Author of the publication

A Fine-Grained Workflow Model with Provenance-Aware Security Views.

, , and . TaPP, USENIX Association, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Graph Approach to Spelling Correction in Domain-Centric Search., , and . ACL, page 905-914. The Association for Computer Linguistics, (2011)Automatic suggestion of query-rewrite rules for enterprise search., , and . SIGIR, page 591-600. ACM, (2012)Labeling recursive workflow executions on-the-fly., , and . SIGMOD Conference, page 493-504. ACM, (2011)A Fine-Grained Workflow Model with Provenance-Aware Security Views., , and . TaPP, USENIX Association, (2011)Gumshoe quality toolkit: administering programmable search., , , , and . CIKM, page 2716-2718. ACM, (2012)Hiding Data and Structure in Workflow Provenance., , and . DNIS, volume 7108 of Lecture Notes in Computer Science, page 41-48. Springer, (2011)Answering regular path queries on workflow provenance., , , , and . ICDE, page 375-386. IEEE Computer Society, (2015)Differencing Provenance in Scientific Workflows., , , , and . ICDE, page 808-819. IEEE Computer Society, (2009)An optimal labeling scheme for workflow provenance using skeleton labels., , , and . SIGMOD Conference, page 711-722. ACM, (2010)SmartCIS: integrating digital and physical environments., , , , , , and . SIGMOD Conference, page 1111-1114. ACM, (2009)