{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T11:30:04Z","timestamp":1750764604796},"reference-count":97,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1007\/s10844-014-0322-7","type":"journal-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T06:14:53Z","timestamp":1401430493000},"page":"481-501","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["A roadmap for privacy-enhanced secure data provenance"],"prefix":"10.1007","volume":"43","author":[{"given":"Elisa","family":"Bertino","sequence":"first","affiliation":[]},{"given":"Gabriel","family":"Ghinita","sequence":"additional","affiliation":[]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[]},{"given":"Dang","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Jae","family":"Park","sequence":"additional","affiliation":[]},{"given":"Ravi","family":"Sandhu","sequence":"additional","affiliation":[]},{"given":"Salmin","family":"Sultana","sequence":"additional","affiliation":[]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"322_CR1","unstructured":"Buneman, P., Khanna, S., Tan, W.C. (2001). Database Theory-ICDT, (pp. 316\u2013330)."},{"key":"322_CR2","doi-asserted-by":"crossref","unstructured":"Buneman, P., Khanna, S., Tan, W.C. (2000). FST TCS 2000: Foundations of software technology and theoretical computer science. In S. Kapoor & S. Prasad (Eds.) Lecture notes in computer science (vol. 1974, pp. 87\u201393). Berlin: Springer. doi: 10.1007\/3-540-44450-5_6 .","DOI":"10.1007\/3-540-44450-5_6"},{"key":"322_CR3","doi-asserted-by":"crossref","unstructured":"Cheney, J., Chong, S., Foster, N., Seltzer, M., Vansummeren, S. (2009). In Proceeding of the 24th ACM SIGPLAN conference companion on object oriented programming systems languages and applications, OOPSLA \u201909 (pp. 957\u2013964). New York: ACM. doi: 10.1145\/1639950.1640064 .","DOI":"10.1145\/1639950.1640064"},{"key":"322_CR4","unstructured":"Moreau, L. (2009). Foundations and trends in web science. http:\/\/eprints.ecs.soton.ac.uk\/18176\/1\/psurvey.pdf ."},{"key":"322_CR5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/1330311.1330323","volume":"51","author":"L Moreau","year":"2008","unstructured":"Moreau, L., Groth, P., Miles, S., Vazquez-Salceda, J., Ibbotson, J., Jiang, S., Munroe, S., Rana, O., Schreiber, A., Tan, V., Varga, L. (2008). Communications of the ACM, 51, 52. doi: 10.1145\/1330311.1330323 .","journal-title":"Communications of the ACM"},{"issue":"4","key":"322_CR6","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/MIC.2008.86","volume":"12","author":"S Sahoo","year":"2008","unstructured":"Sahoo, S., Sheth, A., Henson, C. (2008). IEEE Internet Computing, 12(4), 46.","journal-title":"IEEE Internet Computing"},{"key":"322_CR7","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"YL Simmhan","year":"2005","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D. (2005). SIGMOD Record, 34, 31. doi: 10.1145\/1084805.1084812 .","journal-title":"SIGMOD Record"},{"key":"322_CR8","unstructured":"Curbera, F., Doganata, Y., Martens, A., Mukhi, N., Slominski, A. (2008). On the move to meaningful internet systems: OTM, (pp. 100\u2013119)."},{"key":"322_CR9","unstructured":"Hui, P., Bruce, J., Fink, G., Gregory, M., Best, D., McGrath, L., Endert, A. (2010). In International symposium on collaborative technologies and systems (CTS) (pp. 489\u2013498). doi:10.1109\/CTS.2010. 5478473 ."},{"key":"322_CR10","doi-asserted-by":"crossref","unstructured":"Moitra, A., Barnett, B., Crapo, A., Dill, S. (2009). In Military communications conference, MILCOM 2009. IEEE (pp. 1\u20137). doi: 10.1109\/MILCOM.2009.5379854 .","DOI":"10.1109\/MILCOM.2009.5379854"},{"key":"322_CR11","unstructured":"Hajnal, A., Kifor, T., Pedone, G., Varga, L. (2007). In Proceedings of HealthGrid 2007 (pp. 330\u2013341)."},{"issue":"6","key":"322_CR12","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/MIS.2006.119","volume":"21","author":"T Kifor","year":"2006","unstructured":"Kifor, T., Varga, L., Vazquez-Salceda, J., Alvarez, S., Willmott, S., Miles, S., Moreau, L. (2006). IEEE Intelligent Systems, 21(6), 38. doi:9D04F813-E31E-416F-99B7-DBC4D177ACA7.","journal-title":"IEEE Intelligent Systems"},{"key":"322_CR13","doi-asserted-by":"crossref","unstructured":"Liu, Y., Futrelle, J., Myers, J., Rodriguez, A., Kooper, R. (2010). In 2010 international symposium on collaborative technologies and systems (CTS) (pp. 330\u2013339). doi: 10.1109\/CTS.2010.5478496 .","DOI":"10.1109\/CTS.2010.5478496"},{"issue":"3","key":"322_CR14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1462159.1462162","volume":"9","author":"P Groth","year":"2009","unstructured":"Groth, P., Miles, S., Moreau, L. (2009). ACM Transactions Internet Technology, 9(3), 1. doi:10.1145\/ 1462159.1462162 .","journal-title":"ACM Transactions Internet Technology"},{"key":"322_CR15","doi-asserted-by":"crossref","unstructured":"Golbeck, J. (2006). Provenance and annotation of data. In L. Moreau & I. Foster (Eds.), Lecture notes in computer Science (vol. 4145, pp. 101\u2013108). Berlin: Springer. doi: 10.1007\/11890850_12 .","DOI":"10.1007\/11890850_12"},{"key":"322_CR16","doi-asserted-by":"crossref","unstructured":"Lu, R., Lin, X., Liang, X., Shen, X.S. (2010). In Proceedings of the 5th ACM symposium on information, computer and communications security, ASIACCS \u201910 (pp. 282\u2013292). New York: ACM. doi: 10.1145\/1755688.1755723 .","DOI":"10.1145\/1755688.1755723"},{"key":"322_CR17","unstructured":"Vijayakumar, N., & Plale, B. (2006)."},{"key":"322_CR18","unstructured":"Networking, F., Research, I.T., Program, D.N. (2010). (May 2010). http:\/\/www.nitrd.gov\/pubs\/CSIA_IWG_%Cybersecurity_%20Gamechange_RD_%20Recommendations_20100513.pdf ."},{"key":"322_CR19","unstructured":"Networking, F., Research, I.T., Program, D.N. (2009). (September 2009). http:\/\/www.nitrd.gov\/pubs\/CSIA_IWG_%Cybersecurity_%20Gamechange_RD_%20Recommendations_20100513.pdf ."},{"key":"322_CR20","unstructured":"Muniswamy-Reddy, K., Holland, D., Braun, U., Seltzer, M. (2006). In Proceedings of the 2006 USENIX annual technical conference (pp. 43\u201356)."},{"key":"322_CR21","unstructured":"Agrawal, P., Benjelloun, O., Sarma, A., Hayworth, C., Nabar, S., Sugihara, T., Widom, J. (2006). In VLDB (pp. 1151\u20131154)."},{"key":"322_CR22","unstructured":"Green, T., Karvounarakis, G., Ives, Z., Tannen V. (2007). In VLDB."},{"key":"322_CR23","unstructured":"Ives, Z., Khandelwal, N., Kapur, A., Cakir, M. (2005). In CIDR (pp. 107\u2013118)."},{"key":"322_CR24","unstructured":"Taylor, N., & Ives, Z. (2006). In SIGMOD\u201906 (pp. 13\u201324)."},{"key":"322_CR25","unstructured":"Bowers, S., McPhillips, T., Lud\u00e4scher, B., Cohen, S., Davidson, S. (2006). In International provenance and annotation workshop (IPAW) (pp. 133\u2013147)."},{"key":"322_CR26","unstructured":"Cohen, S., Boulakia, S., Davidson, S. (2006). In Third international workshop on data integration in the life sciences (DILS) (pp. 264\u2013279)."},{"issue":"4","key":"322_CR27","first-page":"44","volume":"30","author":"S Davidson","year":"2007","unstructured":"Davidson, S., Boulakia, S., Eyal, A., Ludascher, B., McPhillips, T., Bowers, S., Anand, M., Freire, J. (2007). IEEE Data Engineering Bulletin, 30(4), 44.","journal-title":"IEEE Data Engineering Bulletin"},{"issue":"5","key":"322_CR28","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1002\/cpe.1238","volume":"20","author":"J Golbeck","year":"2008","unstructured":"Golbeck, J., & Hendler, J. (2008). Concurrency and Computation: Practice and Experience, 20(5), 431.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"322_CR29","unstructured":"Groth, P., Jiang, S., Miles, S., Munroe, S., Tan, V., Tsasakou, S., Moreau, L. (2006). An architecture for provenance systems. Technical report, University of Southampton. http:\/\/eprints.ecs.soton.ac.uk\/13216\/1\/provenanceArchitecture10.pdf ."},{"issue":"2","key":"322_CR30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jwsr.2008040101","volume":"5","author":"Y Simmhan","year":"2008","unstructured":"Simmhan, Y., Plale, B., Gannon, D. (2008). International Journal Web Service Research, 5(2), 1.","journal-title":"International Journal Web Service Research"},{"key":"322_CR31","unstructured":"Braun, U., Shinnar, A., Seltzer, M. (2008). In Proceedings of the 3rd conference on hot topics in security USENIX association (p. 4)."},{"key":"322_CR32","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M. (2007). In Proceedings of the 2007 ACM workshop on storage security and survivability, StorageSS \u201907 (pp. 13\u201318). New York: ACM. doi: 10.1145\/1314313.1314318 .","DOI":"10.1145\/1314313.1314318"},{"key":"322_CR33","unstructured":"Hasan, R., Sion, R., Winslett, M. (2009). In Proceedings of the 7th conference on file and storage technologies (FAST\u201909) (pp. 1\u201314) ."},{"key":"322_CR34","unstructured":"Zhang, J., Chapman, A., Lefevre, K. (2009). In Proceedings of the 6th VLDB workshop on secure data management (SDM\u201909) (pp. 17\u201332)."},{"key":"322_CR35","unstructured":"McDaniel, P., Butler, K., McLaughlin, S., Sion, R., Zadok, E., Winslett, M. (2010). In 2nd USENIX workshop on the theory and practice of provenance (TaPP 10)."},{"key":"322_CR36","unstructured":"Lyle, J., & Martin, A. (2010). In 2nd USENIX workshop on the theory and practice of provenance (TaPP 10)."},{"key":"322_CR37","unstructured":"Sultana, S., & Bertino, E. (2012). In 4th international provenance and annotation workshop."},{"key":"322_CR38","unstructured":"Chapman, A.P., Jagadish, H.V., Ramanan, P. (2008). Proceedings of the 2008 ACM SIGMOD international conference on management of data (pp. 993\u20131006)."},{"key":"322_CR39","unstructured":"Heinis, T., & Alonso, G. (2008). In Proceedings of the 2008 ACM SIGMOD international conference on management of data (pp. 1007\u20131018)."},{"key":"322_CR40","unstructured":"Samarati, P., & Sweeney, L. (1998). In Proceedings of principles of database systems (p. 188)."},{"key":"322_CR41","unstructured":"Syalim, A., Hori, Y., Sakurai, K. (2009). In Advances in information security and assurance, (pp. 51\u201359)."},{"key":"322_CR42","unstructured":"Corcoran, B., Swamy, N., Hicks, M. (2007). In On-line proceedings of the workshop on principles of provenance (PrOPr) (Citeseer)."},{"key":"322_CR43","unstructured":"Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W. (2009). Secure data management (pp. 68\u201388)."},{"issue":"3","key":"322_CR44","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1567274.1567278","volume":"34","author":"J Perez","year":"2009","unstructured":"Perez, J., Arenas, M., Gutierrez, C. (2009). ACM Transactions on Database Systems (TODS), 34(3), 1.","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"322_CR45","unstructured":"PrudHommeaux, E., Seaborne, A., et al. (2006). W3C working draft, 4."},{"key":"322_CR46","doi-asserted-by":"crossref","unstructured":"Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B. (2011). In Proceedings of the first ACM conference on data and application security and privacy, CODASPY \u201911 (pp. 133\u2013144). New York: ACM. doi: 10.1145\/1943513.1943532 .","DOI":"10.1145\/1943513.1943532"},{"key":"322_CR47","doi-asserted-by":"crossref","unstructured":"Cadenhead, T., Khadilkar, T., Kantarcioglu, M., Thuraisingham, B. (2012). In Proceedings of the 17th ACM symposium on access control models and technologies, SACMAT \u201912 (pp. 113\u2013116) New York: ACM. doi: 10.1145\/2295136.2295157 .","DOI":"10.1145\/2295136.2295157"},{"key":"322_CR48","unstructured":"Nguyen, D., Park, J., Sandhu, R. (2012). In 4th USENIX workshop on the theory and practice of provenance (USENIX Association), TaPP\u201912."},{"issue":"6","key":"322_CR49","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1016\/j.future.2010.07.005","volume":"27","author":"L Moreau","year":"2011","unstructured":"Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil Y., Groth, P., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E., den Bussche, J.V. (2011). Future Generation Computer Systems, 27(6), 743. doi: 10.1016\/j.future.2010.07.005 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0167739X10001275 .","journal-title":"Future Generation Computer Systems"},{"key":"322_CR50","unstructured":"Park, J., Nguyen, D., Sandhu, R. (2012). In 10th annual conference on privacy, security and trust (IEEE), PST 2012."},{"key":"322_CR51","unstructured":"Nguyen, D., Park, J., Sandhu, R. (2012). In 2012 IEEE international Conference on information reuse and integration (IRI)."},{"key":"322_CR52","unstructured":"Park, J., Nguyen, D., Sandhu, R. (2011). In 7th international conferenceon collaborative computing: Networking applications and worksharing (CollaborateCom) (pp. 221\u2013230)."},{"key":"322_CR53","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., Venkitasubramaniam, M. (2006). In ICDE."},{"key":"322_CR54","unstructured":"Li, N., Li, T., Venkatasubramanian, S. (2007). In ICDE."},{"key":"322_CR55","unstructured":"Dwork, C. (2008). In TAMC (pp. 1\u201319)."},{"key":"322_CR56","unstructured":"Rachapalli, J., Kantarcioglu, M., Thuraisingham, B. (2012). In 4th USENIX workshop on the theory and practice of provenance (USENIX Association), TaPP\u201912."},{"key":"322_CR57","unstructured":"Boneh, D., Di Crescenzo, R., Ostrovsky, R., Persiano, G. (2004). In Advances in Cryptology-Eurocrypt 2004 (pp. 506\u2013522). Springer."},{"key":"322_CR58","unstructured":"Boneh, D., & Waters, B. (2007). Theory of cryptography, (pp. 535\u2013554)."},{"key":"322_CR59","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B. (2006). In ACM Conference on computer and communications security (pp. 89\u201398)."},{"key":"322_CR60","unstructured":"Lewko, A., Okamoto, T., Sahai, A., Takashima, K., Waters, B. (2010). In EUROCRYPT (pp. 62\u201391)."},{"key":"322_CR61","unstructured":"Ostrovsky, R., Sahai, A., Waters, B. (2007). In ACM Conference on Computer and Communications Security (pp. 195\u2013203)."},{"issue":"5","key":"322_CR62","doi-asserted-by":"crossref","first-page":"799","DOI":"10.3233\/JCS-2009-0383","volume":"18","author":"M Pirretti","year":"2010","unstructured":"Pirretti, M., Traynor, P., McDaniel, P., Waters, B. (2010). Journal of Computer Security, 18(5), 799.","journal-title":"Journal of Computer Security"},{"key":"322_CR63","unstructured":"Kiayias, A., Xu, S., Yung, M. (2008). In Proceedings of 6th international conference security and cryptography for networks (SCN\u201908). Lecture notes in computer science (vol. 5229, pp. 57\u201376). Springer."},{"key":"322_CR64","unstructured":"Chaum, D., & van Heyst, E. (1991). In EUROCRYPT (pp. 257\u2013265)."},{"issue":"4","key":"322_CR65","first-page":"22","volume":"30","author":"J Cheney","year":"2007","unstructured":"Cheney, J. (2007). IEEE Data Engineering Bulletin, 30(4), 22.","journal-title":"IEEE Data Engineering Bulletin"},{"key":"322_CR66","unstructured":"Groth, P. (2007). The origin of data: Enabling the determination of provenance in multi-institutional scientific systems through the documentation of processes.Ph.D. thesis University of Southampton. http:\/\/eprints.ecs.soton.ac.uk\/14649\/1\/ThesisSubmitted.pdf ."},{"key":"322_CR67","unstructured":"Xu, S., Qian, H., Wang, F., Zhan, Z., Bertino, E., Sandhu, R. (2010). In Proceedings of 11th International Conference Web-Age Information Management (WAIM\u201910) (pp. 398\u2013404)."},{"key":"322_CR68","unstructured":"Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H. (2004). Advances in cryptology - EUROCRYPT. In C. Cachin & J. Camenisch (Eds.), Lecture notes in computer science (vol. 3027, pp. 74\u201390). Springer."},{"key":"322_CR69","unstructured":"Bellare, M., & Neven, G. (2006). In ACM conference on computer and communications security (CCS\u201906) (pp. 390\u2013399)."},{"key":"322_CR70","unstructured":"Qian, H., & Xu, S. (2010). Information Processing Letter (accepted in 2010)."},{"key":"322_CR71","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H. (2003). In EUROCRYPT\u201903 (pp. 416\u2013432)."},{"key":"322_CR72","unstructured":"Ateniese, G., & Hohenberger, S. (2005). In ACM conference on computer and communications security (CCS\u201905) (pp. 310\u2013319)."},{"key":"322_CR73","unstructured":"Blaze, M., Bleumer, G., Strauss, M. (1998). In EUROCRYPT\u201998date (pp. 127\u2013144)."},{"key":"322_CR74","unstructured":"Libert, B., & Vergnaud, D. (2008). In ACM conference on computer and communications security 2008 (pp. 511\u2013520)."},{"key":"322_CR75","unstructured":"Waters, B. (2005). In EUROCRYPT\u201905 (pp. 114\u2013127)."},{"key":"322_CR76","unstructured":"Qian, H., & Xu, S. (2011). In To appear in the Proceedings of First ACM Conference on Data and Application Security and Privacy (ACM CODASPY\u201911)."},{"issue":"4","key":"322_CR77","doi-asserted-by":"crossref","first-page":"489","DOI":"10.3233\/JCS-2009-0342","volume":"17","author":"X Ding","year":"2009","unstructured":"Ding, X., Tsudik, G., Xu, S. (2009). Journal of Computer Security, 17(4), 489.","journal-title":"Journal of Computer Security"},{"key":"322_CR78","unstructured":"Tsudik, G., & Xu, S. (2003). In ASIACRYPT (pp. 269\u2013286)."},{"key":"322_CR79","unstructured":"Xu, S., & Yung, M. (2009). First international conference on trusted systems (INTRUST\u201909). In Lecture notes in computer science (vol. 6163, pp. 104\u2013128)."},{"key":"322_CR80","unstructured":"Demsky, B. (2009). In Proceedings of the 4rd conference on hot topics in security (USENIX Association)."},{"key":"322_CR81","doi-asserted-by":"crossref","unstructured":"Weitzner D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J. (2008). Communication ACM, 51(82). doi: 10.1145\/1349026.1349043 .","DOI":"10.1145\/1349026.1349043"},{"issue":"9","key":"322_CR82","first-page":"1026","volume":"16","author":"M Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., & Clifton, C. (2004). IEEE TKDE, 16(9), 1026. http:\/\/ieeexplore.ieee.org\/iel5\/69\/29187\/01316832.pdf?isnumber=29187&prod=JNL&arnumber=1316832&arnumber=1316832&arSt=+1026&ared=+1037&arAuthor=Kantarcioglu%2C+M.%3B+Clifton%2C+C. .","journal-title":"IEEE TKDE"},{"key":"322_CR83","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., & Kardes, O. (2009). International Journal of Information and Computer Security, 2(353). doi: 10.1504\/IJICS.2008.022488 . http:\/\/www.ingentaconnect.com\/content\/ind\/ijics\/2009\/00000002\/00000004\/art00002 .","DOI":"10.1504\/IJICS.2008.022488"},{"key":"322_CR84","doi-asserted-by":"crossref","unstructured":"Cederquist, J., Conn, R., Dekker, M., Etalle, S., den Hartog, J. (2005). In Sixth IEEE international workshop on policies for distributed systems and networks (pp. 34\u201343). doi: 10.1109\/POLICY.2005.5 .","DOI":"10.1109\/POLICY.2005.5"},{"key":"322_CR85","unstructured":"Celikel, E., Kantarcioglu, M., Thuraisingham, B., Bertino, E. (2007). In Proceedings of the 2007 OTM confederated international conference on the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II, OTM\u201907 (pp. 1548\u20131566). Berlin \/ Heidelberg: Springer-Verlag. http:\/\/portal.acm.org\/citation.cfm?id=1784707.1784750 ."},{"key":"322_CR86","doi-asserted-by":"crossref","unstructured":"Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., Moody, K. (2004). In Proceedings of the ninth ACM symposium on access control models and technologies, SACMAT \u201904 (pp. 156\u2013162). New York: ACM. doi: 10.1145\/990036.990062 .","DOI":"10.1145\/990036.990062"},{"key":"322_CR87","doi-asserted-by":"crossref","unstructured":"Hong, J.I., Ng, J.D., Lederer, S., Landay, J.A. (2004). In Proceedings of the 5th conference on designing interactive systems: Processes, practices, methods,and techniques, DIS \u201904 (pp. 91\u2013100). New York: ACM. doi: 10.1145\/1013115.1013129 .","DOI":"10.1145\/1013115.1013129"},{"key":"322_CR88","unstructured":"Cadenhead, T., Kantarcioglu, M., Thuraisingham, B. (2011). In 3th USENIX workshop on the theory and practice of provenance (USENIX Association), TaPP\u201911."},{"key":"322_CR89","unstructured":"Dai, C., Lin, D., Kantarcioglu, M., Bertino, E., Celikel, E., Thuraisingham, B.M. (2009). In Secure data management (pp. 49\u201367)."},{"key":"322_CR90","unstructured":"Krishnan, S., Snow, K.Z., Monrose, F. (2010). In Proceedings of the 17th ACM conference on computer and communications security (pp. 50\u201360)."},{"key":"322_CR91","unstructured":"Jones, S.T., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H. (2006). In Proceedings of the annual conference on USENIX \u201906 annual technical conference (pp. 1\u20131)."},{"key":"322_CR92","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1168917.1168861","volume":"40","author":"ST Jones","year":"2006","unstructured":"Jones, S.T., Arpaci-Dusseau, A.C., Arpaci-Dusseau, R.H. (2006). SIGOPS Operations Systematics Review, 40, 14.","journal-title":"SIGOPS Operations Systematics Review"},{"key":"322_CR93","unstructured":"Luby, M. (2002). In Annual IEEE symposium on foundations of computer science (p. 271)."},{"key":"322_CR94","unstructured":"Groth, P., Jiang, S., Miles, S., Munroe, S., Tan, V., Tsasakou, S., Moreau, L. (2006). In Technical report D3.1.1, Ver 0.6, www.pasoa.org ."},{"key":"322_CR95","doi-asserted-by":"crossref","unstructured":"Stevens, R.D., Robinson, A.J., Goble, C.A. (2003). Bioinformatics Journal, 19(302).","DOI":"10.1093\/bioinformatics\/btg1041"},{"key":"322_CR96","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D. (2006). In IEEE international conference on web services (pp. 18\u201322)."},{"key":"322_CR97","unstructured":"Gentry, C. (2009). In Proceedings of the 41st annual ACM symposium on theory of computing, STOC \u201909 (pp. 169\u2013178)."}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-014-0322-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-014-0322-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-014-0322-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T04:08:37Z","timestamp":1565496517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-014-0322-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":97,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,12]]}},"alternative-id":["322"],"URL":"https:\/\/doi.org\/10.1007\/s10844-014-0322-7","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,5,31]]}}}