1. Braun, U., Shinnar, A. and Seltzer, M. Securing provenance, Proceedings of the 3rd Conference on Hot Topics in Security, USENIX Association, 2008.
2. Cirincione, G., Govindan, R., Krishnamurthy, S., Porta, T. F. L. and Mohapatra, P. Impact of security properties on the quality of information in tactical military networks, Proceedings Military Communications Conference, MILCOM, 2010.
3. Greenwood, M., Goble, C., Stevens, R., Zhao, J., Addis, M., Marvin, D., Moreau, L. and Oinn, T. Provenance of e-science experiments-experience from bioinformatics, Proceedings of the UK OST e-Science Second All Hands Meeting, 2003.