1. Aggregated signatures for chaining: a secure provenance scheme;Ahmed,2016
2. Secure data provenance for the internet of things;Aman,2017
3. Securing data provenance in the cloud;Asghar,2012
4. Differencing provenance in scientific workflows;Bao,2009
5. Why and where provenance: a characterization of data provenance;Buneman,2001