-
2
-
-
35248821675
-
D2R MAP-A database to RDF mapping language
-
BIZER, C. D2R MAP-A database to RDF mapping language. WWW (Posters) (2003).
-
(2003)
WWW (Posters)
-
-
BIZER, C.1
-
3
-
-
84947707592
-
Issues in the practical use of graph rewriting
-
Springer
-
BLOSTEIN, D., FAHMY, H., AND GRBAVEC, A. Issues in the practical use of graph rewriting. In Graph Grammars and Their Application to Computer Science (1996), Springer, pp. 38–55.
-
(1996)
Graph Grammars and Their Application to Computer Science
, pp. 38-55
-
-
BLOSTEIN, D.1
FAHMY, H.2
GRBAVEC, A.3
-
4
-
-
72249090536
-
Securing provenance
-
USENIX Association
-
BRAUN, U., SHINNAR, A., AND SELTZER, M. Securing provenance. In Proceedings of the 3rd conference on Hot topics in security (2008), USENIX Association, p. 4.
-
(2008)
Proceedings of the 3rd conference on Hot topics in security
, pp. 4
-
-
BRAUN, U.1
SHINNAR, A.2
SELTZER, M.3
-
5
-
-
79952802649
-
A language for provenance access control
-
ACM
-
CADENHEAD, T., KHADILKAR, V., KANTARCIOGLU, M., AND THURAISINGHAM, B. A language for provenance access control. In Proceedings of the first ACM conference on Data and application security and privacy (2011), ACM, pp. 133–144.
-
(2011)
Proceedings of the first ACM conference on Data and application security and privacy
, pp. 133-144
-
-
CADENHEAD, T.1
KHADILKAR, V.2
KANTARCIOGLU, M.3
THURAISINGHAM, B.4
-
6
-
-
79960162956
-
Transforming Provenance using Redaction
-
ACM
-
CADENHEAD, T., KHADILKAR, V., KANTARCIOGLU, M., AND THURAISINGHAM, B. Transforming Provenance using Redaction. In Proceedings of the Sixteenth ACM Symposium on Access Control Models and Technologies (SACMAT) (2011), ACM.
-
(2011)
Proceedings of the Sixteenth ACM Symposium on Access Control Models and Technologies (SACMAT)
-
-
CADENHEAD, T.1
KHADILKAR, V.2
KANTARCIOGLU, M.3
THURAISINGHAM, B.4
-
7
-
-
33750260793
-
Sesqui-pushout rewriting
-
CORRADINI, A., HEINDEL, T., HERMANN, F., AND KÖNIG, B. Sesqui-pushout rewriting. Graph Transformations (2006), 30–45.
-
(2006)
Graph Transformations
, pp. 30-45
-
-
CORRADINI, A.1
HEINDEL, T.2
HERMANN, F.3
KÖNIG, B.4
-
11
-
-
4344697279
-
Resource description framework (RDF): Concepts and abstract syntax
-
KLYNE, G., CARROLL, J., AND MCBRIDE, B. Resource description framework (RDF): Concepts and abstract syntax. Changes (2004).
-
(2004)
Changes
-
-
KLYNE, G.1
CARROLL, J.2
MCBRIDE, B.3
-
12
-
-
18444367403
-
Graph-based specification of access control policies
-
KOCH, M., MANCINI, L., AND PARISI-PRESICCE, F. Graph-based specification of access control policies. Journal of Computer and System Sciences 71, 1 (2005), 1–33.
-
(2005)
Journal of Computer and System Sciences
, vol.71
, Issue.1
, pp. 1-33
-
-
KOCH, M.1
MANCINI, L.2
PARISI-PRESICCE, F.3
-
13
-
-
78049409596
-
The Open Provenance Model—Core Specification (v1. 1)
-
ET AL
-
MOREAU, L., CLIFFORD, B., FREIRE, J., GIL, Y., GROTH, P., FUTRELLE, J., KWASNIKOWSKA, N., MILES, S., MISSIER, P., MYERS, J., ET AL. The Open Provenance Model—Core Specification (v1. 1). Future Generation Computer Systems (2009).
-
(2009)
Future Generation Computer Systems
-
-
MOREAU, L.1
CLIFFORD, B.2
FREIRE, J.3
GIL, Y.4
GROTH, P.5
FUTRELLE, J.6
KWASNIKOWSKA, N.7
MILES, S.8
MISSIER, P.9
MYERS, J.10
-
14
-
-
70349885378
-
An access control language for a general provenance model
-
NI, Q., XU, S., BERTINO, E., SANDHU, R., AND HAN, W. An access control language for a general provenance model. Secure Data Management (2009), 68–88.
-
(2009)
Secure Data Management
, pp. 68-88
-
-
NI, Q.1
XU, S.2
BERTINO, E.3
SANDHU, R.4
HAN, W.5
|