Publisher
Springer International Publishing
Reference19 articles.
1. Hasan, R., Sion, R., Winslett, M.: Introducing Secure Provenance: Problems and Challenges. In: Proc. of ACM Workshop on Storage Security and Survivability, pp. 13–18 (2007)
2. Cheney, J., Chiticariu, L., Tan, W.-C.: Provenance in Databases: Why, How, and Where. Foundations and Trends in Databases 1(4), 379–474 (2007)
3. Braun, U., Shinnar, A.: A Security Model for Provenance. Technical Report, TR-04-06, Harvard University (2006)
4. Hasan, R., Sion, R., Winslett, M.: The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. In: Proc. of the 7th USENIX Conf. on File and Storage Technologies, pp. 1–14 (2009)
5. Tan, W.-C.: Provenance in Databases: Past, Current, and Future. IEEE Data Eng. Bull. 30(4), 3–12 (2007)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献