-
1
-
-
85094868493
-
-
"SAML," http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=s ecurity.
-
SAML
-
-
-
2
-
-
85094832026
-
-
"XACML," http://www.oasisopen.org/committees/tc_home.php?wg_abbrev=x acml.
-
XACML
-
-
-
3
-
-
33750083976
-
-
SCI Institute Technical Report UUSCI-2006-17, University of Utah
-
E. W. Anderson, S. P. Callahan, G. T. Y. Chen, J. Freire, E. Santos, C. E. Scheidegger, C. T. Silva, and H. T. Vo, "Visualization in Radiation Oncology: Towards Replacing the Laboratory Notebook," SCI Institute Technical Report, No. UUSCI-2006-17, University of Utah 2006.
-
(2006)
Visualization in Radiation Oncology: Towards Replacing the Laboratory Notebook
-
-
Anderson, E. W.1
Callahan, S. P.2
Chen, G. T. Y.3
Freire, J.4
Santos, E.5
Scheidegger, C. E.6
Silva, C. T.7
Vo, H. T.8
-
4
-
-
84925001453
-
ULDBs: Databases with Uncertainty and Lineage
-
O. Benjelloun, A. D. Sarma, A. Halevy, and J. Widom, "ULDBs: Databases with Uncertainty and Lineage," VLDB Seoul, Korea, pp. 953-964, 2006.
-
(2006)
VLDB Seoul, Korea
, pp. 953-964
-
-
Benjelloun, O.1
Sarma, A. D.2
Halevy, A.3
Widom, J.4
-
5
-
-
4143146358
-
X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control
-
R. Bhatti, J. Joshi, E. Bertino, and A. Ghafoor, "X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control," X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control, 2004.
-
(2004)
X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control
-
-
Bhatti, R.1
Joshi, J.2
Bertino, E.3
Ghafoor, A.4
-
6
-
-
50249184837
-
PLUS: Synthesizing privacy, lineage, uncertainty and security
-
B. T. Blaustein, L. Seligman, M. Morse, M. D. Allen, and A. Rosenthal, "PLUS: Synthesizing privacy, lineage, uncertainty and security," ICDE Workshops, pp. 242-245, 2008.
-
(2008)
ICDE Workshops
, pp. 242-245
-
-
Blaustein, B. T.1
Seligman, L.2
Morse, M.3
Allen, M. D.4
Rosenthal, A.5
-
7
-
-
33750035572
-
A Security Model for Provenance
-
TR-04-06: Harvard University Computer Science
-
U. Braun and A. Shinnar, "A Security Model for Provenance," in Technical Report, vol. TR-04-06: Harvard University Computer Science, 2006.
-
(2006)
Technical Report
-
-
Braun, U.1
Shinnar, A.2
-
9
-
-
84878730909
-
On the Expressiveness of Implicit Provenance in Query and Update Languages
-
P. Buneman, J. Cheney, and S. Vansummeren, "On the Expressiveness of Implicit Provenance in Query and Update Languages.," ICDT, pp. 209-223, 2007.
-
(2007)
ICDT
, pp. 209-223
-
-
Buneman, P.1
Cheney, J.2
Vansummeren, S.3
-
10
-
-
34250671203
-
VisTrails: Visualization meets Data Management
-
S. P. Callahan, J. Freire, E. Santos, C. E. Scheidegger, and C. T. S. H. T. Vo, "VisTrails: Visualization meets Data Management," SIGMOD, pp. 745-747, 2006.
-
(2006)
SIGMOD
, pp. 745-747
-
-
Callahan, S. P.1
Freire, J.2
Santos, E.3
Scheidegger, C. E.4
Vo, C. T. S. H. T.5
-
11
-
-
57149126660
-
Efficient Provenance Storage
-
A. Chapman, H. V. Jagadish, and P. Ramanan, "Efficient Provenance Storage," SIGMOD, pp. 993-1006, 2008.
-
(2008)
SIGMOD
, pp. 993-1006
-
-
Chapman, A.1
Jagadish, H. V.2
Ramanan, P.3
-
12
-
-
51849083449
-
Scientific Workflow Provenance Querying with Security Views
-
A. Chebotko, S. Chang, S. Lu, F. Fotouhi, and P. Yang, "Scientific Workflow Provenance Querying with Security Views," WAIM, 2008.
-
(2008)
WAIM
-
-
Chebotko, A.1
Chang, S.2
Lu, S.3
Fotouhi, F.4
Yang, P.5
-
13
-
-
78049377213
-
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects
-
A. Cirillo, R. Jagadeesan, C. Pitcher, and J. Riely, "Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects," Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects, 2008.
-
(2008)
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects
-
-
Cirillo, A.1
Jagadeesan, R.2
Pitcher, C.3
Riely, J.4
-
14
-
-
41149161699
-
Addressing the provenance challenge using ZOOM
-
S. Cohen-Boulakia, O. Biton, S. Cohen, and S. Davidson, "Addressing the provenance challenge using ZOOM," Concurrency and Computation: Practice and Experience, vol. 20, pp. 497-506, 2008.
-
(2008)
Concurrency and Computation: Practice and Experience
, vol.20
, pp. 497-506
-
-
Cohen-Boulakia, S.1
Biton, O.2
Cohen, S.3
Davidson, S.4
-
15
-
-
48249115881
-
Provenance in Scientific Workflow Systems
-
S. Davidson, S. Cohen-Boulakia, A. Eyal, B. Ludascher, T. McPhillips, S. Bowers, and J. Freire, "Provenance in Scientific Workflow Systems," IEEE Data Engineering Bulletin, vol. 32, pp. 44-50, 2007.
-
(2007)
IEEE Data Engineering Bulletin
, vol.32
, pp. 44-50
-
-
Davidson, S.1
Cohen-Boulakia, S.2
Eyal, A.3
Ludascher, B.4
McPhillips, T.5
Bowers, S.6
Freire, J.7
-
17
-
-
41149178153
-
Automatic capture and reconstruction of computational provenance
-
J. Frew, D. Metzger, and P. Slaughter, "Automatic capture and reconstruction of computational provenance," Concurr. Comput.: Pract. Exper., vol. 20, pp. 485-496, 2008.
-
(2008)
Concurr. Comput.: Pract. Exper
, vol.20
, pp. 485-496
-
-
Frew, J.1
Metzger, D.2
Slaughter, P.3
-
20
-
-
33745455745
-
Limiting Disclosure in Hippocratic Databases
-
K. LeFevre, R. Agarwal, V. Ercegovac, R. Ramakrishnan, Y. Xu, and D. J. DeWitt, "Limiting Disclosure in Hippocratic Databases," Limiting Disclosure in Hippocratic Databases, 2004.
-
(2004)
Limiting Disclosure in Hippocratic Databases
-
-
LeFevre, K.1
Agarwal, R.2
Ercegovac, V.3
Ramakrishnan, R.4
Xu, Y.5
DeWitt, D. J.6
-
21
-
-
33750924800
-
XML access control using static analysis
-
M. Makoto, T. Akihiko, K. Michiharu, and H. Satoshi, "XML access control using static analysis," ACM Trans. Inf. Syst. Secur., vol. 9, pp. 292-324, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur
, vol.9
, pp. 292-324
-
-
Makoto, M.1
Akihiko, T.2
Michiharu, K.3
Satoshi, H.4
-
22
-
-
50649104772
-
-
University of Southampton
-
L. Moreau, J. Freire, J. Futrelle, R. McGrath, J. Myers, and P. Paulson, "The Open Provenance Model," University of Southampton 2007.
-
(2007)
The Open Provenance Model
-
-
Moreau, L.1
Freire, J.2
Futrelle, J.3
McGrath, R.4
Myers, J.5
Paulson, P.6
-
23
-
-
41149142463
-
Special Issue: The First Provenance Challenge
-
G. C. JR., and
-
L. Moreau, B. Ludäscher, I. Altintas, R. S. Barga, S. Bowers, S. Callahan, G. C. JR., B. Clifford, S. Cohen, S. Cohen-Boulakia, S. Davidson, E. Deelman, L. Digiampietri, I. Foster, J. Freire, J. Frew, J. Futrelle, T. Gibson, Y. Gil, C. Goble, J. Golbeck, P. Groth, D. A. Holland, S. Jiang, J. Kim, D. Koop, A. Krenek, T. McPhillips, G. Mehta, S. Miles, D. Metzger, S. Munroe, J. Myers, B. Plale, N. Podhorszki, V. Ratnakar, E. Santos, C. Scheidegger, K. Schuchardt, M. Seltzer, Y. L. Simmhan, C. Silva, P. Slaughter, E. Stephan, R. Stevens, D. Turi, H. Vo, M. Wilde, J. Zhao, and Y. Zhao, "Special Issue: The First Provenance Challenge," Concurrency and Computation: Practice and Experience, vol. 20, pp. 409-418, 2008.
-
(2008)
Concurrency and Computation: Practice and Experience
, vol.20
, pp. 409-418
-
-
Moreau, L.1
Ludäscher, B.2
Altintas, I.3
Barga, R. S.4
Bowers, S.5
Callahan, S.6
Clifford, B.7
Cohen, S.8
Cohen-Boulakia, S.9
Davidson, S.10
Deelman, E.11
Digiampietri, L.12
Foster, I.13
Freire, J.14
Frew, J.15
Futrelle, J.16
Gibson, T.17
Gil, Y.18
Goble, C.19
Golbeck, J.20
Groth, P.21
Holland, D. A.22
Jiang, S.23
Kim, J.24
Koop, D.25
Krenek, A.26
McPhillips, T.27
Mehta, G.28
Miles, S.29
Metzger, D.30
Munroe, S.31
Myers, J.32
Plale, B.33
Podhorszki, N.34
Ratnakar, V.35
Santos, E.36
Scheidegger, C.37
Schuchardt, K.38
Seltzer, M.39
Simmhan, Y. L.40
Silva, C.41
Slaughter, P.42
Stephan, E.43
Stevens, R.44
Turi, D.45
Vo, H.46
Wilde, M.47
Zhao, J.48
Zhao, Y.49
more..
-
24
-
-
85076227002
-
Provenance-Aware Storage Systems
-
K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. I. Seltzer, "Provenance-Aware Storage Systems," USENIX Annual Technical Conference, pp. 43-56, 2006.
-
(2006)
USENIX Annual Technical Conference
, pp. 43-56
-
-
Muniswamy-Reddy, K.-K.1
Holland, D. A.2
Braun, U.3
Seltzer, M. I.4
-
25
-
-
33646038227
-
Taverna: lessons in creating a workflow environment for the life sciences: Research Articles
-
T. Oinn, M. Greenwood, M. Addis, M. N. Alpdemir, J. Ferris, K. Glover, C. Goble, A. Goderis, D. Hull, D. Marvin, P. Li, P. Lord, M. R. Pocock, M. Senger, R. Stevens, A. Wipat, and C. Wroe, "Taverna: lessons in creating a workflow environment for the life sciences: Research Articles," Concurr. Comput.: Pract. Exper., vol. 18, pp. 1067-1100, 2006.
-
(2006)
Concurr. Comput.: Pract. Exper
, vol.18
, pp. 1067-1100
-
-
Oinn, T.1
Greenwood, M.2
Addis, M.3
Alpdemir, M. N.4
Ferris, J.5
Glover, K.6
Goble, C.7
Goderis, A.8
Hull, D.9
Marvin, D.10
Li, P.11
Lord, P.12
Pocock, M. R.13
Senger, M.14
Stevens, R.15
Wipat, A.16
Wroe, C.17
-
26
-
-
84883218846
-
Scalable Access Policy Administration: Opinions and a Research Agenda
-
A. Rosenthal, "Scalable Access Policy Administration: Opinions and a Research Agenda " in Security Management, Integrity, and Internal Control in Information Systems, IFIP International Federation for Information Processing, 2006, pp. 355-370.
-
(2006)
Security Management, Integrity, and Internal Control in Information Systems, IFIP International Federation for Information Processing
, pp. 355-370
-
-
Rosenthal, A.1
-
27
-
-
11244334069
-
From semantic integration to semantics management: case studies and a way forward
-
A. Rosenthal, L. J. Seligman, and S. Renner, "From semantic integration to semantics management: case studies and a way forward," SIGMOD Record, vol. 33, pp. 44-50, 2004.
-
(2004)
SIGMOD Record
, vol.33
, pp. 44-50
-
-
Rosenthal, A.1
Seligman, L. J.2
Renner, S.3
-
28
-
-
67649176728
-
Accelerating Medical Research using the Swift Workflow System
-
T. Stef-Praun, B. Clifford, I. Foster, U. Hasson, M. Hategan, S. Small, M. Wilde, and Y. Zhao, "Accelerating Medical Research using the Swift Workflow System," Health Grid, 2007.
-
(2007)
Health Grid
-
-
Stef-Praun, T.1
Clifford, B.2
Foster, I.3
Hasson, U.4
Hategan, M.5
Small, S.6
Wilde, M.7
Zhao, Y.8
-
29
-
-
85094832774
-
Security Issues in a SOA-Based Provenance System
-
V. Tan, P. Groth, S. Miles, S. Jiang, S. Munroe, S. Tsasakou, and L. Moreau, "Security Issues in a SOA-Based Provenance System," Security Issues in a SOA-Based Provenance System, 2006.
-
(2006)
Security Issues in a SOA-Based Provenance System
-
-
Tan, V.1
Groth, P.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
30
-
-
36749051012
-
Data provenance in SOA: security, reliability, and integrity
-
W. T. Tsai, X. Wei, Y. Chen, R. Paul, J.-Y. Chung, and D. Zhang, "Data provenance in SOA: security, reliability, and integrity," Journal Service Oriented Computing and Applications, 2007.
-
(2007)
Journal Service Oriented Computing and Applications
-
-
Tsai, W. T.1
Wei, X.2
Chen, Y.3
Paul, R.4
Chung, J.-Y.5
Zhang, D.6
|