R. Aldeco-pérez and L. Moreau, Securing Provenance-Based Audits, IPAW, pp.148-164, 2010.
DOI : 10.1109/ICDE.2009.125

S. Alvarez-napagao, J. Vázquez-salceda, T. Kifor, L. Z. Varga, and S. Willmott, Applying provenance in distributed organ transplant management, IPAW, pp.28-36, 2006.

M. Bellare, C. Namprempre, and G. Neven, Unrestricted Aggregate Signatures, ICALP, pp.411-422, 2007.
DOI : 10.1007/978-3-540-73420-8_37

D. Boneh, C. Gentry, B. Lynn, and H. Shacham, Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, EUROCRYPT, pp.416-432, 2003.
DOI : 10.1007/3-540-39200-9_26

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459

U. Braun, A. Shinnar, and M. Seltzer, Securing provenance, The 3rd USENIX Workshop on Hot Topics in Security USENIX HotSec, pp.1-5, 2008.

V. Deora, A. Contes, O. F. Rana, S. Rajbhandari, and I. Wootten, Tamás Kifor, and László Zsolt Varga. Navigating provenance information for distributed healthcare management, Web Intelligence, pp.859-865, 2006.

T. Paul and . Groth, The Origin of Data: Enabling the Determination of Provenance in Multi-institutional Scientific Systems through the Documentation of Processes, 2007.

T. Paul, L. Groth, and . Moreau, Recording process documentation for provenance, IEEE Trans. Parallel Distrib. Syst, vol.20, issue.9, pp.1246-1259, 2009.

S. Haber and W. S. Stornetta, How to time-stamp a digital document, J. Cryptology, vol.3, issue.2, pp.99-111, 1991.
DOI : 10.1007/bf00196791

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.46.8740

R. Hasan, R. Sion, and M. Winslett, Introducing secure provenance, Proceedings of the 2007 ACM workshop on Storage security and survivability , StorageSS '07, pp.13-18, 2007.
DOI : 10.1145/1314313.1314318

R. Hasan, R. Sion, and M. Winslett, The case of the fake picasso: Preventing history forgery with secure provenance, 7th Conference on File and Storage Technologies, pp.1-14, 2009.

R. Hasan, R. Sion, and M. Winslett, Preventing history forgery with secure provenance, ACM Transactions on Storage, vol.5, issue.4, pp.1-1243, 2009.
DOI : 10.1145/1629080.1629082

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.7355

S. Willmott, S. Miles, and L. Moreau, Provenance in agent-mediated healthcare systems, IEEE Intelligent Systems, vol.21, issue.6, pp.38-46, 2006.

S. Miles, P. T. Groth, S. Munroe, S. Jiang, T. Assandri et al., Extracting causal graphs from an open provenance data model. Concurrency and Computation: Practice and Experience, pp.577-586, 2008.
DOI : 10.1002/cpe.1236

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.135.6675

L. Moreau, B. Clifford, J. Freire, J. Futrelle, Y. Gil et al., The Open Provenance Model core specification (v1.1), Future Generation Computer Systems, vol.27, issue.6, pp.743-756, 2011.
DOI : 10.1016/j.future.2010.07.005

L. Moreau, J. Freire, J. Futrelle, R. E. Mcgrath, J. Myers et al., The Open Provenance Model: An Overview, IPAW, pp.323-326, 2008.
DOI : 10.1007/978-3-540-89965-5_31

. Kiran-kumar-muniswamy-reddy, Foundations for Provenance-Aware Systems, 2010.

Y. Simmhan, B. Plale, and D. Gannon, A survey of data provenance in e-science, SIGMOD Record, pp.31-36, 2005.
DOI : 10.1145/1084805.1084812

A. Syalim, T. Nishide, and K. Sakurai, Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance, IFIP WG
DOI : 10.1007/978-3-642-13739-6_22

URL : https://hal.archives-ouvertes.fr/hal-01056678

A. Syalim, T. Nishide, and K. Sakurai, Securing Provenance of Distributed Processes in an Untrusted Environment, IEICE Transactions on Information and Systems, vol.95, issue.7, pp.95-1894, 2012.
DOI : 10.1587/transinf.E95.D.1894

V. Tan, P. T. Groth, S. Miles, S. Jiang, S. Munroe et al., Security Issues in a SOA-Based Provenance System, IPAW, pp.203-211, 2006.
DOI : 10.1007/11890850_21