, DOU Bowen, WANG Xiajing, HU Changzhen. Control flow graph division based on an improved GN algorithm[J]. Journal of Tsinghua University(Science and Technology), 2019, 59(1): 15-22.
[14] SUO Mingliang, ZHOU Ding, AN Ruoming, LI Shunli. Neighborhood density grid clustering and its applications[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(8): 732-739.
[15] CHEN Xiaofang, QIAN Yingcan, WANG Yalin, YANG Chunhua. Dynamic adjustment interval identification of hydrocracking based on principal component derivative feature clustering[J]. Journal of Tsinghua University(Science and Technology), 2018, 58(1): 81-86.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
Copyright © Journal of Tsinghua University(Science and Technology), All Rights Reserved.
Powered by Beijing Magtech Co. Ltd