S. Pippuri, S. Hietanen, and K. Pyyhti, Maas finland

D. Chen and H. Zhao, Data Security and Privacy Protection Issues in Cloud Computing, 2012 International Conference on Computer Science and Electronics Engineering, pp.647-651, 2012.
DOI : 10.1109/ICCSEE.2012.193

S. Subashini and V. Kavitha, A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2011.
DOI : 10.1016/j.jnca.2010.07.006

K. K. Poikola and H. Honko, Mydata a nordic model for human-centered personal data management and processing, " tech. rep., Ministry of Transport Finland, 2010.

. Redhat, Red Hat SELinux Guide

S. E. Madnick, R. Y. Wang, Y. W. Lee, and H. Zhu, Overview and Framework for Data and Information Quality Research, Journal of Data and Information Quality, vol.1, issue.1, pp.1-222, 2009.
DOI : 10.1145/1515693.1516680

C. Falge, B. Otto, and H. Sterle, Data Quality Requirements of Collaborative Business Processes, 2012 45th Hawaii International Conference on System Sciences, pp.4316-4325, 2012.
DOI : 10.1109/HICSS.2012.8

S. Dustdar, R. Pichler, V. Savenkov, and H. Truong, Quality-aware service-oriented data integration, ACM SIGMOD Record, vol.41, issue.1, pp.11-19, 2012.
DOI : 10.1145/2206869.2206873

Y. L. Simmhan, B. Plale, and D. Gannon, A survey of data provenance in e-science, ACM SIGMOD Record, vol.34, issue.3, pp.31-36, 2005.
DOI : 10.1145/1084805.1084812

P. Groth, M. Luck, and L. Moreau, A Protocol for Recording Provenance in Service-Oriented Grids, Principles of Distributed Systems, pp.124-139, 2004.
DOI : 10.1007/11516798_9

W. Tsai, X. Wei, Y. Chen, R. Paul, J. Chung et al., Data provenance in SOA: security, reliability, and integrity, Service Oriented Computing and Applications, pp.223-247, 2007.
DOI : 10.1007/s11761-007-0018-8

Y. L. Simmhan, B. Plale, and D. Gannon, A survey of data provenance in e-science, ACM SIGMOD Record, vol.34, issue.3, pp.31-36, 2005.
DOI : 10.1145/1084805.1084812

D. Bhagwat, L. Chiticariu, W. Tan, and G. Vijayvargiya, An annotation management system for relational databases, The VLDB Journal, vol.27, issue.4, pp.373-396, 2005.
DOI : 10.1007/s00778-005-0156-6

Y. L. Simmhan, B. Plale, and D. Gannon, A survey of data provenance techniques, 2005.

K. Xu, H. Xiong, C. Wu, D. Stefan, and D. Yao, Data-Provenance Verification For Secure Hosts, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.2, pp.173-183, 2012.
DOI : 10.1109/TDSC.2011.50

D. Zhao, C. Shou, T. Malik, and I. Raicu, Distributed data provenance for large-scale data-intensive computing, 2013 IEEE International Conference on Cluster Computing (CLUSTER), pp.1-8, 2013.
DOI : 10.1109/CLUSTER.2013.6702685

R. C. Merkle and C. , A Digital Signature Based on a Conventional Encryption Function, pp.369-378, 1988.
DOI : 10.1007/3-540-48184-2_32

L. He, P. Yue, L. Di, M. Zhang, and L. Hu, Adding geospatial data provenance into sdia service-oriented approach Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal, vol.8, issue.2, pp.926-936, 2015.

A. Jsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007.
DOI : 10.1016/j.dss.2005.05.019

R. A. Malaga, Web-based reputation management systems: Problems and suggested solutions, pp.403-417

P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, Reputation systems, Communications of the ACM, vol.43, issue.12, pp.45-48, 2000.
DOI : 10.1145/355112.355122

H. Lim, Y. Moon, and E. Bertino, Provenance-based trustworthiness assessment in sensor networks, Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, DMSN '10, pp.2-7, 2010.
DOI : 10.1145/1858158.1858162

A. Deorio, Q. Li, M. Burgess, and V. Bertacco, Machine learningbased anomaly detection for post-silicon bug diagnosis, Proceedings of the Conference on Design, Automation and Test in Europe, DATE '13, pp.491-496, 2013.

A. Moser, C. Kruegel, and E. Kirda, Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007.
DOI : 10.1109/ACSAC.2007.21

M. D. Ernst, Static and dynamic analysis: Synergy and duality, WODA 2003: ICSE Workshop on Dynamic Analysis, pp.24-27, 2003.