An access control model for protecting provenance graphs. Chen, L., Edwards, P., Nelson, J. D., & Norman, T. J. In Ghorbani, A. A., Torra, V., Hisil, H., Miri, A., Koltuksuz, A., Zhang, J., Sensoy, M., García-Alfaro, J., & Zincir, I., editors, PST, pages 125-132, 2015. IEEE.
An access control model for protecting provenance graphs. [link]Link  An access control model for protecting provenance graphs. [link]Paper  bibtex   
@inproceedings{ conf/pst/ChenENN15,
  added-at = {2015-09-07T00:00:00.000+0200},
  author = {Chen, Liang and Edwards, Peter and Nelson, John D. and Norman, Timothy J.},
  biburl = {http://www.bibsonomy.org/bibtex/22f6d24fdc6901f06900eaa61489d6736/dblp},
  booktitle = {PST},
  crossref = {conf/pst/2015},
  editor = {Ghorbani, Ali A. and Torra, Vincenç and Hisil, Hüseyin and Miri, Ali and Koltuksuz, Ahmet and Zhang, Jie and Sensoy, Murat and García-Alfaro, Joaquín and Zincir, Ibrahim},
  ee = {http://dx.doi.org/10.1109/PST.2015.7232963},
  interhash = {acc2dde3f76d1301335602966d8b7d73},
  intrahash = {2f6d24fdc6901f06900eaa61489d6736},
  isbn = {978-1-4673-7828-4},
  keywords = {dblp},
  pages = {125-132},
  publisher = {IEEE},
  title = {An access control model for protecting provenance graphs.},
  url = {http://dblp.uni-trier.de/db/conf/pst/pst2015.html#ChenENN15},
  year = {2015}
}

Downloads: 0