{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T18:14:56Z","timestamp":1725819296662},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319164618"},{"type":"electronic","value":"9783319164625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16462-5_1","type":"book-chapter","created":{"date-parts":[[2015,3,20]],"date-time":"2015-03-20T13:27:58Z","timestamp":1426858078000},"page":"3-15","source":"Crossref","is-referenced-by-count":8,"title":["ProvAbs: Model, Policy, and Tooling for Abstracting PROV Graphs"],"prefix":"10.1007","author":[{"given":"Paolo","family":"Missier","sequence":"first","affiliation":[]},{"given":"Jeremy","family":"Bryans","sequence":"additional","affiliation":[]},{"given":"Carl","family":"Gamble","sequence":"additional","affiliation":[]},{"given":"Vasa","family":"Curcin","sequence":"additional","affiliation":[]},{"given":"Roxana","family":"Danger","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,21]]},"reference":[{"key":"1_CR1","unstructured":"Moreau, L., Missier, P., Belhajjame, K., B\u2019Far, R., Cheney, J., Coppens, S., Cresswell, S., Gil, Y., Groth, P., Klyne, G., Lebo, T., McCusker, J., Miles, S., Myers, J., Sahoo, S., Tilmes, C.: PROV-DM: The PROV Data Model. Technical report, World Wide Web Consortium (2012)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Biton, O., Boulakia, S.C., Davidson, S.B., Hara, C.S.: Querying and managing provenance through user views in scientific workflows. In: ICDE, pp. 1072\u20131081 (2008)","DOI":"10.1109\/ICDE.2008.4497516"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-22351-8_13","volume-title":"Scientific and Statistical Database Management","author":"SC Dey","year":"2011","unstructured":"Dey, S.C., Zinn, D., Lud\u00e4scher, B.: ProPub: towards a declarative approach for publishing customized, policy-aware provenance. In: Bayard Cushing, J., French, J., Bowers, S. (eds.) SSDBM 2011. LNCS, vol. 6809, pp. 225\u2013243. Springer, Heidelberg (2011)"},{"issue":"2","key":"1_CR4","first-page":"3","volume":"4","author":"D Bell","year":"1996","unstructured":"Bell, D.: The Bell-LaPadula model. J. Comput. Secur. 4(2), 3 (1996)","journal-title":"J. Comput. Secur."},{"key":"1_CR5","unstructured":"Missier, P., Gamble, C., Bryans, J.: Provenance graph abstraction by node grouping. Technical report, Newcastle University (2013)"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: Transforming provenance using redaction. In: Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, pp. 93\u2013102. ACM, New York (2011)","DOI":"10.1145\/1998441.1998456"},{"issue":"21","key":"1_CR7","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1016\/j.future.2010.07.005","volume":"7","author":"L Moreau","year":"2011","unstructured":"Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., et al.: The Open Provenance Model \u2014 core specification (v1.1). Future Gener. Comput. Syst. 7(21), 743\u2013756 (2011)","journal-title":"Future Gener. Comput. Syst."},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-540-78478-4_9","volume-title":"Privacy, Security, and Trust in KDD","author":"E Zheleva","year":"2008","unstructured":"Zheleva, E., Getoor, L.: Preserving the privacy of sensitive relationships in graph data. In: Bonchi, F., Malin, B., Sayg\u0131n, Y. (eds.) PInKDD 2007. LNCS, vol. 4890, pp. 153\u2013171. Springer, Heidelberg (2008)"},{"issue":"1","key":"1_CR9","doi-asserted-by":"publisher","first-page":"766","DOI":"10.14778\/1687627.1687714","volume":"2","author":"S Bhagat","year":"2009","unstructured":"Bhagat, S., Cormode, G., Krishnamurthy, B., Srivastava, D.: Class-based graph anonymization for social network data. Proc. VLDB Endow. 2(1), 766\u2013777 (2009)","journal-title":"Proc. VLDB Endow."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Liu, K., Terzi, E.: Towards identity anonymization on graphs. In: Proceedings of SIGMOD, pp. 93\u2013106. ACM, New York (2008)","DOI":"10.1145\/1376616.1376629"},{"key":"1_CR11","unstructured":"Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 4:1\u20134:5. USENIX Association, Berkeley (2008)"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: Proceedings of the 2007 ACM Workshop on Storage Security and Survivability, StorageSS 2007, pp. 13\u201318. ACM, New York (2007)","DOI":"10.1145\/1314313.1314318"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: A language for provenance access control. In: Proceedings of ACM Conference on Data and Application Security and Privacy, CODASPY 2011, pp. 133\u2013144, ACM, New York (2011)","DOI":"10.1145\/1943513.1943532"},{"key":"1_CR14","unstructured":"Cheney, J., Missier, P., Moreau, L.: Constraints of the provenance data model. Technical report (2012)"},{"issue":"6","key":"1_CR15","doi-asserted-by":"publisher","first-page":"1235","DOI":"10.1137\/S009753979122370X","volume":"24","author":"AO Mendelzon","year":"1995","unstructured":"Mendelzon, A.O., Wood, P.T.: Finding regular simple paths in graph databases. SIAM J. Comput. 24(6), 1235\u20131258 (1995)","journal-title":"SIAM J. Comput."},{"key":"1_CR16","unstructured":"Moreau, L., Missier, P., Cheney, J., Soiland-Reyes, S.: PROV-N: the provenance notation. Technical report (2012)"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data and Processes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16462-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T13:28:38Z","timestamp":1559136518000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16462-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164618","9783319164625"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16462-5_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}