Secure Data Provenance and Inference Control with Semantic Web
暂无分享,去创建一个
Bhavani M. Thuraisingham | Murat Kantarcioglu | Vaibhav Khadilkar | Tyrone Cadenhead | Murat Kantarcioglu | B. Thuraisingham | V. Khadilkar | Tyrone Cadenhead
[1] Shouhuai Xu,et al. An Access Control Language for a General Provenance Model , 2009, Secure Data Management.
[2] Bijan Parsia,et al. Optimizations for Answering Conjunctive ABox Queries , 2006, Description Logics.
[3] Ana Luna Alonso,et al. I. Administration Policies , 2011 .
[4] Arif Ghafoor,et al. Scalable and effective test generation for access control systems , 2006 .
[5] C. M. Sperberg-McQueen,et al. Extensible Markup Language (XML) , 1997, World Wide Web J..
[6] Juliana Freire,et al. Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.
[7] GilYolanda,et al. Special Issue: The First Provenance Challenge , 2008 .
[8] Margo I. Seltzer,et al. Securing Provenance , 2008, HotSec.
[9] Dennis G. Kafura,et al. First experiences using XACML for access control in distributed systems , 2003, XMLSEC '03.
[10] Manfred Nagl,et al. Graph-Grammars and Their Application to Computer Science , 1982, Lecture Notes in Computer Science.
[11] Jeffrey M. Bradshaw,et al. Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder , 2003, SEMWEB.
[12] Luciano Serafini,et al. DRAGO: Distributed Reasoning Architecture for the Semantic Web , 2005, ESWC.
[13] Mohamed F. Mokbel,et al. RDF Data-Centric Storage , 2009, 2009 IEEE International Conference on Web Services.
[14] Dorothea Blostein,et al. Issues in the Practical Use of Graph Rewriting , 1994, TAGT.
[15] Sabrina De Capitani di Vimercati,et al. An algebra for composing access control policies , 2002, TSEC.
[16] Yogesh L. Simmhan,et al. A survey of data provenance in e-science , 2005, SGMD.
[17] Edith Schonberg,et al. Scalable Grounded Conjunctive Query Evaluation over Large and Expressive Knowledge Bases , 2008, SEMWEB.
[18] Martín Abadi,et al. Logic in access control , 2003, 18th Annual IEEE Symposium of Logic in Computer Science, 2003. Proceedings..
[19] James A. Hendler,et al. A Semantic Web approach to the provenance challenge , 2008, Concurr. Comput. Pract. Exp..
[20] Frank Hermann,et al. Sesqui-Pushout Rewriting , 2006, ICGT.
[21] Luigi V. Mancini,et al. Graph-based specification of access control policies , 2005, J. Comput. Syst. Sci..
[22] Chen Zhao,et al. Representation and Reasoning on RBAC: A Description Logic Approach , 2005, ICTAC.
[23] Geoffrey C. Fox,et al. Examining the Challenges of Scientific Workflows , 2007, Computer.
[24] Bhavani M. Thuraisingham,et al. ROWLBAC: representing role based access control in OWL , 2008, SACMAT '08.
[25] C. M. Sperberg-McQueen,et al. Extensible markup language , 1997 .
[26] Francesco Parisi-Presicce,et al. UML specification of access control policies and their formal verification , 2006, Software & Systems Modeling.
[27] Bijan Parsia,et al. Optimizations for answering conjunctive ABox queries: First results , 2006 .
[28] Anne Bridgman. Click Here To Buy. , 2000 .
[29] Paul T. Groth,et al. Security Issues in a SOA-Based Provenance System , 2006, IPAW.
[30] Luc Moreau,et al. The Foundations for Provenance on the Web , 2010, Found. Trends Web Sci..
[31] Frank van Harmelen,et al. Marvin: Distributed reasoning over large-scale Semantic Web data , 2009, J. Web Semant..
[32] Grigoris Antoniou,et al. Nonmonotonic reasoning , 1997 .
[33] Kouichi Sakurai,et al. Grouping Provenance Information to Improve Efficiency of Access Control , 2009, ISA.
[34] Yogesh L. Simmhan,et al. The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..
[35] Detlef Plump,et al. Graph Transformation in Constant Time , 2006, ICGT.
[36] Manolis Koubarakis,et al. RDFS Reasoning and Query Answering on Top of DHTs , 2008, SEMWEB.
[37] Paul T. Groth,et al. An Architecture for Provenance Systems , 2006 .
[38] Viktor K. Prasanna,et al. A Data Partitioning Approach for Parallelizing Rule Based Inferencing for Materialized OWL Knowledge Bases , 2008, ISCA PDCCS.
[39] Bhavani M. Thuraisingham,et al. A language for provenance access control , 2011, CODASPY '11.
[40] Yogesh L. Simmhan,et al. A survey of data provenance techniques , 2005 .
[41] James A. Hendler,et al. N3Logic: A logical framework for the World Wide Web , 2007, Theory and Practice of Logic Programming.
[42] Tao Xie,et al. Xengine: a fast and scalable XACML policy evaluation engine , 2008, SIGMETRICS '08.
[43] Arnon Rosenthal,et al. PLUS: Synthesizing privacy, lineage, uncertainty and security , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.
[44] Roberto Tamassia,et al. A Role and Attribute Based Access Control System Using Semantic Web Technologies , 2007, OTM Workshops.
[45] Michael Hicks,et al. Combining Provenance and Security Policies in a Web-based Document Management System , 2007 .
[46] Uri Braun,et al. A Security Model for Provenance , 2006 .
[47] Heiko Dörr,et al. Efficient Graph Rewriting and Its Implementation , 1995, Lecture Notes in Computer Science.
[48] Allen S. Mandel. Comment … , 1978, British heart journal.
[49] Ravishankar K. Iyer,et al. Experimental evaluation , 1995 .
[50] James A. Hendler,et al. Analyzing web access control policies , 2007, WWW '07.
[51] J. Heflin,et al. A Scalable Approach for Partitioning OWL Knowledge Bases , 2006 .
[52] Andy Seaborne,et al. Clustered TDB: A Clustered Triple Store for Jena , 2008 .
[53] C. M. Sperberg-McQueen,et al. eXtensible Markup Language (XML) 1.0 (Second Edition) , 2000 .
[54] Adriane Chapman,et al. Scalable Access Controls for Lineage , 2009, Workshop on the Theory and Practice of Provenance.
[55] Marianne Winslett,et al. Introducing secure provenance: problems and challenges , 2007, StorageSS '07.