A provenance-based access control model
暂无分享,去创建一个
[1] Margo I. Seltzer,et al. Securing Provenance , 2008, HotSec.
[2] Marianne Winslett,et al. Preventing history forgery with secure provenance , 2009, TOS.
[3] Adriane Chapman,et al. PLUS: A provenance manager for integrated information , 2011, 2011 IEEE International Conference on Information Reuse & Integration.
[4] Paul T. Groth,et al. Security Issues in a SOA-Based Provenance System , 2006, IPAW.
[5] Bhavani M. Thuraisingham,et al. A language for provenance access control , 2011, CODASPY '11.
[6] Dan Suciu,et al. Regular Paths in SparQL: Querying the NCI Thesaurus , 2008, AMIA.
[7] Thomas Heinis,et al. Efficient lineage tracking for scientific workflows , 2008, SIGMOD Conference.
[8] Adriane Chapman,et al. Efficient provenance storage , 2008, SIGMOD Conference.
[9] Ravi S. Sandhu,et al. Separation of Duties in Computerized Information Systems , 1990, DBSec.
[10] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[11] Yogesh L. Simmhan,et al. The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..
[12] Jaehong Park,et al. On data provenance in group-centric secure collaboration , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[13] Shouhuai Xu,et al. An Access Control Language for a General Provenance Model , 2009, Secure Data Management.
[14] Vipin Chaudhary,et al. History-based access control for mobile code , 1998, CCS '98.
[15] Ravi Sandhu,et al. Transaction control expressions for separation of duties , 1988, [Proceedings 1988] Fourth Aerospace Computer Security Applications.
[16] Marianne Winslett,et al. Introducing secure provenance: problems and challenges , 2007, StorageSS '07.
[17] Martín Abadi,et al. Access Control Based on Execution History , 2003, NDSS.
[18] Adriane Chapman,et al. Surrogate Parenthood: Protected and Informative Graphs , 2011, Proc. VLDB Endow..
[19] James Cheney,et al. Provenance management in curated databases , 2006, SIGMOD Conference.
[20] Ravi S. Sandhu,et al. Towards a framework for group-centric secure collaboration , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.
[21] Anindya Banerjee,et al. History-Based Access Control and Secure Information Flow , 2004, CASSIS.
[22] Paul T. Groth,et al. Representing distributed systems using the Open Provenance Model , 2011, Future Gener. Comput. Syst..
[23] Adriane Chapman,et al. Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information , 2011, 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).
[24] Mary Ellen Zurko,et al. Separation of duty in role-based environments , 1997, Proceedings 10th Computer Security Foundations Workshop.
[25] Bhavani M. Thuraisingham,et al. Transforming provenance using redaction , 2011, SACMAT '11.