An Access Control Model for Protecting Provenance Graphs
| dc.contributor.author | Chen, Liang | |
| dc.contributor.author | Edwards, Peter | |
| dc.contributor.author | Nelson, John D | |
| dc.contributor.author | Norman, Timothy J | |
| dc.contributor.editor | Ghorbani, Ali | |
| dc.contributor.editor | Torra , Vincenç | |
| dc.contributor.editor | Hışıl , Hüseyin | |
| dc.contributor.editor | Miri, Ali | |
| dc.contributor.editor | Koltuksuz , Ahmet | |
| dc.contributor.editor | Zhang , Jie | |
| dc.contributor.editor | Sensoy , Murat | |
| dc.contributor.editor | Garcia-Alfaro , Joaquin | |
| dc.contributor.editor | Zincir, Ibrahim | |
| dc.contributor.institution | University of Aberdeen.Computing Science | en |
| dc.contributor.institution | University of Aberdeen.dot.rural Digital Economy Hub | en |
| dc.contributor.institution | University of Aberdeen.Engineering | en |
| dc.date.accessioned | 2016-06-03T15:40:18Z | |
| dc.date.available | 2016-06-03T15:40:18Z | |
| dc.date.issued | 2015-07-01 | |
| dc.format.extent | 8 | |
| dc.format.extent | 403987 | |
| dc.identifier | 67130702 | |
| dc.identifier | b56addd4-21aa-4f9f-82c4-da0cce148bda | |
| dc.identifier | 84958612912 | |
| dc.identifier.citation | Chen, L, Edwards, P, Nelson, J D & Norman, T J 2015, An Access Control Model for Protecting Provenance Graphs. in A Ghorbani, V Torra , H Hışıl , A Miri, A Koltuksuz , J Zhang , M Sensoy , J Garcia-Alfaro & I Zincir (eds), 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE Press, pp. 125-132. https://doi.org/10.1109/PST.2015.7232963 | en |
| dc.identifier.doi | 10.1109/PST.2015.7232963 | |
| dc.identifier.isbn | 978-1-4673-7828-4 | |
| dc.identifier.isbn | 978-1-4673-7827-7 | |
| dc.identifier.other | ORCID: /0000-0002-4527-9186/work/70471440 | |
| dc.identifier.uri | http://hdl.handle.net/2164/6080 | |
| dc.language.iso | eng | |
| dc.publisher | IEEE Press | |
| dc.relation.ispartof | 2015 13th Annual Conference on Privacy, Security and Trust (PST) | en |
| dc.subject | provenance | en |
| dc.subject | access control | en |
| dc.subject | constraints | en |
| dc.subject | QA75 Electronic computers. Computer science | en |
| dc.subject.lcc | QA75 | en |
| dc.title | An Access Control Model for Protecting Provenance Graphs | en |
| dc.type | Conference item | en |
