Computing on authenticated data, J. Cryptology, vol.28, issue.2, 2015. ,
Escrow-free encryption supporting cryptographic workflow, International Journal of Information Security, vol.22, issue.4, 2006. ,
DOI : 10.1017/CBO9780511546570
Sanitizable Signatures, ESORICS 2005 ,
DOI : 10.1007/11555827_10
Policy-Based Cryptography and Applications, 2005. ,
DOI : 10.1007/11507840_7
URL : https://hal.archives-ouvertes.fr/pastel-00002525
Policy-Based Signatures, PKC 2014 ,
DOI : 10.1007/978-3-642-54631-0_30
How Usage Control and Provenance Tracking Get Together - A Data Protection Perspective, 2013 IEEE Security and Privacy Workshops ,
DOI : 10.1109/SPW.2013.24
Secure Proxy Signature Schemes for Delegation of??Signing??Rights, Journal of Cryptology, vol.22, issue.8, 2012. ,
DOI : 10.1109/RISP.1991.130793
Functional Signatures and Pseudorandom Functions, PKC 2014 ,
DOI : 10.1007/978-3-642-54631-0_29
Security of Sanitizable Signatures Revisited, PKC 2009 ,
DOI : 10.1007/978-3-540-30598-9_12
Sanitizable signatures: How to partially delegate control for authenticated data, BIOSIG 2009. LNI ,
Unlinkability of Sanitizable Signatures, PKC 2010 ,
DOI : 10.1007/978-3-642-13013-7_26
Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures, EuroPKI 2013 ,
DOI : 10.1007/978-3-642-53997-8_2
Non-interactive Public Accountability for Sanitizable Signatures, EuroPKI 2012 ,
DOI : 10.1007/978-3-642-40012-4_12
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions, ASI- ACRYPT 2015 ,
DOI : 10.1007/978-3-662-48800-3_11
On Extended Sanitizable Signature Schemes, CT-RSA 2010 ,
DOI : 10.1007/978-3-642-11925-5_13
Sanitizable Signatures with Several Signers and Sanitizers, AFRICACRYPT 2012 ,
DOI : 10.1007/978-3-642-31410-0_3
Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials, DBSec 2014 ,
DOI : 10.1007/978-3-662-43936-4_4
URL : https://hal.archives-ouvertes.fr/hal-01284842
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives, CT-RSA 2015 ,
DOI : 10.1007/978-3-319-16715-2_7
A General Framework for Redactable Signatures and New Constructions, ICISC 2015 ,
DOI : 10.1007/978-3-319-30840-1_1
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes, ProvSec 2015 ,
DOI : 10.1007/978-3-319-26059-4_25
Policy Privacy in Cryptographic Access Control, 2015 IEEE 28th Computer Security Foundations Symposium, p.2015 ,
DOI : 10.1109/CSF.2015.11
Provenance for Computational Tasks: A Survey, Computing in Science & Engineering, vol.10, issue.3, 2008. ,
DOI : 10.1109/MCSE.2008.79
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks, SIAM Journal on Computing, vol.17, issue.2, 1988. ,
DOI : 10.1137/0217017
Fully-Secure and Practical Sanitizable Signatures, InsCrypt 2010 ,
DOI : 10.1007/978-3-540-89641-8_6
Blank digital signatures, Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security, ASIA CCS '13 ,
DOI : 10.1145/2484313.2484324
URL : https://hal.archives-ouvertes.fr/hal-01431579
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes, INDOCRYPT 2013 ,
DOI : 10.1007/978-3-319-03515-4_5
Towards Automated Processing of the Right of Access in Inter-organizational Web Service Compositions, 2010 6th World Congress on Services, 2010. ,
DOI : 10.1109/SERVICES.2010.56
Information technology ? Object Management Group Business Process Model and Notation, 2013. ,
On the complementarity of workflow management and business process modeling, ACM SIGOIS Bulletin, vol.16, issue.1, 1995. ,
DOI : 10.1145/209891.209899
Homomorphic Signature Schemes, CT-RSA 2002, p.2271 ,
DOI : 10.1007/3-540-45760-7_17
Append-Only Signatures, ICALP 2005 ,
DOI : 10.1007/11523468_36
Extended Sanitizable Signatures, ICISC 2006 ,
DOI : 10.1007/11927587_28
Workflow Signatures for Business Process Compliance, IEEE Transactions on Dependable and Secure Computing, vol.9, issue.5, 2012. ,
DOI : 10.1109/TDSC.2012.38
Multi-key Hierarchical Identity-Based Signatures, IMACC 2007 ,
DOI : 10.1007/978-3-540-77272-9_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.100.7044
Secure provenance, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755723
Proxy signatures for delegating signing operation, Proceedings of the 3rd ACM conference on Computer and communications security , CCS '96, 1996. ,
DOI : 10.1145/238168.238185
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.88, issue.1, 2005. ,
DOI : 10.1093/ietfec/E88-A.1.239
Enforcing Integrity of Execution in Distributed Workflow Management Systems, IEEE International Conference on Services Computing (SCC 2007), 2007. ,
DOI : 10.1109/SCC.2007.57
Traceability and Integrity of Execution in Distributed Workflow Management Systems, ESORICS 2007 ,
DOI : 10.1007/978-3-540-74835-9_17
The provenance of electronic data, Communications of the ACM, vol.51, issue.4, 2008. ,
DOI : 10.1145/1330311.1330323
Special Issue: The First Provenance Challenge, Concurrency and Computation: Practice and Experience, 2008. ,
DOI : 10.1002/cpe.1233
Cryptography from Pairings, Information Security Technical Report, vol.7, issue.3, 2002. ,
DOI : 10.1017/CBO9780511546570.012
Accountability for cloud and other future Internet services, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, p.2012 ,
DOI : 10.1109/CloudCom.2012.6427512
URL : https://hal.archives-ouvertes.fr/hal-00778369
Accountable redactable signatures Sanitizable signatures in XML signature performance , mixing properties, and revisiting the property of transparency, ARES 2015. IEEE 46 ACNS 2011 ,
A survey of data provenance in e-science, ACM SIGMOD Record, vol.34, issue.3, 2005. ,
DOI : 10.1145/1084805.1084812
Content Extraction Signatures, ICISC 2001, p.2288 ,
DOI : 10.1007/3-540-45861-1_22
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.5705