{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T18:15:08Z","timestamp":1725819308554},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319164618"},{"type":"electronic","value":"9783319164625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16462-5_9","type":"book-chapter","created":{"date-parts":[[2015,3,20]],"date-time":"2015-03-20T17:27:58Z","timestamp":1426872478000},"page":"113-126","source":"Crossref","is-referenced-by-count":5,"title":["An Analytical Survey of Provenance Sanitization"],"prefix":"10.1007","author":[{"given":"James","family":"Cheney","sequence":"first","affiliation":[]},{"given":"Roly","family":"Perera","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,21]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Bailliage, R.D., Mazar\u00e9, L.: Using unification for opacity properties. In: Proceedings of WITS 2004, pp. 165\u2013176 (2004)","DOI":"10.1016\/S0257-8972(03)00740-0"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Biton, O., Cohen-Boulakia, S., Davidson, S.B., Hara, C.S.: Querying and managing provenance through user views in scientific workflows. In: ICDE, pp. 1072\u20131081. IEEE (2008)","DOI":"10.1109\/ICDE.2008.4497516"},{"issue":"8","key":"9_CR3","first-page":"518","volume":"4","author":"BT Blaustein","year":"2011","unstructured":"Blaustein, B.T., Chapman, A., Seligman, L., Allen, M.D., Rosenthal, A.: Surrogate parenthood: protected and informative graphs. PVLDB 4(8), 518\u2013527 (2011)","journal-title":"PVLDB"},{"key":"9_CR4","unstructured":"Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: Proceedings of the 3rd Conference on Hot Topics in Security, pp. 4:1\u20134:5 (2008)"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-3-642-41157-1_10","volume-title":"Trustworthy Global Computing","author":"JW Bryans","year":"2013","unstructured":"Bryans, J.W., Koutny, M., Mu, C.: Towards quantitative analysis of opacity. In: Palamidessi, C., Ryan, M.D. (eds.) TGC 2012. LNCS, vol. 8191, pp. 145\u2013163. Springer, Heidelberg (2013)"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Buneman, P., Chapman, A.P., Cheney, J.: Provenance management in curated databases. In: SIGMOD 2006, pp. 539\u2013550 (2006)","DOI":"10.1145\/1142473.1142534"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: Transforming provenance using redaction. In: SACMAT, pp. 93\u2013102. ACM, New York (2011)","DOI":"10.1145\/1998441.1998456"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Chebotko, A., Chang, S., Lu, S., Fotouhi, F., Yang, P.: Scientific workflow provenance querying with security views. In: WAIM 2008, pp. 349\u2013356 (2008)","DOI":"10.1109\/WAIM.2008.41"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Cheney, J.: A formal framework for provenance security. In: CSF, pp. 281\u2013293. IEEE (2011)","DOI":"10.1109\/CSF.2011.26"},{"key":"9_CR10","unstructured":"Cheney, J., Missier, P., Moreau, L. (eds.) De Nies, T.: Constraints of the PROV data model. W3C recommendation, W3C, April 2013"},{"key":"9_CR11","unstructured":"Chong, S.: Towards semantics for provenance security. In: Cheney, J. (ed.) TaPP 2009. USENIX (2009)"},{"issue":"3","key":"9_CR12","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1016\/S1571-0661(04)00290-7","volume":"59","author":"D Clark","year":"2002","unstructured":"Clark, D., Hunt, S., Malacaria, P.: Quantitative analysis of the leakage of confidential data. Electron. Notes Theor. Comput. Sci. 59(3), 238\u2013251 (2002). QAPL 2001","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"5","key":"9_CR13","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1002\/cpe.1232","volume":"20","author":"S Cohen-Boulakia","year":"2008","unstructured":"Cohen-Boulakia, S., Biton, O., Cohen, S., Davidson, S.: Addressing the provenance challenge using zoom. Concurr. Comput. Pract. Exp. 20(5), 497\u2013506 (2008)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"9_CR14","unstructured":"Davidson, S.B., Freire, J.: Provenance and scientific workflows: challenges and opportunities. In: Proceedings of SIGMOD 2008, pp. 1345\u20131350. ACM, New York, (2008)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Davidson, S.B., Khanna, S., Milo, T., Panigrahi, D., Roy, S.: Provenance views for module privacy. In: PODS, pp. 175\u2013186 (2011)","DOI":"10.1145\/1989284.1989305"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Davidson, S.B., Milo, T., Roy, S.: A propagation model for provenance views of public\/private workflows. In: ICDT, pp. 165\u2013176. ACM, New York (2013)","DOI":"10.1145\/2448496.2448517"},{"issue":"7","key":"9_CR17","doi-asserted-by":"publisher","first-page":"504","DOI":"10.1145\/359636.359712","volume":"20","author":"DE Denning","year":"1977","unstructured":"Denning, D.E., Denning, P.J.: Certification of programs for secure information flow. Commun. ACM 20(7), 504\u2013513 (1977)","journal-title":"Commun. ACM"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-642-22351-8_13","volume-title":"Scientific and Statistical Database Management","author":"SC Dey","year":"2011","unstructured":"Dey, S.C., Zinn, D., Lud\u00e4scher, B.: ProPub: towards a declarative approach for publishing customized, policy-aware provenance. In: Bayard Cushing, J., French, J., Bowers, S. (eds.) SSDBM 2011. LNCS, vol. 6809, pp. 225\u2013243. Springer, Heidelberg (2011)"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11787006_1","volume-title":"Automata, Languages and Programming","author":"C Dwork","year":"2006","unstructured":"Dwork, C.: Differential privacy. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006, Part II. LNCS, vol. 4052, pp. 1\u201312. Springer, Heidelberg (2006)"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: Proceedings of StorageSS 2007, pp. 13\u201318. ACM, New York (2007)","DOI":"10.1145\/1314313.1314318"},{"key":"9_CR21","doi-asserted-by":"publisher","first-page":"12:1","DOI":"10.1145\/1629080.1629082","volume":"5","author":"R Hasan","year":"2009","unstructured":"Hasan, R., Sion, R., Winslett, M.: Preventing history forgery with secure provenance. Trans. Storage 5, 12:1\u201312:43 (2009)","journal-title":"Trans. Storage"},{"issue":"2","key":"9_CR22","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s00778-012-0282-x","volume":"22","author":"W Lu","year":"2013","unstructured":"Lu, W., Miklau, G., Immerman, N.: Auditing a database under retention policies. VLDB J. 22(2), 203\u2013228 (2013)","journal-title":"VLDB J."},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Lyle, J., Martin, A.: Trusted computing and provenance: better together. In: Proceedings of TAPP 2010. USENIX Association, Berkeley (2010)","DOI":"10.7551\/mitpress\/9780262014397.003.0040"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1) Article 3 (2007)","DOI":"10.1145\/1217299.1217302"},{"key":"9_CR25","unstructured":"Martin, A., Lyle, J., Namilkuo, C.: Provenance as a security control. In: Proceedings of TaPP 2012, pp. 3\u20133. USENIX Association, Berkeley (2012)"},{"key":"9_CR26","unstructured":"Missier, P., Bryans, J., Gamble, C., Curcin, V., Danger, R.: Provenance graph abstraction by node grouping. Technical report CS-TR-1393, Newcastle University (2013)"},{"issue":"2\u20133","key":"9_CR27","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1561\/1800000010","volume":"2","author":"L Moreau","year":"2010","unstructured":"Moreau, L.: The foundations for provenance on the web. Found. Trends in Web Sci. 2(2\u20133), 99\u2013241 (2010)","journal-title":"Found. Trends in Web Sci."},{"issue":"6","key":"9_CR28","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1016\/j.future.2010.07.005","volume":"27","author":"L Moreau","year":"2011","unstructured":"Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., Van den Bussche, J.: The OPM core specification (v1.1). Future Gener. Comput. Syst. 27(6), 743\u2013756 (2011)","journal-title":"Future Gener. Comput. Syst."},{"key":"9_CR29","unstructured":"Moreau, L., Missier, P. (eds.): PROV-DM: The PROV Data Model. W3C Recommendation REC-prov-dm-20130430 (2013)"},{"key":"9_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-04219-5_2","volume-title":"Secure Data Management","author":"J Zhang","year":"2009","unstructured":"Zhang, J., Chapman, A., LeFevre, K.: Do you know where your data\u2019s been? \u2013 tamper-evident database provenance. In: Jonker, W., Petkovi\u0107, M. (eds.) SDM 2009. LNCS, vol. 5776, pp. 17\u201332. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data and Processes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16462-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T22:40:33Z","timestamp":1691534433000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16462-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164618","9783319164625"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16462-5_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}