Author of the publication

A Fine-Grained Workflow Model with Provenance-Aware Security Views.

, , and . TaPP, USENIX Association, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Consistency in Partitioned Networks., , and . ACM Comput. Surv., 17 (3): 341-370 (1985)Facilitating Transformations in a Human Genome Project Database., , and . CIKM, page 423-432. ACM, (1994)On Provenance and Privacy.. IPAW, volume 6378 of Lecture Notes in Computer Science, page 1. Springer, (2010)Theoretical Aspects of Schema Merging., , and . EDBT, volume 580 of Lecture Notes in Computer Science, page 152-167. Springer, (1992)Enabling Privacy in Provenance-Aware Workflow Systems., , , , , , and . CIDR, page 215-218. www.cidrdb.org, (2011)Keyword Search in Workflow Repositories with Access Control., , and . AMW, volume 749 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)Reasoning about Nested Functional Dependencies., and . PODS, page 91-100. ACM Press, (1999)CCSR 92: Calculus for Communicating Shared Resources with Dynamic Priorities., , and . NAPAW, page 65-85. Springer, (1992)Keys for XML., , , , and . WWW, page 201-210. ACM, (2001)Biological Data Management: Research, Practice and Opportunities., , , , , and . VLDB, page 1233-1236. Morgan Kaufmann, (2004)