An Access Control Model for Protecting Provenance Graphs
Data(s) |
03/06/2016
03/06/2016
2015
|
---|---|
Formato |
8 |
Identificador |
Chen , L , Edwards , P , Nelson , J D & Norman , T J F 2015 , ' An Access Control Model for Protecting Provenance Graphs ' . in Proceedings of the 13th Annual International Conference on Privacy, Security and Trust - PST 2015 . IEEE Press , pp. 125-132 . , 10.1109/PST.2015.7232963 978-1-4673-7828-4 PURE: 67130702 PURE UUID: b56addd4-21aa-4f9f-82c4-da0cce148bda |
Idioma(s) |
eng |
Publicador |
IEEE Press |
Relação |
Proceedings of the 13th Annual International Conference on Privacy, Security and Trust - PST 2015 |
Direitos |
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. |
Palavras-Chave | #provenance #access control #constraints #QA75 Electronic computers. Computer science #QA75 |
Tipo |
Conference item |
Contribuinte(s) |
University of Aberdeen, Natural & Computing Sciences, Computing Science University of Aberdeen, dot.rural Digital Economy Hub University of Aberdeen, School of Engineering, Engineering |
Resumo |
Postprint |