-
1
-
-
84868259107
-
-
Accessed: 03/31/2012
-
Pql-path query language. http://www.eecs.harvard.edu/syrah/pql/. Accessed: 03/31/2012.
-
Pql-path Query Language
-
-
-
3
-
-
84857563242
-
Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information
-
oct.
-
M. Allen, A. Chapman, L. Seligman, and B. Blaustein. Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information. In Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, pages 342-351, oct. 2011.
-
(2011)
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on
, pp. 342-351
-
-
Allen, M.1
Chapman, A.2
Seligman, L.3
Blaustein, B.4
-
4
-
-
24144435318
-
History-based access control and secure information flow
-
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, Springer-Verlag
-
A. Banerjee and D. A. Naumann. History-based access control and secure information flow. In Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop (CASSIS 2004), Revised Selected Papers, volume 3362 of Lecture Notes in Computer Science, pages 27-48. Springer-Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3362
, pp. 27-48
-
-
Banerjee, A.1
Naumann, D.A.2
-
5
-
-
84863453013
-
Surrogate parenthood: Protected and informative graphs
-
May
-
B. Blaustein, A. Chapman, L. Seligman, M. D. Allen, and A. Rosenthal. Surrogate parenthood: protected and informative graphs. Proc. VLDB Endow., 4(8):518-525, May 2011.
-
(2011)
Proc. VLDB Endow.
, vol.4
, Issue.8
, pp. 518-525
-
-
Blaustein, B.1
Chapman, A.2
Seligman, L.3
Allen, M.D.4
Rosenthal, A.5
-
6
-
-
85091898032
-
Securing provenance
-
Berkeley, CA, USA, July USENIX Association
-
U. Braun, A. Shinnar, and M. Seltzer. Securing provenance. In The 3rd USENIX Workshop on Hot Topics in Security, USENIX HotSec, pages 1-5, Berkeley, CA, USA, July 2008. USENIX Association.
-
(2008)
The 3rd USENIX Workshop on Hot Topics in Security, USENIX HotSec
, pp. 1-5
-
-
Braun, U.1
Shinnar, A.2
Seltzer, M.3
-
7
-
-
33846076805
-
Provenance management in curated databases
-
ACM
-
P. Buneman, A. Chapman, and J. Cheney. Provenance management in curated databases. In Proceedings of the international conference on Management of data, SIGMOD, pages 539-550. ACM, 2006.
-
(2006)
Proceedings of the International Conference on Management of Data, SIGMOD
, pp. 539-550
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
-
8
-
-
79952802649
-
A language for provenance access control
-
ACM
-
T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. Thuraisingham. A language for provenance access control. In Proceedings of the first ACM conference on Data and application security and privacy, pages 133-144. ACM, 2011.
-
(2011)
Proceedings of the First ACM Conference on Data and Application Security and Privacy
, pp. 133-144
-
-
Cadenhead, T.1
Khadilkar, V.2
Kantarcioglu, M.3
Thuraisingham, B.4
-
9
-
-
79960162956
-
Transforming provenance using redaction
-
ACM
-
T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. Thuraisingham. Transforming provenance using redaction. In Proceedings of the 16th ACM symposium on Access control models and technologies, pages 93-102. ACM, 2011.
-
(2011)
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies
, pp. 93-102
-
-
Cadenhead, T.1
Khadilkar, V.2
Kantarcioglu, M.3
Thuraisingham, B.4
-
10
-
-
80053164877
-
Plus: A provenance manager for integrated information
-
aug.
-
A. Chapman, B. Blaustein, L. Seligman, and M. Allen. Plus: A provenance manager for integrated information. In Information Reuse and Integration (IRI), 2011 IEEE International Conference on, pages 269-275, aug. 2011.
-
(2011)
Information Reuse and Integration (IRI), 2011 IEEE International Conference on
, pp. 269-275
-
-
Chapman, A.1
Blaustein, B.2
Seligman, L.3
Allen, M.4
-
11
-
-
57149126660
-
Efficient provenance storage
-
New York, NY, USA, ACM
-
A. P. Chapman, H. V. Jagadish, and P. Ramanan. Efficient provenance storage. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, SIGMOD '08, pages 993-1006, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD '08
, pp. 993-1006
-
-
Chapman, A.P.1
Jagadish, H.V.2
Ramanan, P.3
-
12
-
-
67349098774
-
Regular paths in sparql: Querying the nci thesaurus
-
American Medical Informatics Association
-
L. Detwiler, D. Suciu, and J. Brinkley. Regular paths in sparql: querying the nci thesaurus. In AMIA Annual Symposium Proceedings. American Medical Informatics Association, 2008.
-
(2008)
AMIA Annual Symposium Proceedings
-
-
Detwiler, L.1
Suciu, D.2
Brinkley, J.3
-
14
-
-
79953212555
-
Representing distributed systems using the open provenance model
-
P. Groth and L. Moreau. Representing distributed systems using the open provenance model. Future Generation Computer Systems, 27(6):757-765, 2011.
-
(2011)
Future Generation Computer Systems
, vol.27
, Issue.6
, pp. 757-765
-
-
Groth, P.1
Moreau, L.2
-
16
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
New York, NY, USA, ACM
-
R. Hasan, R. Sion, and M. Winslett. Introducing secure provenance: problems and challenges. In Proceedings of the 2007 ACM workshop on Storage security and survivability, StorageSS '07, pages 13-18, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the 2007 ACM Workshop on Storage Security and Survivability, StorageSS '07
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
17
-
-
73849140516
-
Preventing history forgery with secure provenance
-
Dec.
-
R. Hasan, R. Sion, and M. Winslett. Preventing history forgery with secure provenance. Trans. Storage, 5(4):12:1-12:43, Dec. 2009.
-
(2009)
Trans. Storage
, vol.5
, Issue.4
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
18
-
-
57149123932
-
Efficient lineage tracking for scientific workflows
-
New York, NY, USA, ACM
-
T. Heinis and G. Alonso. Efficient lineage tracking for scientific workflows. In Proceedings of the 2008 ACM SIGMOD international conference on Management of data, SIGMOD '08, pages 1007-1018, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD '08
, pp. 1007-1018
-
-
Heinis, T.1
Alonso, G.2
-
19
-
-
76349109047
-
Towards a framework for group-centric secure collaboration
-
nov.
-
R. Krishnan, R. Sandhu, J. Niu, and W. Winsborough. Towards a framework for group-centric secure collaboration. In Collaborative Computing: Networking, Applications and Worksharing, 2009. CollaborateCom 2009. 5th International Conference on, pages 1-10, nov. 2009.
-
(2009)
Collaborative Computing: Networking, Applications and Worksharing, 2009. CollaborateCom 2009. 5th International Conference on
, pp. 1-10
-
-
Krishnan, R.1
Sandhu, R.2
Niu, J.3
Winsborough, W.4
-
20
-
-
79953210348
-
The open provenance model core specification (v1.1)
-
L. Moreau, B. Clifford, J. Freire, J. Futrelle, Y. Gil, P. Groth, N. Kwasnikowska, S. Miles, P. Missier, J. Myers, B. Plale, Y. Simmhan, E. Stephan, and J. V. den Bussche. The open provenance model core specification (v1.1). Future Generation Computer Systems, 27(6):743-756, 2011.
-
(2011)
Future Generation Computer Systems
, vol.27
, Issue.6
, pp. 743-756
-
-
Moreau, L.1
Clifford, B.2
Freire, J.3
Futrelle, J.4
Gil, Y.5
Groth, P.6
Kwasnikowska, N.7
Miles, S.8
Missier, P.9
Myers, J.10
Plale, B.11
Simmhan, Y.12
Stephan, E.13
Den Bussche, J.V.14
-
21
-
-
85076227002
-
Provenance-aware storage systems
-
Berkeley, CA, USA, USENIX Association
-
K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. Seltzer. Provenance-aware storage systems. In Proceedings of the annual conference on USENIX '06 Annual Technical Conference, ATEC '06, pages 4-4, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
Proceedings of the Annual Conference on USENIX '06 Annual Technical Conference, ATEC '06
, pp. 4-4
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.A.2
Braun, U.3
Seltzer, M.4
-
22
-
-
70349885378
-
An access control language for a general provenance model
-
Berlin, Heidelberg, Springer-Verlag
-
Q. Ni, S. Xu, E. Bertino, R. Sandhu, and W. Han. An access control language for a general provenance model. In Proceedings of the 6th VLDB Workshop on Secure Data Management, SDM '09, pages 68-88, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
Proceedings of the 6th VLDB Workshop on Secure Data Management, SDM '09
, pp. 68-88
-
-
Ni, Q.1
Xu, S.2
Bertino, E.3
Sandhu, R.4
Han, W.5
-
23
-
-
84863272533
-
On data provenance in group-centric secure collaboration
-
oct.
-
J. Park, D. Nguyen, and R. Sandhu. On data provenance in group-centric secure collaboration. In Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 7th International Conference on, pages 221-230, oct. 2011.
-
(2011)
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 7th International Conference on
, pp. 221-230
-
-
Park, J.1
Nguyen, D.2
Sandhu, R.3
-
25
-
-
0347380518
-
Separation of duties in computerized information systems
-
North-Holland
-
R. Sandhu. Separation of duties in computerized information systems. In IN DATABASE SECURITY IV: STATUS AND PROSPECTS, pages 179-189. North-Holland, 1990.
-
(1990)
Database Security IV: Status and Prospects
, pp. 179-189
-
-
Sandhu, R.1
-
27
-
-
34547521213
-
Security issues in a soa-based provenance system
-
Springer
-
V. Tan, P. Groth, S. Miles, S. Jiang, S. Munroe, and L. Moreau. Security issues in a soa-based provenance system. In In Proceedings of the International Provenance and Annotation Workshop. Springer, 2006.
-
(2006)
Proceedings of the International Provenance and Annotation Workshop
-
-
Tan, V.1
Groth, P.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Moreau, L.6
|