Sciweavers

813 search results - page 4 / 163
» Pipeline-centric provenance model
Sort
View
DBSEC
2010
196views Database» more  DBSEC 2010»
13 years 2 months ago
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Abstract. This paper describes how to preserve integrity and confidentiality of a directed acyclic graph (DAG) model of provenance database. We show a method to preserve integrity ...
Amril Syalim, Takashi Nishide, Kouichi Sakurai
DILS
2006
Springer
13 years 9 months ago
Towards a Model of Provenance and User Views in Scientific Workflows
Scientific experiments are becoming increasingly large and complex, with a commensurate increase in the amount and complexity of data generated. Data, both intermediate and final r...
Shirley Cohen, Sarah Cohen Boulakia, Susan B. Davi...
SDMW
2009
Springer
14 years 9 days ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
BTW
2007
Springer
123views Database» more  BTW 2007»
13 years 12 months ago
Data Provenance: A Categorization of Existing Approaches
: In many application areas like e-science and data-warehousing detailed information about the origin of data is required. This kind of information is often referred to as data pro...
Boris Glavic, Klaus R. Dittrich
BPM
2010
Springer
155views Business» more  BPM 2010»
13 years 6 months ago
PAPEL: A Language and Model for Provenance-Aware Policy Definition and Execution
The processing of data is often restricted by contractual and legal requirements for protecting privacy and IPRs. Policies provide means to control how and by whom data is processe...
Christoph Ringelstein, Steffen Staab