Maas finland ,
Data Security and Privacy Protection Issues in Cloud Computing, 2012 International Conference on Computer Science and Electronics Engineering, pp.647-651, 2012. ,
DOI : 10.1109/ICCSEE.2012.193
A survey on security issues in service delivery models of cloud computing, Journal of Network and Computer Applications, vol.34, issue.1, pp.1-11, 2011. ,
DOI : 10.1016/j.jnca.2010.07.006
Mydata a nordic model for human-centered personal data management and processing, " tech. rep., Ministry of Transport Finland, 2010. ,
Red Hat SELinux Guide ,
Overview and Framework for Data and Information Quality Research, Journal of Data and Information Quality, vol.1, issue.1, pp.1-222, 2009. ,
DOI : 10.1145/1515693.1516680
Data Quality Requirements of Collaborative Business Processes, 2012 45th Hawaii International Conference on System Sciences, pp.4316-4325, 2012. ,
DOI : 10.1109/HICSS.2012.8
Quality-aware service-oriented data integration, ACM SIGMOD Record, vol.41, issue.1, pp.11-19, 2012. ,
DOI : 10.1145/2206869.2206873
A survey of data provenance in e-science, ACM SIGMOD Record, vol.34, issue.3, pp.31-36, 2005. ,
DOI : 10.1145/1084805.1084812
A Protocol for Recording Provenance in Service-Oriented Grids, Principles of Distributed Systems, pp.124-139, 2004. ,
DOI : 10.1007/11516798_9
Data provenance in SOA: security, reliability, and integrity, Service Oriented Computing and Applications, pp.223-247, 2007. ,
DOI : 10.1007/s11761-007-0018-8
A survey of data provenance in e-science, ACM SIGMOD Record, vol.34, issue.3, pp.31-36, 2005. ,
DOI : 10.1145/1084805.1084812
An annotation management system for relational databases, The VLDB Journal, vol.27, issue.4, pp.373-396, 2005. ,
DOI : 10.1007/s00778-005-0156-6
A survey of data provenance techniques, 2005. ,
Data-Provenance Verification For Secure Hosts, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.2, pp.173-183, 2012. ,
DOI : 10.1109/TDSC.2011.50
Distributed data provenance for large-scale data-intensive computing, 2013 IEEE International Conference on Cluster Computing (CLUSTER), pp.1-8, 2013. ,
DOI : 10.1109/CLUSTER.2013.6702685
A Digital Signature Based on a Conventional Encryption Function, pp.369-378, 1988. ,
DOI : 10.1007/3-540-48184-2_32
Adding geospatial data provenance into sdia service-oriented approach Selected Topics in Applied Earth Observations and Remote Sensing, IEEE Journal, vol.8, issue.2, pp.926-936, 2015. ,
A survey of trust and reputation systems for online service provision, Decision Support Systems, vol.43, issue.2, pp.618-644, 2007. ,
DOI : 10.1016/j.dss.2005.05.019
Web-based reputation management systems: Problems and suggested solutions, pp.403-417 ,
Reputation systems, Communications of the ACM, vol.43, issue.12, pp.45-48, 2000. ,
DOI : 10.1145/355112.355122
Provenance-based trustworthiness assessment in sensor networks, Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, DMSN '10, pp.2-7, 2010. ,
DOI : 10.1145/1858158.1858162
Machine learningbased anomaly detection for post-silicon bug diagnosis, Proceedings of the Conference on Design, Automation and Test in Europe, DATE '13, pp.491-496, 2013. ,
Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007. ,
DOI : 10.1109/ACSAC.2007.21
Static and dynamic analysis: Synergy and duality, WODA 2003: ICSE Workshop on Dynamic Analysis, pp.24-27, 2003. ,