Securing Provenance-Based Audits, IPAW, pp.148-164, 2010. ,
DOI : 10.1109/ICDE.2009.125
Applying provenance in distributed organ transplant management, IPAW, pp.28-36, 2006. ,
Unrestricted Aggregate Signatures, ICALP, pp.411-422, 2007. ,
DOI : 10.1007/978-3-540-73420-8_37
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, EUROCRYPT, pp.416-432, 2003. ,
DOI : 10.1007/3-540-39200-9_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459
Securing provenance, The 3rd USENIX Workshop on Hot Topics in Security USENIX HotSec, pp.1-5, 2008. ,
Tamás Kifor, and László Zsolt Varga. Navigating provenance information for distributed healthcare management, Web Intelligence, pp.859-865, 2006. ,
The Origin of Data: Enabling the Determination of Provenance in Multi-institutional Scientific Systems through the Documentation of Processes, 2007. ,
Recording process documentation for provenance, IEEE Trans. Parallel Distrib. Syst, vol.20, issue.9, pp.1246-1259, 2009. ,
How to time-stamp a digital document, J. Cryptology, vol.3, issue.2, pp.99-111, 1991. ,
DOI : 10.1007/bf00196791
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.8740
Introducing secure provenance, Proceedings of the 2007 ACM workshop on Storage security and survivability , StorageSS '07, pp.13-18, 2007. ,
DOI : 10.1145/1314313.1314318
The case of the fake picasso: Preventing history forgery with secure provenance, 7th Conference on File and Storage Technologies, pp.1-14, 2009. ,
Preventing history forgery with secure provenance, ACM Transactions on Storage, vol.5, issue.4, pp.1-1243, 2009. ,
DOI : 10.1145/1629080.1629082
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.7355
Provenance in agent-mediated healthcare systems, IEEE Intelligent Systems, vol.21, issue.6, pp.38-46, 2006. ,
Extracting causal graphs from an open provenance data model. Concurrency and Computation: Practice and Experience, pp.577-586, 2008. ,
DOI : 10.1002/cpe.1236
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.6675
The Open Provenance Model core specification (v1.1), Future Generation Computer Systems, vol.27, issue.6, pp.743-756, 2011. ,
DOI : 10.1016/j.future.2010.07.005
The Open Provenance Model: An Overview, IPAW, pp.323-326, 2008. ,
DOI : 10.1007/978-3-540-89965-5_31
Foundations for Provenance-Aware Systems, 2010. ,
A survey of data provenance in e-science, SIGMOD Record, pp.31-36, 2005. ,
DOI : 10.1145/1084805.1084812
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance, IFIP WG ,
DOI : 10.1007/978-3-642-13739-6_22
URL : https://hal.archives-ouvertes.fr/hal-01056678
Securing Provenance of Distributed Processes in an Untrusted Environment, IEICE Transactions on Information and Systems, vol.95, issue.7, pp.95-1894, 2012. ,
DOI : 10.1587/transinf.E95.D.1894
Security Issues in a SOA-Based Provenance System, IPAW, pp.203-211, 2006. ,
DOI : 10.1007/11890850_21