-
1
-
-
68849108353
-
Recording process documentation for provenance
-
P. Groth and L. Moreau, "Recording process documentation for provenance," IEEE Trans. Parallel Distrib. Syst., vol.20, no.9, pp.1246-1259, 2009.
-
(2009)
IEEE Trans. Parallel Distrib. Syst.
, vol.20
, Issue.9
, pp. 1246-1259
-
-
Groth, P.1
Moreau, L.2
-
2
-
-
79953210348
-
The open provenance model core specification (v1.1)
-
L. Moreau, B. Clifford, J. Freire, J. Futrelle, Y. Gil, P.T. Groth, N. Kwasnikowska, S. Miles, P. Missier, J. Myers, B. Plale, Y. Simmhan, E.G. Stephan, and J.V. den Bussche, "The open provenance model core specification (v1.1)," Future Generation Comp. Syst., vol.27, no.6, pp.743-756, 2011.
-
(2011)
Future Generation Comp. Syst.
, vol.27
, Issue.6
, pp. 743-756
-
-
Moreau, L.1
Clifford, B.2
Freire, J.3
Futrelle, J.4
Gil, Y.5
Groth, P.T.6
Kwasnikowska, N.7
Miles, S.8
Missier, P.9
Myers, J.10
Plale, B.11
Simmhan, Y.12
Stephan, E.G.13
Den Bussche, J.V.14
-
4
-
-
31444456909
-
A survey of data provenance in e-science
-
DOI 10.1145/1084805.1084812
-
Y. Simmhan, B. Plale, and D. Gannon, "A survey of data provenance in e-science," SIGMOD Record, pp.31-36, 2005. (Pubitemid 43152529)
-
(2005)
SIGMOD Record
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
5
-
-
79952802649
-
A language for provenance access control
-
T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B.M. Thuraisingham, "A language for provenance access control," CO-DASPY, pp.133-144, 2011.
-
(2011)
CO-DASPY
, pp. 133-144
-
-
Cadenhead, T.1
Khadilkar, V.2
Kantarcioglu, M.3
Thuraisingham, B.M.4
-
6
-
-
79960570447
-
Why and where: A characterization of data provenance
-
P. Buneman, S. Khanna, and W.C. Tan, "Why and where: A characterization of data provenance," International Conference on Database Theory (ICDT 2001), LNCS 1973, pp.316-330, 2001. (Pubitemid 33213333)
-
(2001)
Lecture Notes in Computer Science
, Issue.1973
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.-C.3
-
7
-
-
38149016795
-
A framework for collecting provenance in data-centric scientific workflows
-
Y.L. Simmhan, B. Plale, and D. Gannon, "A framework for collecting provenance in data-centric scientific workflows," IEEE International Conference on Web Services (ICWS 2006), pp.427-436, 2006.
-
(2006)
IEEE International Conference on Web Services (ICWS 2006)
, pp. 427-436
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
8
-
-
33750071407
-
A model for user-oriented data provenance in pipelined scientific workflows
-
Provenance and Annotation of Data - International Provenance and Annotation Workshop, IPAW 2006, Revised Selected Papers
-
S. Bowers, T.M. McPhillips, B. Ludscher, S. Cohen, and S.B. Davidson, "A model for user-oriented data provenance in pipelined scientific workflows," International Provenance and Annotation Workshop (IPAW 2006), LNCS 4145, pp.133-147, 2006. (Pubitemid 44577315)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4145
, pp. 133-147
-
-
Bowers, S.1
McPhillips, T.2
Ludascher, B.3
Cohen, S.4
Davidson, S.B.5
-
9
-
-
42149109673
-
The provenance of electronic data
-
DOI 10.1145/1330311.1330323
-
L. Moreau, P.T. Groth, S. Miles, J. Vázquez-Salceda, J. Ibbotson, S. Jiang, S. Munroe, O.F. Rana, A. Schreiber, V. Tan, and L.Z. Varga, "The provenance of electronic data," Commun. ACM, vol.51, no.4, pp.52-58, 2008. (Pubitemid 351530779)
-
(2008)
Communications of the ACM
, vol.51
, Issue.4
, pp. 52-58
-
-
Moreau, L.1
Groth, P.2
Miles, S.3
Vazquez-Salceda, J.4
Ibbotson, J.5
Jiang, S.6
Munroe, S.7
Rana, O.8
Schreiber, A.9
Tan, V.10
Varga, L.11
-
10
-
-
33745593742
-
Research problems in data provenance
-
W.C. Tan, "Research problems in data provenance," IEEE Data Eng. Bull., vol.27, no.4, pp.45-52, 2004.
-
(2004)
IEEE Data Eng. Bull.
, vol.27
, Issue.4
, pp. 45-52
-
-
Tan, W.C.1
-
11
-
-
42449132132
-
Provenance in databases: Past, current, and future
-
W.C. Tan, "Provenance in databases: Past, current, and future," IEEE Data Eng. Bull., vol.30, no.4, pp.3-12, 2007.
-
(2007)
IEEE Data Eng. Bull.
, vol.30
, Issue.4
, pp. 3-12
-
-
Tan, W.C.1
-
12
-
-
41149088295
-
Automatic capture and efficient storage of e-Science experiment provenance
-
DOI 10.1002/cpe.1235
-
R.S. Barga and L.A. Digiampietri, "Automatic capture and efficient storage of e-science experiment provenance," Concurrency and Computation: Practice and Experience, vol.20, no.5, pp.419-429, 2008. (Pubitemid 351428356)
-
(2008)
Concurrency Computation Practice and Experience
, vol.20
, Issue.5
, pp. 419-429
-
-
Barga, R.S.1
Digiampietri, L.A.2
-
13
-
-
34250328839
-
The requirements of using provenance in e-science experiments
-
DOI 10.1007/s10723-006-9055-3
-
S. Miles, P.T. Groth, M. Branco, and L. Moreau, "The requirements of using provenance in e-science experiments," J. Grid Comput., vol.5, no.1, pp.1-25, 2007. (Pubitemid 46909010)
-
(2007)
Journal of Grid Computing
, vol.5
, Issue.1
, pp. 1-25
-
-
Miles, S.1
Groth, P.2
Branco, M.3
Moreau, L.4
-
14
-
-
33845580607
-
Provenance in agent-mediated healthcare systems
-
DOI 9D04F813-E31E-416F-99B7-DBC4D177ACA7
-
T. Kifor, L.Z. Varga, J. Vázquez-Salceda, S. Álvarez- Napagao, S. Willmott, S. Miles, and L. Moreau, "Provenance in agent-mediated healthcare systems," IEEE Intelligent Systems, vol.21, no.6, pp.38-46, 2006. (Pubitemid 44936720)
-
(2006)
IEEE Intelligent Systems
, vol.21
, Issue.6
, pp. 38-46
-
-
Kifor, T.1
Varga, L.Z.2
Vazquez-Salceda, J.3
Alvarez, S.4
Willmott, S.5
Miles, S.6
Moreau, L.7
-
15
-
-
42549154681
-
Navigating provenance information for distributed healthcare management
-
V. Deora, A. Contes, O.F. Rana, S. Rajbhandari, I. Wootten, T. Kifor, and L.Z. Varga, "Navigating provenance information for distributed healthcare management," Web Intelligence, pp.859-865, 2006.
-
(2006)
Web Intelligence
, pp. 859-865
-
-
Deora, V.1
Contes, A.2
Rana, O.F.3
Rajbhandari, S.4
Wootten, I.5
Kifor, T.6
Varga, L.Z.7
-
16
-
-
33750056371
-
Applying provenance in distributed organ transplant management
-
Provenance and Annotation of Data - International Provenance and Annotation Workshop, IPAW 2006, Revised Selected Papers
-
S. Álvarez-Napagao, J. Vázquez-Salceda, T. Kifor, L.Z. Varga, and S. Willmott, "Applying provenance in distributed organ transplant management," IPAW, pp.28-36, 2006. (Pubitemid 44577304)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4145
, pp. 28-36
-
-
Alvarez, S.1
Vazquez-Salceda, J.2
Kifor, T.3
Varga, L.Z.4
Willmott, S.5
-
17
-
-
35548974326
-
A time-and-value centric provenance model and architecture for medical event streams
-
DOI 10.1145/1248054.1248082, HealthNet'07: Proceedings of the 1st ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments
-
M. Wang, M. Blount, J. Davis, A. Misra, and D.M. Sow, "A time-and-value centric provenance model and architecture for medical event streams," HealthNet, pp.95-100, 2007. (Pubitemid 350003859)
-
(2007)
HealthNet'07: Proceedings of the 1st ACM SIGMOBILE International Workshop on Systems and Networking Support for Healthcare and Assisted Living Environments
, pp. 95-100
-
-
Blount, M.1
Davis, J.2
Misra, A.3
Sow, D.4
Wang, M.5
-
18
-
-
21244466307
-
New approaches to digital evidence
-
U.M. Maurer, "New approaches to digital evidence," Proc. IEEE, vol.92, no.6, pp.933-947, 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 933-947
-
-
Maurer, U.M.1
-
19
-
-
79952938809
-
Database-centric chain-of-custody in biometric forensic systems
-
M. Schäler, S. Schulze, and S. Kiltz, "Database-centric chain-of-custody in biometric forensic systems," BIOID, pp.250-261, 2011.
-
(2011)
BIOID
, pp. 250-261
-
-
Schäler, M.1
Schulze, S.2
Kiltz, S.3
-
20
-
-
33750036770
-
An architecture for provenance systems
-
Nov.
-
P. Groth, S. Jiang, S. Miles, S. Munroe, V. Tan, S. Tsasakou, and L. Moreau, "An architecture for provenance systems," Tech. Rep., University of Southampton, Nov. 2006.
-
(2006)
Tech. Rep., University of Southampton
-
-
Groth, P.1
Jiang, S.2
Miles, S.3
Munroe, S.4
Tan, V.5
Tsasakou, S.6
Moreau, L.7
-
21
-
-
0025849585
-
How to time-stamp a digital document
-
S. Haber and W.S. Stornetta, "How to time-stamp a digital document," J. Cryptology, vol.3, no.2, pp.99-111, 1991. (Pubitemid 21700570)
-
(1991)
Journal of Cryptology
, vol.3
, Issue.2
, pp. 99-111
-
-
Haber Stuart1
Stornetta W.Scott2
-
22
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
R. Hasan, R. Sion, and M. Winslett, "Introducing secure provenance: problems and challenges," ACM Workshop on Storage Security and Survivability (StorageSS 2007), pp.13-18, 2007.
-
(2007)
ACM Workshop on Storage Security and Survivability (StorageSS 2007)
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
23
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
R. Hasan, R. Sion, and M. Winslett, "The case of the fake picasso: Preventing history forgery with secure provenance," 7th Conference on File and Storage Technologies (FAST 2009), pp.1-14, 2009.
-
(2009)
7th Conference on File and Storage Technologies (FAST 2009)
, pp. 1-14
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
24
-
-
73849140516
-
Preventing history forgery with secure provenance
-
Dec.
-
R. Hasan, R. Sion, and M. Winslett, "Preventing history forgery with secure provenance," ACM Trans. Storage, vol.5, no.4, pp.12:1-12:43, Dec. 2009.
-
(2009)
ACM Trans. Storage
, vol.5
, Issue.4
, pp. 121-1243
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
25
-
-
62749160024
-
Kairos: An architecture for securing authorship and temporal information of provenance data in grid-enabled workflow management systems
-
Dec.
-
L.M.R. Gadelha and M. Mattoso, "Kairos: An architecture for securing authorship and temporal information of provenance data in grid-enabled workflow management systems," 2008 IEEE Fourth International Conference on eScience, pp.597-602, Dec. 2008.
-
(2008)
2008 IEEE Fourth International Conference on EScience
, pp. 597-602
-
-
Gadelha, L.M.R.1
Mattoso, M.2
-
26
-
-
85091898032
-
Securing provenance
-
USENIX HotSec, Berkeley, CA, USA USENIX Association, July
-
U. Braun, A. Shinnar, and M. Seltzer, "Securing provenance," The 3rd USENIX Workshop on Hot Topics in Security (HOTSEC 2008), USENIX HotSec, Berkeley, CA, USA, pp.1-5, USENIX Association, July 2008.
-
(2008)
The 3rd USENIX Workshop on Hot Topics in Security (HOTSEC 2008)
, pp. 1-5
-
-
Braun, U.1
Shinnar, A.2
Seltzer, M.3
-
28
-
-
41149175552
-
Extracting causal graphs from an open provenance data model
-
DOI 10.1002/cpe.1236
-
S. Miles, P.T. Groth, S. Munroe, S. Jiang, T. Assandri, and L. Moreau, "Extracting causal graphs from an open provenance data model," Concurrency and Computation: Practice and Experience, vol.20, no.5, pp.577-586, 2008. (Pubitemid 351428370)
-
(2008)
Concurrency Computation Practice and Experience
, vol.20
, Issue.5
, pp. 577-586
-
-
Miles, S.1
Groth, P.2
Munroe, S.3
Jiang, S.4
Assandri, T.5
Moreau, L.6
-
29
-
-
50649104772
-
The open provenance model
-
L. Moreau, J. Freire, J. Futrelle, R. McGrath, J. Myers, and P. Paulson, "The open provenance model," Tech. Rep., University of Southampton, 2007.
-
(2007)
Tech. Rep., University of Southampton
-
-
Moreau, L.1
Freire, J.2
Futrelle, J.3
McGrath, R.4
Myers, J.5
Paulson, P.6
-
30
-
-
84961817130
-
The open provenance model: An overview
-
L. Moreau, J. Freire, J. Futrelle, R.E. McGrath, J. Myers, and P. Paulson, "The open provenance model: An overview," IPAW, pp.323-326, 2008.
-
(2008)
IPAW
, pp. 323-326
-
-
Moreau, L.1
Freire, J.2
Futrelle, J.3
McGrath, R.E.4
Myers, J.5
Paulson, P.6
-
31
-
-
0032218229
-
A security architecture for computational grids
-
I.T. Foster, C. Kesselman, G. Tsudik, and S. Tuecke, "A security architecture for computational grids," ACM Conference on Computer and Communications Security, pp.83-92, 1998.
-
(1998)
ACM Conference on Computer and Communications Security
, pp. 83-92
-
-
Foster, I.T.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
32
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," IEEE Symposium on Security and Privacy, pp.164-173, 1996.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
33
-
-
70350655747
-
Grouping provenance information to improve efficiency of access control
-
LNCS 5576
-
A. Syalim, Y. Hori, and K. Sakurai, "Grouping provenance information to improve efficiency of access control," International Conference and Workshops on Advances in Information Security and Assurance (ISA 2009), LNCS 5576, pp.51-59, 2009.
-
(2009)
International Conference and Workshops on Advances in Information Security and Assurance (ISA 2009)
, pp. 51-59
-
-
Syalim, A.1
Hori, Y.2
Sakurai, K.3
-
34
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, "Role-based access control models," Computer, vol.29, no.2, pp.38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
35
-
-
85027204186
-
-
AESCrypt, "http://www.aescrypt.com/"
-
-
-
|