1. Ahmed, I., Khan, A., Khan, M.S., Ahmed, M.: Aggregated signatures for chaining: a secure provenance scheme. In: 2016 IEEE Trustcom/BigDataSE/ISPA, pp. 2012–2017, August 2016
2. Lecture Notes in Computer Science;RJ Anderson,1994
3. Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the 3rd Conference on Hot Topics in Security, HOTSEC 2008, Berkeley, CA, USA, pp. 4:1–4:5. USENIX Association (2008)
4. Chapman, M., et al.: Computational Argumentation-based Clinical Decision Support. In: Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, AAMAS 2019, pp. 2345–2347, Richland, SC. International Foundation for Autonomous Agents and Multiagent Systems (2019)
5. Curcin, V., Fairweather, E., Danger, R., Corrigan, D.: Templates as a method for implementing data provenance in decision support systems. J. Biomed. Inf. 65, 1–21 (2017)