-
1
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
(StorageSS)
-
Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: Proceedings of the 2007 ACM Workshop on Storage Security And Survivability (StorageSS), pp. 13-18 (2007)
-
(2007)
Proceedings of the 2007 ACM Workshop on Storage Security and Survivability
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
2
-
-
33750035572
-
-
Technical Report TR- 04-06, Harvard University Computer Science January
-
Braun, U., Shinnar, A.: A security model for provenance. Technical Report TR- 04-06, Harvard University Computer Science (January 2006)
-
(2006)
A Security Model for Provenance
-
-
Braun, U.1
Shinnar, A.2
-
3
-
-
33750036770
-
-
Technical report University of Southampton November
-
Groth, P., Jiang, S., Miles, S., Munroe, S., Tan, V., Tsasakou, S., Moreau, L.: An architecture for provenance systems. Technical report, University of Southampton (November 2006)
-
(2006)
An Architecture for Provenance Systems
-
-
Groth, P.1
Jiang, S.2
Miles, S.3
Munroe, S.4
Tan, V.5
Tsasakou, S.6
Moreau, L.7
-
4
-
-
39149137189
-
Databases with uncertainty and lineage
-
Benjelloun, O., Sarma, A.D., Halevy, A.Y., Theobald, M., Widom, J.: Databases with uncertainty and lineage. VLDB J. 17(2), 243-264 (2008)
-
(2008)
VLDB J.
, vol.17
, Issue.2
, pp. 243-264
-
-
Benjelloun, O.1
Sarma, A.D.2
Halevy, A.Y.3
Theobald, M.4
Widom, J.5
-
5
-
-
33846076805
-
Provenance management in curated databases
-
Buneman, P., Chapman, A., Cheney, J.: Provenance management in curated databases. In: SIGMOD 2006, pp. 539-550 (2006)
-
(2006)
SIGMOD 2006
, pp. 539-550
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
-
6
-
-
57149126660
-
-
[32]
-
Chapman, A., Jagadish, H.V., Ramanan, P.: effcient provenance storage. In: [32], pp. 993-1006
-
Effcient Provenance Storage
, pp. 993-1006
-
-
Chapman, A.1
Jagadish, H.V.2
Ramanan, P.3
-
8
-
-
42149109673
-
The provenance of electronic data
-
Moreau, L., Groth, P.T., Miles, S., Vazquez-Salceda, J., Ibbotson, J., Jiang, S., Munroe, S., Rana, O.F., Schreiber, A., Tan, V., Varga, L.Z.: The provenance of electronic data. Commun. ACM 51(4), 52-58 (2008)
-
(2008)
Commun. ACM
, vol.51
, Issue.4
, pp. 52-58
-
-
Moreau, L.1
Groth, P.T.2
Miles, S.3
Vazquez-Salceda, J.4
Ibbotson, J.5
Jiang, S.6
Munroe, S.7
Rana, O.F.8
Schreiber, A.9
Tan, V.10
Varga, L.Z.11
-
9
-
-
33750087260
-
Security issues in a soa-based provenance system
-
Moreau, L., Foster, I. (eds.) IPAW 2006. Springer, Heidelberg
-
Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security issues in a soa-based provenance system. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.4145, pp. 203-211. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4145
, pp. 203-211
-
-
Tan, V.1
Groth, P.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
11
-
-
50649104772
-
-
Technical report, University of Southampton
-
Moreau, L., Plale, B., Miles, S., Goble, C., Missier, P., Barga, R., Simmhan, Y., Futrelle, J., McGrath, R., Myers, J., Paulson, P., Bowers, S., Ludaescher, B., Kwasnikowska, N., den Bussche, J.V., Ellkvist, T., Freire, J., Groth, P.: The open provenance model (v1.01). Technical report, University of Southampton (2008)
-
(2008)
The Open Provenance Model (v1.01)
-
-
Moreau, L.1
Plale, B.2
Miles, S.3
Goble, C.4
Missier, P.5
Barga, R.6
Simmhan, Y.7
Futrelle, J.8
McGrath, R.9
Myers, J.10
Paulson, P.11
Bowers, S.12
Ludaescher, B.13
Kwasnikowska, N.14
Den Bussche, J.V.15
Ellkvist, T.16
Freire, J.17
Groth, P.18
-
12
-
-
84948706138
-
Chimera: Avirtual data system for representing, querying, and automating data derivation
-
IEEE Computer Society, Los Alamitos
-
Foster, I.T., V̈ockler, J.S., Wilde, M., Zhao, Y.: Chimera: Avirtual data system for representing, querying, and automating data derivation. In: SSDBM, pp. 37-46. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
SSDBM
, pp. 37-46
-
-
Foster, I.T.1
V̈ockler, J.S.2
Wilde, M.3
Zhao, Y.4
-
13
-
-
57649219475
-
A data model and architecture for long-term preservation
-
Larsen, R.L., Paepcke, A., Borbinha, J.L., Naaman, M. (eds.) ACM, New York
-
Janee, G., Mathena, J., Frew, J.: A data model and architecture for long-term preservation. In: Larsen, R.L., Paepcke, A., Borbinha, J.L., Naaman, M. (eds.) JCDL, pp. 134-144. ACM, New York (2008)
-
(2008)
JCDL
, pp. 134-144
-
-
Janee, G.1
Mathena, J.2
Frew, J.3
-
14
-
-
84961839008
-
Towards provenance-enabling paraview
-
Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. Springer, Heidelberg
-
Callahan, S.P., Freire, J., Scheidegger, C.E., Silva, C.T., Vo, H.T.: Towards provenance-enabling paraview. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol.5272, pp. 120-127. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5272
, pp. 120-127
-
-
Callahan, S.P.1
Freire, J.2
Scheidegger, C.E.3
Silva, C.T.4
Vo, H.T.5
-
15
-
-
79960570447
-
Why and where: A characterization of data provenance
-
Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. Springer, Heidelberg
-
Buneman, P., Khanna, S., Tan, W.-C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.1973, pp. 316-330. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1973
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.-C.3
-
16
-
-
70349868875
-
A generalized framework for database access controls
-
Abrams, M.D., Smith, G.W.: A generalized framework for database access controls. In: DBSec., pp. 171-178 (1990)
-
(1990)
DBSec
, pp. 171-178
-
-
Abrams, M.D.1
Smith, G.W.2
-
17
-
-
0025022888
-
Beyond the pale of mac and dac-defining new forms of access control
-
McCollum, C.D., Messing, J.R., Notargiacomo, L.: Beyond the pale of mac and dac-defining new forms of access control. In: IEEE Symposium on Security and Privacy, pp. 190-200 (1990)
-
(1990)
IEEE Symposium on Security and Privacy
, pp. 190-200
-
-
McCollum, C.D.1
Messing, J.R.2
Notargiacomo, L.3
-
18
-
-
0242456750
-
Towards usage control models: Beyond traditional access control
-
Park, J., Sandhu, R.S.: Towards usage control models: beyond traditional access control. In: SACMAT, pp. 57-64 (2002)
-
(2002)
SACMAT
, pp. 57-64
-
-
Park, J.1
Sandhu, R.S.2
-
19
-
-
84893070616
-
Originator control in usage control
-
IEEE Computer Society, Los Alamitos
-
Park, J., Sandhu, R.S.: Originator control in usage control. In: POLICY, pp. 60-66. IEEE Computer Society, Los Alamitos (2002)
-
(2002)
POLICY
, pp. 60-66
-
-
Park, J.1
Sandhu, R.S.2
-
20
-
-
57349158498
-
An obligation model bridging access control policies and privacy policies
-
Ray, I., Li, N. (eds.) ACM, New York
-
Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Ray, I., Li, N. (eds.) SACMAT, pp. 133-142. ACM, New York (2008)
-
(2008)
SACMAT
, pp. 133-142
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
21
-
-
33746637552
-
An algebra for enterprise privacy policies closed under composition and conjunction
-
Muller, G. (ed.) ETRICS 2006. Springer, Heidelberg
-
Raub, D., Steinwandt, R.: An algebra for enterprise privacy policies closed under composition and conjunction. In: Muller, G. (ed.) ETRICS 2006. LNCS, vol.3995, pp. 130-144. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3995
, pp. 130-144
-
-
Raub, D.1
Steinwandt, R.2
-
22
-
-
33751063543
-
Privacy and contextual integrity: Framework and applications
-
IEEE Computer Society, Los Alamitos
-
Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: IEEE Symposium on Security and Privacy, pp. 184-198. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 184-198
-
-
Barth, A.1
Datta, A.2
Mitchell, J.C.3
Nissenbaum, H.4
-
23
-
-
34548016110
-
Privacy-aware role based access control.
-
In: Lotz, V., Thuraisingham, B.M. (eds.) ACM, New York
-
Ni, Q., Trombetta, A., Bertino, E., Lobo, J.: Privacy-aware role based access control. In: Lotz, V., Thuraisingham, B.M. (eds.) SACMAT, pp. 41-50. ACM, New York (2007)
-
(2007)
SACMAT
, pp. 41-50
-
-
Ni, Q.1
Trombetta, A.2
Bertino, E.3
Lobo, J.4
-
25
-
-
77949300720
-
D-algebra for composing access control policy decisions
-
Ni, Q., Bertino, E., Lobo, J.: D-algebra for composing access control policy decisions. In: ASIACCS (2009)
-
(2009)
ASIACCS
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
26
-
-
85076227002
-
Provenance-aware storage systems
-
Muniswamy-Reddy, K., Holland, D., Braun, U., Seltzer, M.: Provenance-aware storage systems. In: Proceedings of the 2006 USENIX Annual Technical Conference, pp. 43-56 (2006)
-
(2006)
Proceedings of the 2006 USENIX Annual Technical Conference
, pp. 43-56
-
-
Muniswamy-Reddy, K.1
Holland, D.2
Braun, U.3
Seltzer, M.4
-
27
-
-
70350054922
-
-
Workshop on Assured Information Sharing A.liated with the 2009 IEEE Intelligence and Security Informatics, ISI 2009
-
Xu, S., Ni, Q., Bertino, E., Sandhu, R.: A characterization of the problem of secure provenance management. In: Workshop on Assured Information Sharing, A.liated with the 2009 IEEE Intelligence and Security Informatics, ISI 2009 (2009)
-
A Characterization of the Problem of Secure Provenance Management
, pp. 2009
-
-
Xu, S.1
Ni, Q.2
Bertino, E.3
Sandhu, R.4
-
28
-
-
84929546370
-
Tiupam: A framework for trustworthiness-centric information sharing
-
Xu, S., Sandhu, R., Bertino, E.: Tiupam: A framework for trustworthiness-centric information sharing. In: Third IFIP WG 11.11 International Conference on Trust Management, TM 2009 (2009)
-
(2009)
Third IFIP WG 11.11 International Conference on Trust Management, TM 2009
-
-
Xu, S.1
Sandhu, R.2
Bertino, E.3
-
29
-
-
35048835357
-
Abstracting and refining authorization in sql
-
Jonker, W., Petkovic, M. (eds.) SDM 2004. Springer, Heidelberg
-
Rosenthal, A., Sciore, E.: Abstracting and refining authorization in sql. In: Jonker, W., Petkovic, M. (eds.) SDM 2004. LNCS, vol.3178, pp. 148-162. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3178
, pp. 148-162
-
-
Rosenthal, A.1
Sciore, E.2
-
30
-
-
69949149767
-
A formal framework for reffective database access control policies
-
Ning, P., Syverson, P.F., Jha, S. (eds.) ACM, New York
-
Olson, L.E., Gunter, C.A., Madhusudan, P.: A formal framework for reffective database access control policies. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 289-298. ACM, New York (2008)
-
(2008)
ACM Conference on Computer and Communications Security
, pp. 289-298
-
-
Olson, L.E.1
Gunter, C.A.2
Madhusudan, P.3
-
31
-
-
38049002527
-
Conditional privacy-aware role based access control
-
Biskup, J., Lopez, J. (eds.) ESORICS 2007. Springer, Heidelberg
-
Ni, Q., Lin, D., Bertino, E., Lobo, J.: Conditional privacy-aware role based access control. In: Biskup, J., Lopez, J. (eds.) ESORICS 2007. LNCS, vol.4734, pp. 72-89. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 72-89
-
-
Ni, Q.1
Lin, D.2
Bertino, E.3
Lobo, J.4
-
32
-
-
70349849208
-
-
Wang, J.T.L. (ed.) Wang, J.T.L. (ed.) SIGMOD 2008, SIGMOD Conference, Vancouver, BC, Canada, June 10-12, ACM, New York
-
Wang, J.T.L. (ed.): Proceedings of the ACM SIGMOD International Conference on Management of Data. In: Wang, J.T.L. (ed.) SIGMOD 2008, SIGMOD Conference, Vancouver, BC, Canada, June 10-12, ACM, New York (2008)
-
(2008)
Proceedings of the ACM SIGMOD International Conference on Management of Data
-
-
|