메뉴 건너뛰기




Volumn , Issue , 2011, Pages 3-10

On provenance and privacy

Author keywords

Privacy; Provenance; Scientific workflows

Indexed keywords

QUERY PROCESSING;

EID: 79952335883     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1938551.1938554     Document Type: Conference Paper
Times cited : (50)

References (41)
  • 4
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • DOI 10.1145/1242572.1242598, 16th International World Wide Web Conference, WWW2007
    • L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007. (Pubitemid 47591590)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 181-190
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 6
    • 85001786260 scopus 로고    scopus 로고
    • Secure and selective dissemination of XML documents
    • E. Bertino and E. Ferrari. Secure and selective dissemination of XML documents. ACM Trans. Inf. Syst. Secur., 5(3):290-331, 2002.
    • (2002) ACM Trans. Inf. Syst. Secur. , vol.5 , Issue.3 , pp. 290-331
    • Bertino, E.1    Ferrari, E.2
  • 7
    • 52649110562 scopus 로고    scopus 로고
    • Querying and managing provenance through user views in scientific workflows
    • O. Biton, S. C. Boulakia, S. B. Davidson, and C. S. Hara. Querying and managing provenance through user views in scientific workflows. In ICDE, pages 1072-1081, 2008.
    • (2008) ICDE , pp. 1072-1081
    • Biton, O.1    Boulakia, S.C.2    Davidson, S.B.3    Hara, C.S.4
  • 11
    • 51849083449 scopus 로고    scopus 로고
    • Scientific workflow provenance querying with security views
    • July
    • A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang. Scientific workflow provenance querying with security views. WAIM, pages 349-356, July 2008.
    • (2008) WAIM , pp. 349-356
    • Chebotko, A.1    Chang, S.2    Lu, S.3    Fotouhi, F.4    Yang, P.5
  • 17
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
    • (2008) TAMC , pp. 1-19
    • Dwork, C.1
  • 18
    • 70350645515 scopus 로고    scopus 로고
    • The differential privacy frontier (extended abstract)
    • C. Dwork. The differential privacy frontier (extended abstract). In TCC, pages 496-502, 2009.
    • (2009) TCC , pp. 496-502
    • Dwork, C.1
  • 23
    • 62749161358 scopus 로고    scopus 로고
    • Introducing secure provenance: Problems and challenges
    • New York, NY, USA ACM
    • R. Hasan, R. Sion, and M. Winslett. Introducing secure provenance: problems and challenges. In StorageSS '07, pages 13-18, New York, NY, USA, 2007. ACM.
    • (2007) StorageSS '07 , pp. 13-18
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 25
    • 35448950542 scopus 로고    scopus 로고
    • Identifying meaningful return information for XML keyword search
    • Z. Liu and Y. Chen. Identifying Meaningful Return Information for XML Keyword Search. In SIGMOD, 2007.
    • (2007) SIGMOD
    • Liu, Z.1    Chen, Y.2
  • 26
    • 79952322120 scopus 로고    scopus 로고
    • Searching workflows with hierarchical views
    • Z. Liu, Q. Shao, and Y. Chen. Searching workflows with hierarchical views. PVLDB, 3(1), 2010.
    • (2010) PVLDB , vol.3 , Issue.1
    • Liu, Z.1    Shao, Q.2    Chen, Y.3
  • 29
    • 3142686877 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, 2004.
    • (2004) SIGMOD
    • Miklau, G.1    Suciu, D.2
  • 31
    • 52649162862 scopus 로고    scopus 로고
    • Auditing SQL queries
    • R. Motwani, S. U. Nabar, and D. Thomas. Auditing SQL queries. In ICDE, pages 287-296, 2008.
    • (2008) ICDE , pp. 287-296
    • Motwani, R.1    Nabar, S.U.2    Thomas, D.3
  • 32
    • 85169252862 scopus 로고    scopus 로고
    • myExperiment. http://www.myexperiment.org/workflows.
  • 35
    • 70350635777 scopus 로고    scopus 로고
    • Relationship privacy: Output perturbation for queries with joins
    • V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
    • (2009) PODS , pp. 107-116
    • Rastogi, V.1    Hay, M.2    Miklau, G.3    Suciu, D.4
  • 36
    • 77953220843 scopus 로고    scopus 로고
    • Privacy by design: Moving from art to practice
    • S. S. Shapiro. Privacy by design: moving from art to practice. Commun. ACM, 53(6):27-29, 2010.
    • (2010) Commun. ACM , vol.53 , Issue.6 , pp. 27-29
    • Shapiro, S.S.1
  • 37
    • 38849089496 scopus 로고    scopus 로고
    • MutaGeneSys: Estimating individual disease susceptibility based on genome-wide SNP array data
    • DOI 10.1093/bioinformatics/btm587
    • J. Stoyanovich and I. Pe'er. MutaGeneSys: estimating individual disease susceptibility based on genome-wide SNP array data. Bioinformatics, 24(3):440-442, 2008. (Pubitemid 351189027)
    • (2008) Bioinformatics , vol.24 , Issue.3 , pp. 440-442
    • Stoyanovich, J.1    Pe'er, I.2
  • 40
    • 79951848895 scopus 로고    scopus 로고
    • The triana workflow environment: Architecture and applications
    • I. Taylor, E. Deelman, D. Gannon, and M. Shields, editors Springer, New York
    • I. Taylor, M. Shields, I. Wang, and A. Harrison. The Triana Workflow Environment: Architecture and Applications. In I. Taylor, E. Deelman, D. Gannon, and M. Shields, editors, Workflows for e-Science, pages 320-339. Springer, New York, 2007.
    • (2007) Workflows for E-science , pp. 320-339
    • Taylor, I.1    Shields, M.2    Wang, I.3    Harrison, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.