-
2
-
-
42449141856
-
Karma2: Provenance management for data-driven workflows
-
Y. Simmhan, B. Plale, and D. Gannon, "Karma2: Provenance Management for Data-Driven Workflows", Int'l J. Web Services Research, vol. 5, no. 2, pp. 1-22, 2008.
-
(2008)
Int'l J. Web Services Research
, vol.5
, Issue.2
, pp. 1-22
-
-
Simmhan, Y.1
Plale, B.2
Gannon, D.3
-
3
-
-
36749051012
-
Data provenance in SOA: Security, reliability, and integrity
-
W. T. Tsai, X. Wei, Y. Chen, R. A. Paul, J. Y. Chung, and D. Zhang, "Data Provenance in SOA: Security, Reliability, and Integrity", Service Oriented Computing and Applications, vol. 1, no. 4, pp. 223-247, 2007.
-
(2007)
Service Oriented Computing and Applications
, vol.1
, Issue.4
, pp. 223-247
-
-
Tsai, W.T.1
Wei, X.2
Chen, Y.3
Paul, R.A.4
Chung, J.Y.5
Zhang, D.6
-
4
-
-
31444456909
-
A survey of data provenance in E-science
-
Y. Simmhan, B. Plale, and D. Gannon, "A Survey of Data Provenance in E-Science", SIGMOD Record, vol. 34, no. 3, pp. 31-36, 2005.
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.1
Plale, B.2
Gannon, D.3
-
5
-
-
24344453002
-
Lineage retrieval for scientific data processing: A survey
-
R. Bose and J. Frew, "Lineage Retrieval for Scientific Data Processing: A Survey", ACM Computer Surveys, vol. 37, no. 1, pp. 1-28, 2005.
-
(2005)
ACM Computer Surveys
, vol.37
, Issue.1
, pp. 1-28
-
-
Bose, R.1
Frew, J.2
-
6
-
-
34250328839
-
The requirements of using provenance in E-science experiments
-
S. Miles, P. T. Groth, M. Branco, and L. Moreau, "The Requirements of Using Provenance in E-Science Experiments", J. Grid Computing, vol. 5, no. 1, pp. 1-25, 2007.
-
(2007)
J. Grid Computing
, vol.5
, Issue.1
, pp. 1-25
-
-
Miles, S.1
Groth, P.T.2
Branco, M.3
Moreau, L.4
-
8
-
-
0034810791
-
Separation of duties for access control enforcement in workflow environments
-
R. A. Botha and J. H. P. Eloff, "Separation of Duties for Access Control Enforcement in Workflow Environments", End-to-End Security, vol. 40, no. 3, pp. 666-682, 2001.
-
(2001)
End-to-End Security
, vol.40
, Issue.3
, pp. 666-682
-
-
Botha, R.A.1
Eloff, J.H.P.2
-
9
-
-
20144370775
-
-
White Paper wFMC-TC-1019, Workflow Management Coalition, Feb
-
"Workflow Security Considerations", White Paper wFMC-TC-1019, Workflow Management Coalition, Feb. 1998.
-
(1998)
Workflow Security Considerations
-
-
-
10
-
-
58149267780
-
RECOMBFLOW: A scientific workflow environment for intragenomic gene conversion analysis in bacterial genomes, including the pathogen streptococcus pyogenes
-
J. Alhiyafi, C. Sabesan, S. Lu, and J. L. Ram, "RECOMBFLOW: A Scientific Workflow Environment for Intragenomic Gene Conversion Analysis in Bacterial Genomes, Including the Pathogen Streptococcus Pyogenes", Int'l J. Bioinformatics Research and Applications, vol. 5, no. 1, pp. 1-19, 2009.
-
(2009)
Int'l J. Bioinformatics Research and Applications
, vol.5
, Issue.1
, pp. 1-19
-
-
Alhiyafi, J.1
Sabesan, C.2
Lu, S.3
Ram, J.L.4
-
11
-
-
51849118807
-
Supporting authentication requirements in workflows
-
R. Martinho, D. Domingos, and A. Rito-Silvas, "Supporting Authentication Requirements in Workflows", Proc. Eighth Int'l Conf. Enterprise Information Systems: Databases and Information Systems Integration, pp. 181-188, 2006.
-
(2006)
Proc. Eighth Int'l Conf. Enterprise Information Systems: Databases and Information Systems Integration
, pp. 181-188
-
-
Martinho, R.1
Domingos, D.2
Rito-Silvas, A.3
-
14
-
-
0036161253
-
Authorization and access control of application data in workflow systems
-
S. Wu, A. Sheth, J. Miller, and Z. Luo, "Authorization and Access Control of Application Data in Workflow Systems", J. Intelligent Information Systems, vol. 18, no. 1, pp. 71-94, 2002.
-
(2002)
J. Intelligent Information Systems
, vol.18
, Issue.1
, pp. 71-94
-
-
Wu, S.1
Sheth, A.2
Miller, J.3
Luo, Z.4
-
17
-
-
0033887763
-
A semantic-based execution model for multilevel secure workflows
-
V. Atluri, W. Huang, and E. Bertino, "A Semantic-Based Execution Model for Multilevel Secure Workflows", J. Computer Security, vol. 8, no. 1, pp. 3-41, 2000.
-
(2000)
J. Computer Security
, vol.8
, Issue.1
, pp. 3-41
-
-
Atluri, V.1
Huang, W.2
Bertino, E.3
-
18
-
-
0002848811
-
The specification and enforcement of authorization constraints in workflow management systems
-
E. Bertino, E. Ferrari, and V. Atluri, "The Specification and Enforcement of Authorization Constraints in Workflow Management Systems", ACM Trans. Information and System Security, vol. 2, no. 1, pp. 65-104, 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.1
, pp. 65-104
-
-
Bertino, E.1
Ferrari, E.2
Atluri, V.3
-
19
-
-
0348209180
-
W-RBAC-A workflow security model incorporating controlled overriding of constraints
-
J. Wainer, P. Barthelmess, and A. Kumar, "W-RBAC-A Workflow Security Model Incorporating Controlled Overriding of Constraints", Int'l J. Cooperative Information Systems, vol. 12, no. 4, pp. 455-485, 2003.
-
(2003)
Int'l J. Cooperative Information Systems
, vol.12
, Issue.4
, pp. 455-485
-
-
Wainer, J.1
Barthelmess, P.2
Kumar, A.3
-
20
-
-
0032664448
-
Modeling and analysis of interactions in virtual enterprises
-
H. Davulcu, M. Kifer, L. Pokorny, C. Ramakrishnan, I. Ramakrishnan, and S. Dawson, "Modeling and Analysis of Interactions in Virtual Enterprises", Proc. Ninth Int'l Workshop Research Issues on Data Eng., 1999.
-
(1999)
Proc. Ninth Int'l Workshop Research Issues on Data Eng.
-
-
Davulcu, H.1
Kifer, M.2
Pokorny, L.3
Ramakrishnan, C.4
Ramakrishnan, I.5
Dawson, S.6
-
21
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman, "Role-Based Access Control Models", Computer, vol. 29, no. 2, pp. 38-47, Feb. 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
22
-
-
0035790711
-
Access control mechanisms for inter-organizational workflow
-
M. Kang, J. Park, and J. Froscher, "Access Control Mechanisms for Inter-Organizational Workflow", Proc. Sixth ACM Symp. Access Control Models and Technologies, pp. 66-74, 2001.
-
(2001)
Proc. Sixth ACM Symp. Access Control Models and Technologies
, pp. 66-74
-
-
Kang, M.1
Park, J.2
Froscher, J.3
-
23
-
-
0033329699
-
Modelling, specifying and implementing workflow security in cyberspace
-
E. Gudes, M. Olivier, and R. Riet, "Modelling, Specifying and Implementing Workflow Security in Cyberspace", J. Computer Security, vol. 7, no. 4, pp. 287-315, 1999.
-
(1999)
J. Computer Security
, vol.7
, Issue.4
, pp. 287-315
-
-
Gudes, E.1
Olivier, M.2
Riet, R.3
-
25
-
-
84949526405
-
A prototype secure workflow server
-
D. Long, J. Baker, and F. Fung, "A Prototype Secure Workflow Server", Proc. 15th Ann. Computer Security Applications Conf., pp. 129-133, 1999.
-
(1999)
Proc. 15th Ann. Computer Security Applications Conf.
, pp. 129-133
-
-
Long, D.1
Baker, J.2
Fung, F.3
-
27
-
-
33747510016
-
Refactoring service-based systems: How to avoid trusting a workflow service
-
H. Chivers and J. McDermid, "Refactoring Service-Based Systems: How to Avoid Trusting a Workflow Service", Concurrency and Computation: Practice and Experience, vol. 18, no. 10, pp. 1255-1275, 2006.
-
(2006)
Concurrency and Computation: Practice and Experience
, vol.18
, Issue.10
, pp. 1255-1275
-
-
Chivers, H.1
McDermid, J.2
-
28
-
-
33646040949
-
Scientific workflow management and the kepler system
-
B. Ludäscher, I. Altintas, C. Berkley, D. Higgins, E. Jaeger, M. Jones, E. A. Lee, J. Tao, and Y. Zhao, "Scientific Workflow Management and the Kepler System", Concurrency and Computation: Practice and Experience, vol. 18, no. 10, pp. 1039-1065, 2006.
-
(2006)
Concurrency and Computation: Practice and Experience
, vol.18
, Issue.10
, pp. 1039-1065
-
-
Ludäscher, B.1
Altintas, I.2
Berkley, C.3
Higgins, D.4
Jaeger, E.5
Jones, M.6
Lee, E.A.7
Tao, J.8
Zhao, Y.9
-
29
-
-
33646038227
-
Taverna: Lessons in creating a workflow environment for the life sciences
-
T. M. Oinn et al., "Taverna: Lessons in Creating a Workflow Environment for the Life Sciences", Concurrency and Computation: Practice and Experience, vol. 18, no. 10, pp. 1067-1100, 2006.
-
(2006)
Concurrency and Computation: Practice and Experience
, vol.18
, Issue.10
, pp. 1067-1100
-
-
Oinn, T.M.1
-
30
-
-
33750091709
-
Managing rapidly-evolving scientific workflows
-
J. Freire, C. T. Silva, S. P. Callahan, E. Santos, C. E. Scheidegger, and H. T. Vo, "Managing Rapidly-Evolving Scientific Workflows", Proc. Int'l Provenance and Annotation Workshop (IPAW), 2006.
-
(2006)
Proc. Int'l Provenance and Annotation Workshop (IPAW)
-
-
Freire, J.1
Silva, C.T.2
Callahan, S.P.3
Santos, E.4
Scheidegger, C.E.5
Vo, H.T.6
-
31
-
-
29644434815
-
Pegasus: A framework for mapping complex scientific workflows onto distributed systems
-
E. Deelman, G. Singh, M.-H. Su, J. Blythe, Y. Gil, C. Kesselman, G. Mehta, K. Vahi, G. B. Berriman, J. Good, A. Laity, J. C. Jacob, and D. S. Katz, "Pegasus: A Framework for Mapping Complex Scientific Workflows onto Distributed Systems", Scientific Programming J., vol. 13, no. 3, pp. 219-237, 2005.
-
(2005)
Scientific Programming J.
, vol.13
, Issue.3
, pp. 219-237
-
-
Deelman, E.1
Singh, G.2
Su, M.-H.3
Blythe, J.4
Gil, Y.5
Kesselman, C.6
Mehta, G.7
Vahi, K.8
Berriman, G.B.9
Good, J.10
Laity, A.11
Jacob, J.C.12
Katz, D.S.13
-
32
-
-
42449163370
-
Swift: Fast, reliable, loosely coupled parallel computation
-
Y. Zhao, M. Hategan, B. Clifford, I. Foster, G. von Laszewski, I. Raicu, T. Stef-Praun, and M. Wilde, "Swift: Fast, Reliable, Loosely Coupled Parallel Computation", Proc. Int'l Workshop Scientific Workflows (SWF) in conjunction with Int'l Conf. Services Computing (SCC), 2007.
-
(2007)
Proc. Int'l Workshop Scientific Workflows (SWF) in Conjunction with Int'l Conf. Services Computing (SCC)
-
-
Zhao, Y.1
Hategan, M.2
Clifford, B.3
Foster, I.4
Von Laszewski, G.5
Raicu, I.6
Stef-Praun, T.7
Wilde, M.8
-
34
-
-
34547521213
-
Security issues in a SOA-based provenance system
-
V. Tan, P. Groth, S. Miles, S. Jiang, S. Munroe, S. Tsasakou, and L. Moreau, "Security Issues in a SOA-Based Provenance System", Proc. Third Int'l Provenance and Annotation Workshop, 2006.
-
(2006)
Proc. Third Int'l Provenance and Annotation Workshop
-
-
Tan, V.1
Groth, P.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
35
-
-
33750035572
-
A security model for provenance
-
Harvard Univ., Jan
-
U. Braun and A. Shinna, "A Security Model for Provenance", Technical Report TR-04-06, Harvard Univ., Jan. 2006.
-
(2006)
Technical Report TR-04-06
-
-
Braun, U.1
Shinna, A.2
-
36
-
-
57149126952
-
Provenance and scientific workflows: Challenges and opportunities
-
S. B. Davidson and J. Freire, "Provenance and Scientific Workflows: Challenges and Opportunities", Proc. SIGMOD, pp. 1345-1350, 2008.
-
(2008)
Proc. SIGMOD
, pp. 1345-1350
-
-
Davidson, S.B.1
Freire, J.2
-
37
-
-
85131841064
-
Inheritance of interorganizational workflows: How to agree or disagree without loosing control?
-
W. van der Aalst, "Inheritance of Interorganizational Workflows: How to Agree or Disagree without Loosing Control?" Information Technology and Management J., vol. 2, no. 3, pp. 195-231, 2002.
-
(2002)
Information Technology and Management J.
, vol.2
, Issue.3
, pp. 195-231
-
-
Van Der Aalst, W.1
-
38
-
-
74049155851
-
A task abstraction and mapping approach to the shimming problem in scientific workflows
-
C. Lin, S. Lu, X. Fei, D. Pai, and J. Hua, "A Task Abstraction and Mapping Approach to the Shimming Problem in Scientific Workflows", Proc. Int'l Conf. Services Computing (SCC), pp. 284-291, 2009.
-
(2009)
Proc. Int'l Conf. Services Computing (SCC)
, pp. 284-291
-
-
Lin, C.1
Lu, S.2
Fei, X.3
Pai, D.4
Hua, J.5
-
39
-
-
70449467019
-
Service provenance in QoS-aware web service runtimes
-
A. Michlmayr, F. Rosenberg, P. Leitner, and S. Dustdar, "Service Provenance in QoS-Aware Web Service Runtimes", Proc. Int'l Conf. Web Services (ICWS), pp. 115-122, 2009.
-
(2009)
Proc. Int'l Conf. Web Services (ICWS)
, pp. 115-122
-
-
Michlmayr, A.1
Rosenberg, F.2
Leitner, P.3
Dustdar, S.4
-
40
-
-
44949166942
-
Service provenance based abstraction of grid application knowledge
-
K. Xu, Y. Wang, and C. Wu, "Service Provenance Based Abstraction of Grid Application Knowledge", Proc. Second Int'l Conf. Semantics, Knowledge, and Grid, pp. 50-53, 2006.
-
(2006)
Proc. Second Int'l Conf. Semantics, Knowledge, and Grid
, pp. 50-53
-
-
Xu, K.1
Wang, Y.2
Wu, C.3
-
41
-
-
62249091004
-
A model of process documentation to determine provenance in mash-ups
-
P. T. Groth, S. Miles, and L. Moreau, "A Model of Process Documentation to Determine Provenance in Mash-Ups", ACM Trans. Internet Technology, vol. 9, no. 1, 2009.
-
(2009)
ACM Trans. Internet Technology
, vol.9
, Issue.1
-
-
Groth, P.T.1
Miles, S.2
Moreau, L.3
-
42
-
-
78650023837
-
-
Provenance Aware Service Oriented Architecture PASOA Project
-
Provenance Aware Service Oriented Architecture (PASOA) Project, http://www.pasoa.org, 2010.
-
(2010)
-
-
-
43
-
-
34547548356
-
A new SOA data-provenance framework
-
W. T. Tsai, X. Wei, D. Zhang, R. Paul, Y. Chen, and J. Y. Chung, "A New SOA Data-Provenance Framework", Proc. Eighth Int'l Symp. Autonomous Decentralized Systems, pp. 105-112, 2007.
-
(2007)
Proc. Eighth Int'l Symp. Autonomous Decentralized Systems
, pp. 105-112
-
-
Tsai, W.T.1
Wei, X.2
Zhang, D.3
Paul, R.4
Chen, Y.5
Chung, J.Y.6
-
44
-
-
50649093804
-
Provenance services for distributed workflows
-
S. M. S. Cruz, P. M. Barros, P. M. Bisch, M. L. M. Campos, and M. Mattoso, "Provenance Services for Distributed Workflows", Proc. Int'l Symp. Cluster Computing and the Grid (CCGRID), pp. 526-533, 2008.
-
(2008)
Proc. Int'l Symp. Cluster Computing and the Grid (CCGRID)
, pp. 526-533
-
-
Cruz, S.M.S.1
Barros, P.M.2
Bisch, P.M.3
Campos, M.L.M.4
Mattoso, M.5
-
45
-
-
70449497792
-
A reference architecture for scientific workflow management systems and the VIEW SOA solution
-
Jan.-Mar
-
C. Lin, S. Lu, X. Fei, A. Chebotko, D. Pai, Z. Lai, F. Fotouhi, and J. Hua, "A Reference Architecture for Scientific Workflow Management Systems and the VIEW SOA Solution", IEEE Trans. Services Computing, vol. 2, no. 1, pp. 79-92, Jan.-Mar. 2009.
-
(2009)
IEEE Trans. Services Computing
, vol.2
, Issue.1
, pp. 79-92
-
-
Lin, C.1
Lu, S.2
Fei, X.3
Chebotko, A.4
Pai, D.5
Lai, Z.6
Fotouhi, F.7
Hua, J.8
-
46
-
-
27544469742
-
Recording and using provenance in a protein compressibility experiment
-
P. Groth, S. Miles, W. Fang, S. C. Wong, K.-P. Zauner, and L. Moreau, "Recording and Using Provenance in a Protein Compressibility Experiment", Proc. Int'l Symp. High Performance Distributed Computing (HPDC), 2005.
-
(2005)
Proc. Int'l Symp. High Performance Distributed Computing (HPDC)
-
-
Groth, P.1
Miles, S.2
Fang, W.3
Wong, S.C.4
Zauner, K.-P.5
Moreau, L.6
-
47
-
-
33750036770
-
An architecture for provenance systems executive summary
-
Univ. of Southampton, Feb
-
P. Groth, S. Jiang, S. Miles, S. Munroe, V. Tan, S. Tsasakou, and L. Moreau, "An Architecture for Provenance Systems Executive Summary", technical report, Univ. of Southampton, Feb. 2006.
-
(2006)
Technical Report
-
-
Groth, P.1
Jiang, S.2
Miles, S.3
Munroe, S.4
Tan, V.5
Tsasakou, S.6
Moreau, L.7
-
48
-
-
77955270559
-
RDFProv: A relational RDF store for querying and managing scientific workflow provenance
-
to be published in
-
A. Chebotko, S. Lu, X. Fei, and F. Fotouhi, "RDFProv: A Relational RDF Store for Querying and Managing Scientific Workflow Provenance", to be published in Data and Knowledge Eng., vol. 69, no. 8, pp. 836-865, 2010.
-
(2010)
Data and Knowledge Eng.
, vol.69
, Issue.8
, pp. 836-865
-
-
Chebotko, A.1
Lu, S.2
Fei, X.3
Fotouhi, F.4
-
49
-
-
78649995565
-
-
Open Provenance Model
-
Open Provenance Model, http://openprovenance.org, 2010.
-
(2010)
-
-
-
50
-
-
52649110562
-
Querying and managing provenance through user views in scientific workflows
-
O. Biton, S. Cohen-Boulakia, S. Davidson, and C. Hara, "Querying and Managing Provenance through User Views in Scientific Workflows", Proc. 24th IEEE Int'l Conf. Data Eng. (ICDE), pp. 1072-1081, 2008.
-
(2008)
Proc. 24th IEEE Int'l Conf. Data Eng. (ICDE)
, pp. 1072-1081
-
-
Biton, O.1
Cohen-Boulakia, S.2
Davidson, S.3
Hara, C.4
-
51
-
-
70349092258
-
Optimizing user views for workflows
-
O. Biton, S. B. Davidson, S. Khanna, and S. Roy, "Optimizing User Views for Workflows", Proc. 12th Int'l Conf. Database Theory (ICDT), pp. 310-323, 2009.
-
(2009)
Proc. 12th Int'l Conf. Database Theory (ICDT)
, pp. 310-323
-
-
Biton, O.1
Davidson, S.B.2
Khanna, S.3
Roy, S.4
-
54
-
-
51849083449
-
Scientific workflow provenance querying with security views
-
A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang, "Scientific Workflow Provenance Querying with Security Views", Proc. Int'l Conf. Web-Age Information Management, pp. 349-356, 2008.
-
(2008)
Proc. Int'l Conf. Web-Age Information Management
, pp. 349-356
-
-
Chebotko, A.1
Chang, S.2
Lu, S.3
Fotouhi, F.4
Yang, P.5
-
57
-
-
3142510989
-
Administrative scope: A foundation for role-based administrative models
-
J. Crampton and G. Loizou, "Administrative Scope: A Foundation for Role-Based Administrative Models", ACM Trans. Information and System Security, vol. 6, no. 2, pp. 201-231, 2003.
-
(2003)
ACM Trans. Information and System Security
, vol.6
, Issue.2
, pp. 201-231
-
-
Crampton, J.1
Loizou, G.2
-
58
-
-
78649991873
-
-
SecProv
-
SecProv, http://www.cs.panam.edu/~artem/SecProv. zip, 2010.
-
(2010)
-
-
-
59
-
-
46849121607
-
Guarding sensitive information streams through the jungle of composite web services
-
J. Wei, L. Singaravelu, and C. Pu, "Guarding Sensitive Information Streams through the Jungle of Composite Web Services", Proc. Int'l Conf. Web Services (ICWS), pp. 455-462, 2007.
-
(2007)
Proc. Int'l Conf. Web Services (ICWS)
, pp. 455-462
-
-
Wei, J.1
Singaravelu, L.2
Pu, C.3
-
60
-
-
25144443371
-
Workflow data patterns
-
Queensland Univ. of Technology
-
N. Russell, A. ter Hofstede, D. Edmond, and W. van der Aalst, "Workflow Data Patterns", Technical Report FIT-TR-2004-01, Queensland Univ. of Technology, 2004.
-
(2004)
Technical Report FIT-TR-2004-01
-
-
Russell, N.1
Hofstede, A.T.2
Edmond, D.3
Van Der Aalst, W.4
-
61
-
-
85001697848
-
A fine-grained access control system for XML documents
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati, "A Fine-Grained Access Control System for XML Documents", ACM Trans. Information and System Security, vol. 5, no. 2, pp. 169-202, 2002.
-
(2002)
ACM Trans. Information and System Security
, vol.5
, Issue.2
, pp. 169-202
-
-
Damiani, E.1
De Di Capitani, S.V.2
Paraboschi, S.3
Samarati, P.4
|