共 9 条
[3]
Group signatures. Chaum D, Van Heyst E. Proceedings of Advances in Cryptology (EUROCRYPT’91): Workshop on the Theory and Application of Cryptographic Techniques . 1991
[4]
Panda:a system for provenance and data. IKEDA R,WIDOM J. IEEE Transactions on Knowledge and Data Engineering . 2010
[5]
Provenance-aware storage systems. SELTZER M,BRAUN U,LEDLIE J,et al. Proc of USENIX Annual Technical Conference . 2006
[6]
The case of the fake picasso:preventing history forgery with secure provenance. HASAN R,SION R,WINSLETT M. Proc of the 7th USENIX Conference on File and Storage Technologies . 2009
[7]
Securing provenance-based audits. ALDECO-PEREZ R,MOREAU L. Proc of the 3rd International Provenance and Annotation Workshop . 2010
[8]
The Open Provenance Model core specification (v1.1)[J] . Luc Moreau,Ben Clifford,Juliana Freire,Joe Futrelle,Yolanda Gil,Paul Groth,Natalia Kwasnikowska,Simon Miles,Paolo Missier,Jim Myers,Beth Plale,Yogesh Simmhan,Eric Stephan,Jan Van den Bussche.  Future Generation Computer Systems . 2010 (6)