An Access Control Model for Protecting Provenance Graphs


Autoria(s): Chen, Liang; Edwards, Peter; Nelson, John Donald; Norman, Timothy James Forester
Data(s)

03/06/2016

03/06/2016

2015

Formato

8

Identificador

Chen , L , Edwards , P , Nelson , J D & Norman , T J F 2015 , ' An Access Control Model for Protecting Provenance Graphs ' . in Proceedings of the 13th Annual International Conference on Privacy, Security and Trust - PST 2015 . IEEE Press , pp. 125-132 . , 10.1109/PST.2015.7232963

978-1-4673-7828-4

PURE: 67130702

PURE UUID: b56addd4-21aa-4f9f-82c4-da0cce148bda

http://hdl.handle.net/2164/6080

http://dx.doi.org/10.1109/PST.2015.7232963

Idioma(s)

eng

Publicador

IEEE Press

Relação

Proceedings of the 13th Annual International Conference on Privacy, Security and Trust - PST 2015

Direitos

© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Palavras-Chave #provenance #access control #constraints #QA75 Electronic computers. Computer science #QA75
Tipo

Conference item

Contribuinte(s)

University of Aberdeen, Natural & Computing Sciences, Computing Science

University of Aberdeen, dot.rural Digital Economy Hub

University of Aberdeen, School of Engineering, Engineering

Resumo

Postprint