-
2
-
-
85135991839
-
Auditing compliance with a hippocratic database
-
Agrawal, R., Bayardo, R., Faloutsos, C., Kiernan, J., Rantzau, R., Srikant, R.: Auditing compliance with a hippocratic database. In: VLDB (2004)
-
(2004)
VLDB
-
-
Agrawal, R.1
Bayardo, R.2
Faloutsos, C.3
Kiernan, J.4
Rantzau, R.5
Srikant, R.6
-
3
-
-
85117254510
-
Applying chimera virtual data concepts to cluster finding in the sloan sky survey
-
Annis, J., Zhao, Y., V̈ockler, J.-S., Wilde, M., Kent, S., Foster, I.: Applying chimera virtual data concepts to cluster finding in the sloan sky survey. In: Proceedings of the ACM / IEEE Conference on Supercomputing (2002)
-
(2002)
Proceedings of the ACM / IEEE Conference on Supercomputing
-
-
Annis, J.1
Zhao, Y.2
V̈ockler, J.-S.3
Wilde, M.4
Kent, S.5
Foster, I.6
-
4
-
-
84925001453
-
ULDBs: Databases with uncertainty and lineage
-
Benjelloun, O., Das Sarma, A., Halevy, A., Widom, J.: ULDBs: Databases with uncertainty and lineage. In: VLDB (2006)
-
(2006)
VLDB
-
-
Benjelloun, O.1
Das Sarma, A.2
Halevy, A.3
Widom, J.4
-
5
-
-
33646514159
-
An annotation management system for relational databases
-
Bhagwat, D., Chiticariu, L., Tan,W.-C., Vijayvargiya, G.: An annotation management system for relational databases. In: VLDB (2004)
-
(2004)
VLDB
-
-
Bhagwat, D.1
Chiticariu, L.2
Tan, W.-C.3
Vijayvargiya, G.4
-
8
-
-
84878730909
-
On the expressiveness of implicit provenance in query and update languages
-
Schwentick, T., Suciu, D. (eds.) ICDT 2007. Springer, Heidelberg
-
Buneman, P., Cheney, J., Vansummeren, S.: On the expressiveness of implicit provenance in query and update languages. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol.4353, pp. 209-223. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4353
, pp. 209-223
-
-
Buneman, P.1
Cheney, J.2
Vansummeren, S.3
-
9
-
-
79960570447
-
What and where: A characterization of data provenance
-
Buneman, P., Khanna, S., Tan, W.-C.: What and where: A characterization of data provenance. LNCS (2001)
-
(2001)
LNCS
-
-
Buneman, P.1
Khanna, S.2
Tan, W.-C.3
-
10
-
-
34250671203
-
VisTrails: Visualization meets data management
-
Callahan, S.P., Freire, J., Santos, E., Scheidegger, C.E., Silvaand, C.T., Vo, H.T.: VisTrails: Visualization meets data management. In: ACM SIGMOD (2006)
-
(2006)
ACM SIGMOD
-
-
Callahan, S.P.1
Freire, J.2
Santos, E.3
Scheidegger, C.E.4
Silvaand, C.T.5
Vo, H.T.6
-
12
-
-
51849083449
-
Scientific workflow provenance querying with security views
-
Chebotko, A., Chang, S., Lu, S., Fotouhi, F., Yang, P.: Scientific workflow provenance querying with security views. In: WAIM (2008)
-
(2008)
WAIM
-
-
Chebotko, A.1
Chang, S.2
Lu, S.3
Fotouhi, F.4
Yang, P.5
-
13
-
-
47249132159
-
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects
-
Drossopoulou, S. (ed.) ESOP 2008. Springer, Heidelberg
-
Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects. In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, vol.4960, pp. 208-223. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4960
, pp. 208-223
-
-
Cirillo, A.1
Jagadeesan, R.2
Pitcher, C.3
Riely, J.4
-
14
-
-
48249115881
-
Provenance in scientific workflow systems
-
Davidson, S., Cohen-Boulakia, S., Eyal, A., Ludascher, B.,McPhillips, T., Bowers, S., Freire, J.: Provenance in scientific workflow systems. IEEE Data Engineering Bulletin 32(4) (2007)
-
(2007)
IEEE Data Engineering Bulletin
, vol.32
, pp. 4
-
-
Davidson, S.1
Cohen-Boulakia, S.2
Eyal, A.3
Ludascher, B.4
McPhillips, T.5
Bowers, S.6
Freire, J.7
-
15
-
-
27844601582
-
Flexible authentication of XML documents
-
Devanbu, P., Gertz, M., Kwong, A., Martel, C., Nuckolls, G., Stubblebine, S.: Flexible authentication of XML documents. Journal of Computer Security 12(6) (2004)
-
(2004)
Journal of Computer Security
, vol.12
, pp. 6
-
-
Devanbu, P.1
Gertz, M.2
Kwong, A.3
Martel, C.4
Nuckolls, G.5
Stubblebine, S.6
-
16
-
-
33749382489
-
Authentic third-party data publication
-
Devanbu, P., Gertz, M., Martel, C., Stubblebine, S.: Authentic third-party data publication. In: Proceedings of the IFIP 11.3 Workshop on Database Security (2000)
-
(2000)
Proceedings of the IFIP 11.3 Workshop on Database Security
-
-
Devanbu, P.1
Gertz, M.2
Martel, C.3
Stubblebine, S.4
-
17
-
-
84948706138
-
Chimera: A virtual data system for representing, querying, and automating data derivation
-
July
-
Foster, I., Vockler, J., Eilde, M., Zhao, Y.: Chimera: A virtual data system for representing, querying, and automating data derivation. In: SSDBM (July 2002)
-
(2002)
SSDBM
-
-
Foster, I.1
Vockler, J.2
Eilde, M.3
Zhao, Y.4
-
18
-
-
41149178153
-
Automatic capture and reconstruction of computational provenance
-
Frew, J., Metzger, D., Slaughter, P.: Automatic capture and reconstruction of computational provenance. Concurr. Comput.: Pract. Exper. 20(5), 485-496 (2008)
-
(2008)
Concurr. Comput.: Pract. Exper.
, vol.20
, Issue.5
, pp. 485-496
-
-
Frew, J.1
Metzger, D.2
Slaughter, P.3
-
19
-
-
27544469742
-
Recording and using provenance in a protein compressibility experiment
-
Groth, P., Miles, S., Fang, W., Wong, S., Zauner, K.-P., Moreau, L.: Recording and using provenance in a protein compressibility experiment. In: IEEE International Symposium on High Performance Distributed Computing (2005)
-
(2005)
IEEE International Symposium on High Performance Distributed Computing
-
-
Groth, P.1
Miles, S.2
Fang, W.3
Wong, S.4
Zauner, K.-P.5
Moreau, L.6
-
22
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
Hasan, R., Sion, R., Winslett, M.: The case of the fake picasso: Preventing history forgery with secure provenance. In: FAST (2009)
-
(2009)
FAST
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
23
-
-
33750054098
-
Implementing a Secure Annotation Service
-
Moreau, L., Foster, I. (eds.) IPAW 2006. Springer, Heidelberg
-
Khan, I., Schroeter, R., Hunter, J.: Implementing a Secure Annotation Service. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.4145, pp. 212-221. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4145
, pp. 212-221
-
-
Khan, I.1
Schroeter, R.2
Hunter, J.3
-
24
-
-
34250630995
-
Dynamic authenticated index structures for outsourced databases
-
Li, F., Hadjieleftheriou, M., Kollios, G., Reyzin, L.: Dynamic authenticated index structures for outsourced databases. In: ACM SIGMOD (2006)
-
(2006)
ACM SIGMOD
-
-
Li, F.1
Hadjieleftheriou, M.2
Kollios, G.3
Reyzin, L.4
-
26
-
-
33744910535
-
Managing integrity for data exchanged on the web
-
Miklau, G., Suciu, D.:Managing integrity for data exchanged on the web. In:WebDB (2005)
-
(2005)
WebDB
-
-
Miklau, G.1
Suciu, D.2
-
27
-
-
85076227002
-
Provenance-aware storage systems
-
Muniswamy-Reddy, K., Holland, D., Braun, U., Seltzer, M.: Provenance-aware storage systems. In: USENIX (2006)
-
(2006)
USENIX
-
-
Muniswamy-Reddy, K.1
Holland, D.2
Braun, U.3
Seltzer, M.4
-
28
-
-
85084162561
-
Certificate revocation and certificate update
-
Naor, M., Nissim, K.: Certificate revocation and certificate update. In: USENIX (1998)
-
(1998)
USENIX
-
-
Naor, M.1
Nissim, K.2
-
29
-
-
33646038227
-
Taverna: Lessons in creating a workflow environment for the life sciences: Research articles
-
Oinn, T., Greenwood, M., Addis, M., Alpdemir, M.N., Ferris, J., Glover, K., Goble, C., Goderis, A., Hull, D., Marvin, D., Li, P., Lord, P., Pocock, M.R., Senger, M., Stevens, R., Wipat, A., Wroe, C.: Taverna: lessons in creating a workflow environment for the life sciences: Research articles. Concurr. Comput.: Pract. Exper. 18(10) (2006)
-
(2006)
Concurr. Comput.: Pract. Exper.
, vol.18
, pp. 10
-
-
Oinn, T.1
Greenwood, M.2
Addis, M.3
Alpdemir, M.N.4
Ferris, J.5
Glover, K.6
Goble, C.7
Goderis, A.8
Hull, D.9
Marvin, D.10
Li, P.11
Lord, P.12
Pocock, M.R.13
Senger, M.14
Stevens, R.15
Wipat, A.16
Wroe, C.17
-
30
-
-
50649104772
-
-
Open provenance model (2008), http://twikiflipaw.info/bin/view/Challenge/ OPM
-
(2008)
Open Provenance Model
-
-
-
31
-
-
29844457793
-
Verifying completeness of relational query results in data publishing
-
Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: ACM SIGMOD (2005)
-
(2005)
ACM SIGMOD
-
-
Pang, H.1
Jain, A.2
Ramamritham, K.3
Tan, K.4
-
32
-
-
84862396472
-
Electronic Commerce with Verifiable Audit Trails
-
Peha, J.M.: Electronic commerce with verifiable audit trails. In: Internet Society (1999)
-
(1999)
Internet Society
-
-
Peha, J.M.1
-
34
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2) (1978)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
35
-
-
85094805734
-
Scalable access controls for lineage
-
Rosenthal, A., Seligman, L., Chapman, A., Blaustein, B.: Scalable access controls for lineage. In: Workshop on the Theory and Practice of Provenance (2009)
-
(2009)
Workshop on the Theory and Practice of Provenance
-
-
Rosenthal, A.1
Seligman, L.2
Chapman, A.3
Blaustein, B.4
-
38
-
-
33750087260
-
Security Issues in a SOA-Based Provenance System
-
Moreau, L., Foster, I. (eds.) IPAW 2006. Springer, Heidelberg
-
Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security Issues in a SOA-Based Provenance System. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.4145, pp. 203-211. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4145
, pp. 203-211
-
-
Tan, V.1
Groth, P.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
39
-
-
36749051012
-
Data provenance in SOA: Security, reliability, and integrity
-
Tsai,W.T.,Wei, X., Chen, Y., Paul, R., Chung, J.-Y., Zhang, D.: Data provenance in SOA: security, reliability, and integrity. Journal Service Oriented Computing and Applications (2007)
-
(2007)
Journal Service Oriented Computing and Applications
-
-
Tsai, W.T.1
Wei, X.2
Chen, Y.3
Paul, R.4
Chung, J.-Y.5
Zhang, D.6
|