메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Privacy issues in scientific workflow provenance

Author keywords

[No Author keywords available]

Indexed keywords

DATA PRIVACY;

EID: 77955910343     PISSN: 07308078     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1833398.1833401     Document Type: Conference Paper
Times cited : (8)

References (28)
  • 2
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • N. R. Adam and J. C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Comput. Surv., 21(4):515-556, 1989.
    • (1989) ACM Comput. Surv. , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.R.1    Worthmann, J.C.2
  • 4
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007.
    • (2007) WWW , pp. 181-190
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.M.3
  • 5
    • 52649110562 scopus 로고    scopus 로고
    • Querying and managing provenance through user views in scientific workflows
    • O. Biton, S. Cohen-Boulakia, S. Davidson, and C. Hara. Querying and managing provenance through user views in scientific workflows. In ICDE, 2008.
    • (2008) ICDE
    • Biton, O.1    Cohen-Boulakia, S.2    Davidson, S.3    Hara, C.4
  • 6
    • 70349092258 scopus 로고    scopus 로고
    • Optimizing user views for workflows
    • O. Biton, S. B. Davidson, S. Khanna, and S. Roy. Optimizing user views for workflows. In ICDT, pages 310-323, 2009.
    • (2009) ICDT , pp. 310-323
    • Biton, O.1    Davidson, S.B.2    Khanna, S.3    Roy, S.4
  • 7
    • 33646188319 scopus 로고    scopus 로고
    • Actor-oriented design of scientific workflows
    • S. Bowers and B. Ludäscher. Actor-oriented design of scientific workflows. In ER, 2005.
    • (2005) ER
    • Bowers, S.1    Ludäscher, B.2
  • 9
    • 67650683099 scopus 로고    scopus 로고
    • A clustering approach for data and structural anonymity in social networks
    • A. Campan and T. M. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, 2008.
    • (2008) PinKDD
    • Campan, A.1    Truta, T.M.2
  • 10
    • 51849083449 scopus 로고    scopus 로고
    • Scientific workflow provenance querying with security views
    • July
    • A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang. Scientific workflow provenance querying with security views. WAIM, pages 349-356, July 2008.
    • (2008) WAIM , pp. 349-356
    • Chebotko, A.1    Chang, S.2    Lu, S.3    Fotouhi, F.4    Yang, P.5
  • 11
    • 79952323179 scopus 로고    scopus 로고
    • Preserving module privacy in workflow provenance
    • Dept. of Computer and Information Science, University of Pennsylvania, May
    • S. B. Davidson, S. Khanna, D. Panigrahi, and S. Roy. Preserving module privacy in workflow provenance. Technical Report MS-CIS-10-22, Dept. of Computer and Information Science, University of Pennsylvania, May 2010.
    • (2010) Technical Report MS-CIS-10-22
    • Davidson, S.B.1    Khanna, S.2    Panigrahi, D.3    Roy, S.4
  • 12
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • New York, NY, USA ACM
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, New York, NY, USA, 2003. ACM.
    • (2003) PODS , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 13
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
    • (2008) TAMC , pp. 1-19
    • Dwork, C.1
  • 14
    • 70350645515 scopus 로고    scopus 로고
    • The differential privacy frontier (extended abstract)
    • C. Dwork. The differential privacy frontier (extended abstract). In TCC, pages 496-502, 2009.
    • (2009) TCC , pp. 496-502
    • Dwork, C.1
  • 18
    • 62749161358 scopus 로고    scopus 로고
    • Introducing secure provenance: Problems and challenges
    • New York, NY, USA ACM
    • R. Hasan, R. Sion, and M. Winslett. Introducing secure provenance: problems and challenges. In StorageSS, pages 13-18, New York, NY, USA, 2007. ACM.
    • (2007) StorageSS , pp. 13-18
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 19
    • 70349248583 scopus 로고    scopus 로고
    • Link privacy in social networks
    • New York, NY, USA ACM
    • A. Korolova, R. Motwani, S. U. Nabar, and Y. Xu. Link privacy in social networks. In CIKM, pages 289-298, New York, NY, USA, 2008. ACM.
    • (2008) CIKM , pp. 289-298
    • Korolova, A.1    Motwani, R.2    Nabar, S.U.3    Xu, Y.4
  • 22
    • 52649162862 scopus 로고    scopus 로고
    • Auditing sql queries
    • R. Motwani, S. U. Nabar, and D. Thomas. Auditing sql queries. In ICDE, pages 287-296, 2008.
    • (2008) ICDE , pp. 287-296
    • Motwani, R.1    Nabar, S.U.2    Thomas, D.3
  • 23
  • 24
    • 10244255212 scopus 로고    scopus 로고
    • Taverna: A tool for the composition and enactment of bioinformatics workflows
    • T. Oinn et al. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(1), 2003.
    • (2003) Bioinformatics , vol.20 , Issue.1
    • Oinn, T.1
  • 25
    • 70350635777 scopus 로고    scopus 로고
    • Relationship privacy: Output perturbation for queries with joins
    • V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
    • (2009) PODS , pp. 107-116
    • Rastogi, V.1    Hay, M.2    Miklau, G.3    Suciu, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.