Role-Based Access Control
VisTrails: visualization meets data management
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Taverna: lessons in creating a workflow environment for the life sciences: Research Articles
Concurrency and Computation: Practice & Experience - Workflow in Grid Systems
ULDBs: databases with uncertainty and lineage
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
XML access control using static analysis
ACM Transactions on Information and System Security (TISSEC)
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
Addressing the provenance challenge using ZOOM
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Special Issue: The First Provenance Challenge
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Automatic capture and reconstruction of computational provenance
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Scientific Workflow Provenance Querying with Security Views
WAIM '08 Proceedings of the 2008 The Ninth International Conference on Web-Age Information Management
PLUS: Synthesizing privacy, lineage, uncertainty and security
ICDEW '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering Workshop
On the expressiveness of implicit provenance in query and update languages
ICDT'07 Proceedings of the 11th international conference on Database Theory
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
A language for provenance access control
Proceedings of the first ACM conference on Data and application security and privacy
Surrogate parenthood: protected and informative graphs
Proceedings of the VLDB Endowment
Tracing where and who provenance in Linked Data: A calculus
Theoretical Computer Science
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
We present a formalism for provenance in distributed systems based on the π-calculus. Its main feature is that all data products are annotated with metadata representing their provenance. The calculus is given a provenance tracking semantics, which ...