Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
he recent digitization of more than twenty million books has been led by initiatives from countries wishing to preserve their cultural heritage and by commercial endeavors, such a...
Bing Hu, Thanawin Rakthanmanon, Bilson J. L. Campa...
Abstract— Recently, lots of micro-blog message sharing applications have emerged on the web. Users can publish short messages freely and get notified by the subscriptions instan...
Most application provenance systems are hard coded for a particular type of system or data, while current provenance file systems maintain in-memory provenance graphs and reside i...
Richard P. Spillane, Russell Sears, Chaitanya Yala...
Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such ...