Handbook of graph grammars and computing by graph transformation: volume I. foundations
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Algebraic approaches to graph transformation. Part I: basic concepts and double pushout approach
Handbook of graph grammars and computing by graph transformation
Efficient Graph Rewriting and Its Implementation
Efficient Graph Rewriting and Its Implementation
Issues in the Practical Use of Graph Rewriting
Selected papers from the 5th International Workshop on Graph Gramars and Their Application to Computer Science
k-anonymity: a model for protecting privacy
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
Jena: implementing the semantic web recommendations
Proceedings of the 13th international World Wide Web conference on Alternate track papers & posters
Graph-based specification of access control policies
Journal of Computer and System Sciences
Mining Taverna's semantic web of provenance
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
SPARQLeR: Extended Sparql for Semantic Association Discovery
ESWC '07 Proceedings of the 4th European conference on The Semantic Web: Research and Applications
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Extending SPARQL with regular expression patterns (for querying RDF)
Web Semantics: Science, Services and Agents on the World Wide Web
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
The Open Provenance Model core specification (v1.1)
Future Generation Computer Systems
ICGT'06 Proceedings of the Third international conference on Graph Transformations
Graph transformation in constant time
ICGT'06 Proceedings of the Third international conference on Graph Transformations
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
A cloud-based RDF policy engine for assured information sharing
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Dependency path patterns as the foundation of access control in provenance-aware systems
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Cloud-Centric assured information sharing
PAISI'12 Proceedings of the 2012 Pacific Asia conference on Intelligence and Security Informatics
Design and implementation of a cloud-based assured information sharing system
MMM-ACNS'12 Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security
Towards provenance and risk-awareness in social computing
Proceedings of the First International Workshop on Secure and Resilient Architectures and Systems
A propagation model for provenance views of public/private workflows
Proceedings of the 16th International Conference on Database Theory
Hi-index | 0.00 |
Ongoing mutual relationships among entities rely on sharing quality information while preventing release of sensitive content. Provenance records the history of a document for ensuring both, the quality and trustworthiness; while redaction identifies and removes sensitive information from a document. Traditional redaction techniques do not extend to the directed graph representation of provenance. In this paper, we propose a graph grammar approach for rewriting redaction policies over provenance. Our rewriting procedure converts a high level specification of a redaction policy into a graph grammar rule that transforms a provenance graph into a redacted provenance graph. Our prototype shows that this approach can be effectively implemented using Semantic Web technologies.