共 57 条
[1]
Agrawal N., Bolosky W.J., Douceur J.R., Lorch J.R., A five-year study of file-system metadata, Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST), (2007)
[2]
Aldeco-Perez R., Moreau L., Provenance-based auditing of private data use, Proceedings of the BCS International Academic Research Conference, Visions of Computer Science, (2008)
[3]
Barga R.S., Digiampietri L.A., Automatic generation of workflow provenance, Lecture Notes in Computer Science, 4145, pp. 1-9, (2006)
[4]
Berliner B., CVS II: Parallelizing software development, Proceedings of the Winter USENIX Conference, pp. 341-352, (1990)
[5]
Blum M., Coin flipping by telephone, Proceedings of the International Cryptology Conference (CRYPTO), pp. 11-15, (1981)
[6]
Braun U., Garfinkel S.L., Holland D.A., Muniswamy-Reddy K.-K., Seltzer M.I., Issues in automatic provenance collection, Lecture Notes in Computer Science, 4145, pp. 171-183, (2006)
[7]
Braun U., Shinnar A., Seltzer M., Securing provenance, Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (USENIX HotSec), (2008)
[8]
Buneman P., Chapman A., Cheney J., Provenance management in curated databases, Proceedings of the ACM International Conference on Management of Data (SIGMOD), pp. 539-550, (2006)
[9]
Buneman P., Chapman A., Cheney J., Vansummeren S., A provenance model for manually curated data, Lecture Notes in Computer Science, 4145, pp. 162-170, (2006)
[10]
Buneman P., Khanna S., Tan W.C., Data provenance: Some basic issues, Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS), pp. 87-93, (2000)