{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:33:55Z","timestamp":1759091635085},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540463023"},{"type":"electronic","value":"9783540463030"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11890850_21","type":"book-chapter","created":{"date-parts":[[2006,11,22]],"date-time":"2006-11-22T07:52:59Z","timestamp":1164181979000},"page":"203-211","source":"Crossref","is-referenced-by-count":34,"title":["Security Issues in a SOA-Based Provenance System"],"prefix":"10.1007","author":[{"given":"Victor","family":"Tan","sequence":"first","affiliation":[]},{"given":"Paul","family":"Groth","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Miles","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Steve","family":"Munroe","sequence":"additional","affiliation":[]},{"given":"Sofia","family":"Tsasakou","sequence":"additional","affiliation":[]},{"given":"Luc","family":"Moreau","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Privacy-preserving data mining. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, Texas (2000)","DOI":"10.1145\/342009.335438"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/11890850_4","volume-title":"Provenance and Annotation of Data","author":"S. Alvarez","year":"2006","unstructured":"Alvarez, S., Vazquez-Salceda, J., Kifor, T., Varga, L.Z., Willmott, S.: Applying provenance in distributed organ transplant management. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 28\u201336. Springer, Heidelberg (2006)"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/11890850_7","volume-title":"Provenance and Annotation of Data","author":"M. Branco","year":"2006","unstructured":"Branco, M., Moreau, L.: Enabling provenance on large scale e-science applications. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 55\u201363. Springer, Heidelberg (2006)"},{"key":"21_CR4","unstructured":"Braun, U., Shinnar, A.: A security model for provenance. Technical report, Harvard University (2002)"},{"key":"21_CR5","unstructured":"Burbeck, S.: The tao of e-business services. Technical report, IBM Software Group (October 2000)"},{"key":"21_CR6","unstructured":"Clifton, C., Marks, D.: Security and privacy implications of data mining. In: Proceedings of the ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (1996)"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Foster, I., Voeckler, J., Wilde, M., Zhao, Y.: Chimera: A virtual data system for representing, querying and automating data derivation. In: Proc. of the 14th Conf. on Scientific and Statistical Database Management (July 2002)","DOI":"10.1109\/SSDM.2002.1029704"},{"key":"21_CR8","unstructured":"Greenwood, M., Goble, C., Stevens, R., Zhao, J., Addis, M., Marvin, D., Moreau, L., Oinn, T.: Provenance of e-science experiments - experience from bioinformatics. In: Cox, S.J. (ed.) Proc. UK e-Science All Hands Meeting 2003, September 2003, pp. 223\u2013226 (2003)"},{"key":"21_CR9","unstructured":"Groth, P., Luck, M., Moreau, L.: Formalising a protocol for recording provenance in grids. In: Proc. of the UK OST e-Science second All Hands Meeting 2004 (AHM 2004), Nottingham, UK (September 2004)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/11516798_9","volume-title":"Principles of Distributed Systems","author":"P. Groth","year":"2005","unstructured":"Groth, P., Luck, M., Moreau, L.: A protocol for recording provenance in service-oriented grids. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol.\u00a03544, pp. 124\u2013139. Springer, Heidelberg (2005)"},{"key":"21_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/11890850_28","volume-title":"Provenance and Annotation of Data","author":"P. Groth","year":"2006","unstructured":"Groth, P., Miles, S., Munroe, S.: Principles of high quality documentation for provenance: A philosophical discussion. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 278\u2013286. Springer, Heidelberg (2006)"},{"key":"21_CR12","unstructured":"Groth, P., Miles, S., Tan, V., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Architecture for provenance systems. Technical report, University of Southampton (February 2006)"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/11890850_22","volume-title":"Provenance and Annotation of Data","author":"I. Khan","year":"2006","unstructured":"Khan, I., Schroeter, R., Hunter, J.: Implementation of a secure annotation service. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 212\u2013221. Springer, Heidelberg (2006)"},{"key":"21_CR14","unstructured":"Kifor, T., Laszlo, V., Alvarez, S., Vazquez-Salceda, J., Willmott, S.: Privacy issues of provenance in electronic healthcare record systems. In: Proc. 1st Workshop on Privacy and Security in Agent-based Collaborative Environments (PSACE 2006), 5th International Joint Conference on Autonomous Agents and Multi-Agent Systems (AAMAS 2006), Japan (May 2006)"},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1145\/122058.122069","volume":"19","author":"T.F. Lunt","year":"1990","unstructured":"Lunt, T.F., Fernandez, E.D.: Database security. SIGMOD RECORD\u00a019(4), 90\u201397 (1990)","journal-title":"SIGMOD RECORD"},{"issue":"4","key":"21_CR16","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"N.R. Adam","year":"1989","unstructured":"Adam, N.R., Wortmann, J.C.: Security-control methods for statistical databases: A comparative study. ACM Computing Surveys\u00a021(4), 515\u2013556 (1989)","journal-title":"ACM Computing Surveys"},{"key":"21_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-540-39964-3_39","volume-title":"On The Move to Meaningful Internet Systems 2003: CoopIS, DOA, and ODBASE","author":"M. Szomszor","year":"2003","unstructured":"Szomszor, M., Moreau, L.: Recording and reasoning over data provenance in web and grid services. In: Meersman, R., Tari, Z., Schmidt, D.C. (eds.) CoopIS 2003, DOA 2003, and ODBASE 2003. LNCS, vol.\u00a02888, pp. 603\u2013620. Springer, Heidelberg (2003)"},{"key":"21_CR18","first-page":"301","volume-title":"Database Security III","author":"S.R. Wiseman","year":"1990","unstructured":"Wiseman, S.R.: On the problem of security in database. In: Spooner, D.L., Landwehr (eds.) Database Security III, North Holland, pp. 301\u2013311. Elsevier Science Publishers, Amsterdam (1990)"},{"key":"21_CR19","volume-title":"Workshop on Deception, Fraud and Trust in Agent Societies: Proceedings of the 3rd International Conference on Autonomous Agents","author":"H.C. Wong","year":"1999","unstructured":"Wong, H.C., Sycara, K.: Adding security and trust to multi-agent systems. In: Falcone, R., Castelfranchi, C., Tan, Y.H., Firozabadi, B. (eds.) Workshop on Deception, Fraud and Trust in Agent Societies: Proceedings of the 3rd International Conference on Autonomous Agents, Seattle, Washington. ACM Press, New York (1999)"},{"key":"21_CR20","unstructured":"Zhao, J., Goble, C., Greenwood, M., Wroe, C., Stevens, R.: Annotating, linking and browsing provenance logs for e-science. In: Proc. of the Workshop on Semantic Web Technologies for Searching and Retrieving Scientific Data (October 2003)"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11890850_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:31:52Z","timestamp":1619508712000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11890850_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540463023","9783540463030"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11890850_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}