参考文献
[1]高明,金澈清,王晓玲.数据世系管理技术研究综述[J].计算机学报,2010,33(3):373-389.
[2]明华,张勇,符小辉.数据溯源技术综述[J].小型微型计算机系统,2012,33(9):1917-1923.
[3]戴超凡,王涛,张鹏程.数据起源技术发展研究综述[J].计算机应用研究,2010,27(9):3215-3221.
[4]HUYNH T D,MOREAU L.Provenance for Online Decision Making[C]//Proceedings of the 5th International Provenance and Annotation Workshop.Berlin,Germany:Springer,2014:44-55.
[5]FREIRE J,KOOP D,SANTOS E.Provenance for Computational Tasks:A Survey[J].Computing in Science & Engineering,2008,10(3):11-21.
[6]DAVIDSON S B,FREIRE J.Provenance and Scientific Workflows:Challenges and Opportunities[C]//Proceedings of ACM Sigmod International Conference on Management of Data.New York,USA:ACM Press,2008:1345-1350.
[7]孙连山,祁志斌,侯涛.一种基于UML模型的起源感知访问控制策略分析方法[J].计算机工程与科学,2015,37(6):1114-1126.
[8]MOREAU L,MISSIER P.The PROV Data Model and Abstract Syntax Notation[EB/OL].(2011-12-15).https://www.w3.org/TR/2011/WD-prov-dm-20111215/.
[9]CHENEY J,PERERA R.An Analytical Survey of Provenance Sanitization[C]//Proceedings of the 5th IPAW on Provenance and Annotation of Data and Processes.Berlin,Germany:Springer,2014:113-126.
[10]石丽波,孙连山,王艺星.数据起源安全研究综述[J].计算机应用研究,2017,34(1):1-7.
[11]DANGER R,CURCIN V,MISSIER P.Access Control and View Generation for Provenance Graphs[J].Future Generation Computer Systems,2015,49(8):8-27.
[12]NAGY N,MOKHTAR H M O,EL-SHARKAWI M E.A Comprehensive Sanitization Approach for Workflow Provenance Graphs[C]//Proceedings of International Workshop on Privacy and Anonymity in the Information Society.Berlin,Germany:Springer,2016:22-33.
[13]MISSIER P,BRYANS J,GAMBLE C.Provenance Graph Abstraction by Node Grouping:CS-TR-1393[R].Nowcastle,UK:Newcastle University,2013.
[14]MOREAU L,CLIFFORD B,FUTRELLE J,et al.The Open Provenance Model Core Specification[J].Future Generation Computer System,2011,27(6):743-756.
[15]MISSIER P,BELHAJJAME K,CHENEY J.The W3C PROV Family of Specifications for Modelling Provenance Metadata[C]//Proceedings of the 16th International Conference on Extending Database Technology.New York,USA:ACM Press,2013:773-756.
[16]DAVIDSON S B,KHANNA S,ROY S,et al.On Provenance and Privacy[C]//Proceedings of the 14th International Conference on Database Theory.New York,USA:ACM Press,2011:175-186.
[17]CADENHEAD T,KHADILKAR V,KANTARCIOGLU M,et al.Transforming Provenance Using Redaction[C]// Proceedings of ACM Symposium on Access Control MODELS and Technologies.New York,USA:ACM Press,2011:93-102.
[18]MISSIER P,BRYANS J,GAMBLE C.ProvAbs:Model,Policy,and Tooling for Abstracting PROV Graphs[C]//Proceedings of the 5th IPAW on Provenance and Annotation of Data and Processes.Berlin,Germany:Springer,2014:3-15.
[19]HUSSEIN J,MOREAU L,SASSONE V.Obscuring Provenance Confidential Information via Graph Transformation[C]//Proceedings of the 9th IFIP International Conference on Trust Management.Berlin,Germany:Springer,2016:109-125.
[20]KWASNIKOWSKA N,MOREAU L,BUSSCHE J V D.A Formal Account of the Open Provenance Model[J].ACM Transactions on the Web,2015,9(2):1-44.
编辑顾逸斐 |