메뉴 건너뛰기




Volumn , Issue , 2011, Pages 175-186

Provenance views for module privacy

Author keywords

Approximation; Privacy; Provenance; Workflows

Indexed keywords

ALGORITHMIC SOLUTIONS; APPROXIMATION; DATA INPUT; DATA ITEMS; PARAMETER SETTING; PRIVACY REQUIREMENTS; PROVENANCE; SCIENTIFIC WORKFLOWS; WORK-FLOWS;

EID: 79960191413     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1989284.1989305     Document Type: Conference Paper
Times cited : (40)

References (22)
  • 1
    • 79960158684 scopus 로고    scopus 로고
    • www.myexperiment.org.
  • 3
    • 35348848696 scopus 로고    scopus 로고
    • Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography
    • DOI 10.1145/1242572.1242598, 16th International World Wide Web Conference, WWW2007
    • L. Backstrom, C. Dwork, and J. M. Kleinberg. Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In WWW, pages 181-190, 2007. (Pubitemid 47591590)
    • (2007) 16th International World Wide Web Conference, WWW2007 , pp. 181-190
    • Backstrom, L.1    Dwork, C.2    Kleinberg, J.3
  • 6
    • 51849083449 scopus 로고    scopus 로고
    • Scientific workflow provenance querying with security views
    • A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang. Scientific workflow provenance querying with security views. In WAIM, pages 349-356, 2008.
    • (2008) WAIM , pp. 349-356
    • Chebotko, A.1    Chang, S.2    Lu, S.3    Fotouhi, F.4    Yang, P.5
  • 8
    • 1142275486 scopus 로고    scopus 로고
    • Revealing information while preserving privacy
    • I. Dinur and K. Nissim. Revealing information while preserving privacy. In PODS, pages 202-210, 2003.
    • (2003) PODS , pp. 202-210
    • Dinur, I.1    Nissim, K.2
  • 9
    • 70349305273 scopus 로고    scopus 로고
    • Differential privacy: A survey of results
    • C. Dwork. Differential privacy: A survey of results. In TAMC, pages 1-19, 2008.
    • (2008) TAMC , pp. 1-19
    • Dwork, C.1
  • 12
    • 77955877886 scopus 로고    scopus 로고
    • Reasoning about the appropriate use of private data through computational workflows
    • Y. Gil and C. Fritz. Reasoning about the appropriate use of private data through computational workflows. In Intelligent Information Privacy Management, pages 69-74, 2010.
    • (2010) Intelligent Information Privacy Management , pp. 69-74
    • Gil, Y.1    Fritz, C.2
  • 13
    • 62749161358 scopus 로고    scopus 로고
    • Introducing secure provenance: Problems and challenges
    • R. Hasan, R. Sion, and M. Winslett. Introducing secure provenance: problems and challenges. In StorageSS, pages 13-18, 2007.
    • (2007) StorageSS , pp. 13-18
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 14
    • 84863142886 scopus 로고    scopus 로고
    • Trusted computing and provenance: Better together
    • J. Lyle and A. Martin. Trusted computing and provenance: better together. In TAPP, page 1, 2010.
    • (2010) TAPP , pp. 1
    • Lyle, J.1    Martin, A.2
  • 16
    • 3142686877 scopus 로고    scopus 로고
    • A formal analysis of information disclosure in data exchange
    • G. Miklau and D. Suciu. A formal analysis of information disclosure in data exchange. In SIGMOD, pages 575-586, 2004.
    • (2004) SIGMOD , pp. 575-586
    • Miklau, G.1    Suciu, D.2
  • 18
    • 52649162862 scopus 로고    scopus 로고
    • Auditing sql queries
    • R. Motwani, S. U. Nabar, and D. Thomas. Auditing sql queries. In ICDE, pages 287-296, 2008.
    • (2008) ICDE , pp. 287-296
    • Motwani, R.1    Nabar, S.U.2    Thomas, D.3
  • 19
    • 10244255212 scopus 로고    scopus 로고
    • Taverna: A tool for the composition and enactment of bioinformatics workflows
    • T.'Oinn et al. Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics, 20(1):3045-3054, 2003.
    • (2003) Bioinformatics , vol.20 , Issue.1 , pp. 3045-3054
  • 20
    • 70350635777 scopus 로고    scopus 로고
    • Relationship privacy: Output perturbation for queries with joins
    • V. Rastogi, M. Hay, G. Miklau, and D. Suciu. Relationship privacy: output perturbation for queries with joins. In PODS, pages 107-116, 2009.
    • (2009) PODS , pp. 107-116
    • Rastogi, V.1    Hay, M.2    Miklau, G.3    Suciu, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.