{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:51:58Z","timestamp":1759092718007},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_22","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T11:23:50Z","timestamp":1282649030000},"page":"311-318","source":"Crossref","is-referenced-by-count":11,"title":["Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance"],"prefix":"10.1007","author":[{"given":"Amril","family":"Syalim","sequence":"first","affiliation":[]},{"given":"Takashi","family":"Nishide","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Groth, P., Jiang, S., Miles, S., Munroe, S., Tan, V., Tsasakou, S., Moreau, L.: An architecture for provenance systems. Technical report, University of Southampton (November 2006)"},{"key":"22_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-44503-X_20","volume-title":"Database Theory - ICDT 2001","author":"P. Buneman","year":"2000","unstructured":"Buneman, P., Khanna, S., Tan, W.C.: Why and where: A characterization of data provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.\u00a01973, pp. 316\u2013330. Springer, Heidelberg (2000)"},{"issue":"4","key":"22_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1629080.1629082","volume":"5","author":"R. Hasan","year":"2009","unstructured":"Hasan, R., Sion, R., Winslett, M.: Preventing history forgery with secure provenance. ACM Transactions on Storage\u00a05(4), 12:1\u201312:43 (2009)","journal-title":"ACM Transactions on Storage"},{"key":"22_CR4","series-title":"Lecture Notes in Computer Science","first-page":"1","volume-title":"Formal Aspects in Security and Trust","author":"R. Hasan","year":"2009","unstructured":"Hasan, R., Sion, R., Winslett, M.: The case of the fake picasso: Preventing history forgery with secure provenance. In: Degano, P., Guttman, J., Martinelli, F. (eds.) FAST 2008. LNCS, vol.\u00a05491, pp. 1\u201314. Springer, Heidelberg (2009)"},{"key":"22_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/11516798_9","volume-title":"Principles of Distributed Systems","author":"P. Groth","year":"2005","unstructured":"Groth, P., Luck, M., Moreau, L.: A protocol for recording provenance in service-oriented grids. In: Higashino, T. (ed.) OPODIS 2004. LNCS, vol.\u00a03544, pp. 124\u2013139. Springer, Heidelberg (2005)"},{"key":"22_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-89965-5_31","volume-title":"Provenance and Annotation of Data and Processes","author":"L. Moreau","year":"2008","unstructured":"Moreau, L., Freire, J., Futrelle, J., McGrath, R.E., Myers, J., Paulson, P.: The open provenance model: An overview. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol.\u00a05272, pp. 323\u2013326. Springer, Heidelberg (2008)"},{"key":"22_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/11890850_15","volume-title":"Provenance and Annotation of Data","author":"S. Bowers","year":"2006","unstructured":"Bowers, S., McPhillips, T., Lud\u00e4scher, B., Cohen, S., Davidson, S.B.: A model for user-oriented data provenance in pipelined scientific workflows. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 133\u2013147. Springer, Heidelberg (2006)"},{"key":"22_CR8","unstructured":"Braun, U., Shinnar, A., Seltzer, M.I.: Securing provenance. In: HotSec (2008)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: StorageSS, pp. 13\u201318 (2007)","DOI":"10.1145\/1314313.1314318"},{"key":"22_CR10","unstructured":"Braun, U., Shinnar, A.: A security model for provenance. Technical report, Harvard University (2006)"},{"key":"22_CR11","unstructured":"Paul Groth, S.M., Moreau, L.: Preserv: Provenance recording for services. In: UK e-Science All Hands Meeting 2005 (September 2005)"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/11890850_14","volume-title":"Provenance and Annotation of Data","author":"I. Altintas","year":"2006","unstructured":"Altintas, I., Barney, O., Jaeger-Frank, E.: Provenance collection support in the kepler scientific workflow system. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 118\u2013132. Springer, Heidelberg (2006)"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Chapman, A., Jagadish, H.V., Ramanan, P.: Efficient provenance storage. In: SIGMOD Conference, pp. 993\u20131006 (2008)","DOI":"10.1145\/1376616.1376715"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:33Z","timestamp":1606185753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}