An Access Control Model for Protecting Provenance Graphs
Citation
Chen , L , Edwards , P , Nelson , J D & Norman , T J 2015 , An Access Control Model for Protecting Provenance Graphs . in A Ghorbani , V Torra , H Hışıl , A Miri , A Koltuksuz , J Zhang , M Sensoy , J Garcia-Alfaro & I Zincir (eds) , 2015 13th Annual Conference on Privacy, Security and Trust (PST) . IEEE Press , pp. 125-132 . https://doi.org/10.1109/PST.2015.7232963
Rights
© 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.