메뉴 건너뛰기




Volumn 6166 LNCS, Issue , 2010, Pages 311-318

Preserving integrity and confidentiality of a directed acyclic graph model of provenance

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL MODELS; CAUSAL RELATIONSHIPS; DIGITAL SIGNATURE; DIRECTED ACYCLIC GRAPH MODEL; DIRECTED ACYCLIC GRAPHS; PATH-BASED; DIRECTED ACYCLIC GRAPH (DAG);

EID: 77958511723     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-13739-6_22     Document Type: Conference Paper
Times cited : (17)

References (13)
  • 2
    • 79960570447 scopus 로고    scopus 로고
    • Why and where: A characterization of data provenance
    • Van den Bussche, J., Vianu, V. eds., Springer, Heidelberg, ICDT 2001
    • Buneman, P., Khanna, S., Tan, W. C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol. 1973, pp. 316-330. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1973 , pp. 316-330
    • Buneman, P.1    Khanna, S.2    Tan, W.C.3
  • 3
    • 73849140516 scopus 로고    scopus 로고
    • Preventing history forgery with secure provenance
    • 1-12:, 43
    • Hasan, R., Sion, R., Winslett, M.: Preventing history forgery with secure provenance. ACM Transactions on Storage 5(4), 12:1-12:43 (2009)
    • (2009) ACM Transactions on Storage , vol.5 , Issue.4 , pp. 12
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 4
    • 85062006160 scopus 로고    scopus 로고
    • The case of the fake picasso: Preventing history forgery with secure provenance
    • Degano, P., Guttman, J., Martinelli, F. eds., Springer, Heidelberg, FAST 2008
    • Hasan, R., Sion, R., Winslett, M.: The case of the fake picasso: Preventing history forgery with secure provenance. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol. 5491, pp. 1-14. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5491 , pp. 1-14
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 5
    • 26444443460 scopus 로고    scopus 로고
    • A protocol for recording provenance in serviceoriented grids
    • Higashino, T. ed., Springer, Heidelberg, OPODIS 2004
    • Groth, P., Luck, M., Moreau, L.: A protocol for recording provenance in serviceoriented grids. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol. 3544, pp. 124-139. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3544 , pp. 124-139
    • Groth, P.1    Luck, M.2    Moreau, L.3
  • 6
    • 84961817130 scopus 로고    scopus 로고
    • The open provenance model: An overview
    • Freire, J., Koop, D., Moreau, L. eds., Springer, Heidelberg, IPAW 2008
    • Moreau, L., Freire, J., Futrelle, J., McGrath, R. E., Myers, J., Paulson, P.: The open provenance model: An overview. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol. 5272, pp. 323-326. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5272 , pp. 323-326
    • Moreau, L.1    Freire, J.2    Futrelle, J.3    McGrath, R.E.4    Myers, J.5    Paulson, P.6
  • 9
    • 62749161358 scopus 로고    scopus 로고
    • Introducing secure provenance: Problems and challenges
    • Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: StorageSS, pp. 13-18 (2007)
    • (2007) StorageSS , pp. 13-18
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 10
    • 33750035572 scopus 로고    scopus 로고
    • A security model for provenance
    • Harvard University
    • Braun, U., Shinnar, A.: A security model for provenance. Technical report, Harvard University (2006)
    • (2006) Technical Report
    • Braun, U.1    Shinnar, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.