Filter your results
- 2
- 2
- 2
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Supporting Secure Provenance Update by Keeping “Provenance” of the Provenance1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.363-372, ⟨10.1007/978-3-642-36818-9_40⟩
Conference papers
hal-01480195v1
|
||
|
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), Jun 2010, Rome, Italy. pp.311-318, ⟨10.1007/978-3-642-13739-6_22⟩
Conference papers
hal-01056678v1
|