An access control model for protecting provenance graphs. Chen, L., Edwards, P., Nelson, J. D., & Norman, T. J. In Ghorbani, A. A., Torra, V., Hisil, H., Miri, A., Koltuksuz, A., Zhang, J., Sensoy, M., García-Alfaro, J., & Zincir, I., editors, PST, pages 125-132, 2015. IEEE. Link Paper bibtex @inproceedings{ conf/pst/ChenENN15,
added-at = {2015-09-07T00:00:00.000+0200},
author = {Chen, Liang and Edwards, Peter and Nelson, John D. and Norman, Timothy J.},
biburl = {http://www.bibsonomy.org/bibtex/22f6d24fdc6901f06900eaa61489d6736/dblp},
booktitle = {PST},
crossref = {conf/pst/2015},
editor = {Ghorbani, Ali A. and Torra, Vincenç and Hisil, Hüseyin and Miri, Ali and Koltuksuz, Ahmet and Zhang, Jie and Sensoy, Murat and García-Alfaro, Joaquín and Zincir, Ibrahim},
ee = {http://dx.doi.org/10.1109/PST.2015.7232963},
interhash = {acc2dde3f76d1301335602966d8b7d73},
intrahash = {2f6d24fdc6901f06900eaa61489d6736},
isbn = {978-1-4673-7828-4},
keywords = {dblp},
pages = {125-132},
publisher = {IEEE},
title = {An access control model for protecting provenance graphs.},
url = {http://dblp.uni-trier.de/db/conf/pst/pst2015.html#ChenENN15},
year = {2015}
}
Downloads: 0
{"_id":"aHDipbxBCePpDgjLm","bibbaseid":"chen-edwards-nelson-norman-anaccesscontrolmodelforprotectingprovenancegraphs-2015","downloads":0,"creationDate":"2015-09-08T15:38:32.278Z","title":"An access control model for protecting provenance graphs.","author_short":["Chen, L.","Edwards, P.","Nelson, J.<nbsp>D.","Norman, T.<nbsp>J."],"year":2015,"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/john?items=1000","bibdata":{"added-at":"2015-09-07T00:00:00.000+0200","author":["Chen, Liang","Edwards, Peter","Nelson, John D.","Norman, Timothy J."],"author_short":["Chen, L.","Edwards, P.","Nelson, J.<nbsp>D.","Norman, T.<nbsp>J."],"bibtex":"@inproceedings{ conf/pst/ChenENN15,\n added-at = {2015-09-07T00:00:00.000+0200},\n author = {Chen, Liang and Edwards, Peter and Nelson, John D. and Norman, Timothy J.},\n biburl = {http://www.bibsonomy.org/bibtex/22f6d24fdc6901f06900eaa61489d6736/dblp},\n booktitle = {PST},\n crossref = {conf/pst/2015},\n editor = {Ghorbani, Ali A. and Torra, Vincenç and Hisil, Hüseyin and Miri, Ali and Koltuksuz, Ahmet and Zhang, Jie and Sensoy, Murat and García-Alfaro, Joaquín and Zincir, Ibrahim},\n ee = {http://dx.doi.org/10.1109/PST.2015.7232963},\n interhash = {acc2dde3f76d1301335602966d8b7d73},\n intrahash = {2f6d24fdc6901f06900eaa61489d6736},\n isbn = {978-1-4673-7828-4},\n keywords = {dblp},\n pages = {125-132},\n publisher = {IEEE},\n title = {An access control model for protecting provenance graphs.},\n url = {http://dblp.uni-trier.de/db/conf/pst/pst2015.html#ChenENN15},\n year = {2015}\n}","bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bibtex/22f6d24fdc6901f06900eaa61489d6736/dblp","booktitle":"PST","crossref":"conf/pst/2015","editor":["Ghorbani, Ali A.","Torra, Vincenç","Hisil, Hüseyin","Miri, Ali","Koltuksuz, Ahmet","Zhang, Jie","Sensoy, Murat","García-Alfaro, Joaquín","Zincir, Ibrahim"],"editor_short":["Ghorbani, A.<nbsp>A.","Torra, V.","Hisil, H.","Miri, A.","Koltuksuz, A.","Zhang, J.","Sensoy, M.","García-Alfaro, J.","Zincir, I."],"ee":"http://dx.doi.org/10.1109/PST.2015.7232963","id":"conf/pst/ChenENN15","interhash":"acc2dde3f76d1301335602966d8b7d73","intrahash":"2f6d24fdc6901f06900eaa61489d6736","isbn":"978-1-4673-7828-4","key":"conf/pst/ChenENN15","keywords":"dblp","pages":"125-132","publisher":"IEEE","title":"An access control model for protecting provenance graphs.","type":"inproceedings","url":"http://dblp.uni-trier.de/db/conf/pst/pst2015.html#ChenENN15","year":"2015","bibbaseid":"chen-edwards-nelson-norman-anaccesscontrolmodelforprotectingprovenancegraphs-2015","role":"author","urls":{"Link":"http://dx.doi.org/10.1109/PST.2015.7232963","Paper":"http://dblp.uni-trier.de/db/conf/pst/pst2015.html#ChenENN15"},"keyword":["dblp"],"downloads":0},"search_terms":["access","control","model","protecting","provenance","graphs","chen","edwards","nelson","norman"],"keywords":["dblp"],"authorIDs":[],"dataSources":["e3DPfiLXyfZxic3k2"]}