Chen, LiangEdwards, PeterNelson, John DNorman, Timothy JGhorbani, AliTorra , VincençHışıl , HüseyinMiri, AliKoltuksuz , AhmetZhang , JieSensoy , MuratGarcia-Alfaro , JoaquinZincir, Ibrahim2016-06-032016-06-032015-07-01Chen, L, Edwards, P, Nelson, J D & Norman, T J 2015, An Access Control Model for Protecting Provenance Graphs. in A Ghorbani, V Torra , H Hışıl , A Miri, A Koltuksuz , J Zhang , M Sensoy , J Garcia-Alfaro & I Zincir (eds), 2015 13th Annual Conference on Privacy, Security and Trust (PST). IEEE Press, pp. 125-132. https://doi.org/10.1109/PST.2015.7232963978-1-4673-7828-4978-1-4673-7827-7ORCID: /0000-0002-4527-9186/work/70471440http://hdl.handle.net/2164/60808403987engprovenanceaccess controlconstraintsQA75 Electronic computers. Computer scienceQA75An Access Control Model for Protecting Provenance GraphsConference item10.1109/PST.2015.7232963