{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T02:02:13Z","timestamp":1767837733993,"version":"3.49.0"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2016,3,1]],"date-time":"2016-03-01T00:00:00Z","timestamp":1456790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2016,3,1]]},"DOI":"10.1109\/tdsc.2015.2399296","type":"journal-article","created":{"date-parts":[[2015,2,3]],"date-time":"2015-02-03T19:48:05Z","timestamp":1422992885000},"page":"178-191","source":"Crossref","is-referenced-by-count":22,"title":["Data Lineage in Malicious Environments"],"prefix":"10.1109","volume":"13","author":[{"given":"Michael","family":"Backes","sequence":"first","affiliation":[]},{"given":"Niklas","family":"Grimm","sequence":"additional","affiliation":[]},{"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/INDIN.2005.1560462"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77370-2_20"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e88-a.10.2800"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_28"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49162-7_4"},{"key":"ref30","year":"0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73092-7_1"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35413-2_14"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.05.100067"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/10721064_20"},{"key":"ref28","author":"petrovic","year":"2006"},{"key":"ref27","author":"poh","year":"2009"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052339"},{"key":"ref2","year":"0"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"ref22","first-page":"1","article-title":"The case of the fake picasso: Preventing history forgery with secure provenance","author":"hasan","year":"0","journal-title":"Proc 7th Conf File Storage Technol"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_13"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435358"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.101"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1155\/S1110865704401085"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2010.94"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_18"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICME.2012.73"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92238-4_2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/83.650120"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/266420.266453"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/S0923-5965(02)00144-3"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74124-4_10"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.1998.708876"},{"key":"ref15","first-page":"448","article-title":"Efficient oblivious transfer protocols","author":"naor","year":"0","journal-title":"Proc 12th Annu ACM-SIAM Symp Discrete Algorithms"},{"key":"ref16","year":"0"},{"key":"ref17","first-page":"514","article-title":"Short signatures from the Weil pairing","author":"boneh","year":"0","journal-title":"Proc 7th Int Conf Theory Appl Cryptol Inf Security Adv Cryptol"},{"key":"ref18","year":"0"},{"key":"ref19","year":"0"},{"key":"ref4","year":"0"},{"key":"ref3","year":"0"},{"key":"ref6","year":"0"},{"key":"ref5","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.100"},{"key":"ref7","first-page":"53","article-title":"Multiple re-watermarking scenarios","author":"mascher-kampfer","year":"0","journal-title":"Proc 13th Int Conf Syst Signals Image Process"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.1997.632226"},{"key":"ref9","year":"0"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25073-6_44"},{"key":"ref45","first-page":"1","article-title":"Appink: Watermarking android apps for repackaging deterrence","author":"zhou","year":"0","journal-title":"Proc 8th ACM SIGSAC Symp Inf Comput Commun Security"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45078-8_21"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1232454.1232458"},{"key":"ref42","first-page":"3164","article-title":"Watermarking techniques for relational databases: Survey, classification and comparison","volume":"16","author":"halder","year":"2010","journal-title":"J Universal Comput Sci"},{"key":"ref41","author":"alsalami","year":"2003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36415-3_13"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/5.771071"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/7430413\/7029631.pdf?arnumber=7029631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:47:53Z","timestamp":1642006073000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029631\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,1]]},"references-count":52,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2015.2399296","relation":{},"ISSN":["1545-5971"],"issn-type":[{"value":"1545-5971","type":"print"}],"subject":[],"published":{"date-parts":[[2016,3,1]]}}}