{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:35:33Z","timestamp":1759091733830,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,6,15]],"date-time":"2011-06-15T00:00:00Z","timestamp":1308096000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,6,15]]},"DOI":"10.1145\/1998441.1998456","type":"proceedings-article","created":{"date-parts":[[2011,6,21]],"date-time":"2011-06-21T13:47:14Z","timestamp":1308664034000},"page":"93-102","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Transforming provenance using redaction"],"prefix":"10.1145","author":[{"given":"Tyrone","family":"Cadenhead","sequence":"first","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Vaibhav","family":"Khadilkar","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Murat","family":"Kantarcioglu","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]},{"given":"Bhavani","family":"Thuraisingham","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, Richardson, TX, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2009.02.002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/645871.668836"},{"key":"e_1_3_2_1_3_1","volume-title":"FACHGRUPPE INFORMATIK","author":"Blostein D.","year":"1997","unstructured":"D. Blostein and A. Schurr . Computing with graphs and graph rewriting . In FACHGRUPPE INFORMATIK , RWTH. Citeseer , 1997 . D. Blostein and A. Schurr. Computing with graphs and graph rewriting. In FACHGRUPPE INFORMATIK, RWTH. Citeseer, 1997."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496671.1496675"},{"key":"e_1_3_2_1_5_1","volume-title":"Extensible markup language (XML) 1.0. W3C recommendation, 6","author":"Bray T.","year":"2000","unstructured":"T. Bray , J. Paoli , C. Sperberg-McQueen , E. Maler , and F. Yergeau . Extensible markup language (XML) 1.0. W3C recommendation, 6 , 2000 . T. Bray, J. Paoli, C. Sperberg-McQueen, E. Maler, and F. Yergeau. Extensible markup language (XML) 1.0. W3C recommendation, 6, 2000."},{"key":"e_1_3_2_1_6_1","volume-title":"A Language for Provenance Access Control","author":"Cadenhead T.","year":"2011","unstructured":"T. Cadenhead , V. Khadilkar , M. Kantarcioglu , and B. Thuraisingham . A Language for Provenance Access Control , 2011 . T. Cadenhead, V. Khadilkar, M. Kantarcioglu, and B. Thuraisingham. A Language for Provenance Access Control, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1013367.1013381"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11841883_4"},{"key":"e_1_3_2_1_9_1","unstructured":"A. Corradini U. Montanari F. Rossi H. Ehrig R. Heckel and M. L\u00f3we. Algebraic approaches to graph transformation. Part I: Basic concepts and double pushout approach. In Handbook of graph grammars and computing by graph transformation.   A. Corradini U. Montanari F. Rossi H. Ehrig R. Heckel and M. L\u00f3we. Algebraic approaches to graph transformation. Part I: Basic concepts and double pushout approach. In Handbook of graph grammars and computing by graph transformation."},{"key":"e_1_3_2_1_10_1","first-page":"161","volume-title":"AMIA Annual Symposium Proceedings","volume":"2008","author":"Detwiler L.","unstructured":"L. Detwiler , D. Suciu , and J. Brinkley . Regular paths in SparQL: querying the NCI thesaurus . In AMIA Annual Symposium Proceedings , volume 2008 , page 161 . American Medical Informatics Association, 2008. L. Detwiler, D. Suciu, and J. Brinkley. Regular paths in SparQL: querying the NCI thesaurus. In AMIA Annual Symposium Proceedings, volume 2008, page 161. American Medical Informatics Association, 2008."},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of the 4th International Semantic Web Conference (Poster)","author":"Ding L.","year":"2005","unstructured":"L. Ding , T. Finin , Y. Peng , P. Da Silva , and D. McGuinness . Tracking RDF graph provenance using RDF molecules . In Proc. of the 4th International Semantic Web Conference (Poster) , 2005 . L. Ding, T. Finin, Y. Peng, P. Da Silva, and D. McGuinness. Tracking RDF graph provenance using RDF molecules. In Proc. of the 4th International Semantic Web Conference (Poster), 2005."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11841883_26"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/526536"},{"key":"e_1_3_2_1_14_1","volume-title":"SPARQL 1.1 Query Language. W3C Working Draft","author":"Harris S.","year":"2010","unstructured":"S. Harris and A. Seaborne . SPARQL 1.1 Query Language. W3C Working Draft , 2010 . S. Harris and A. Seaborne. SPARQL 1.1 Query Language. W3C Working Draft, 2010."},{"key":"e_1_3_2_1_15_1","volume-title":"Redaction Defined: Meeting Information Disclosure Requests with Secure Content Delivery.","author":"Heath G.","year":"1997","unstructured":"G. Heath . Redaction Defined: Meeting Information Disclosure Requests with Secure Content Delivery. 1997 . G. Heath. Redaction Defined: Meeting Information Disclosure Requests with Secure Content Delivery. 1997."},{"key":"e_1_3_2_1_16_1","unstructured":"G. Klyne J. Carroll and B. McBride. Resource description framework (RDF): Concepts and abstract syntax. W3C recommendation. http:\/\/www.w3.org\/TR\/rdf-concepts\/ 2004.  G. Klyne J. Carroll and B. McBride. Resource description framework (RDF): Concepts and abstract syntax. W3C recommendation. http:\/\/www.w3.org\/TR\/rdf-concepts\/ 2004."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2004.11.002"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-006-0030-z"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72667-8_12"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.07.005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04219-5_5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth361"},{"key":"e_1_3_2_1_23_1","volume-title":"SPARQL query language for RDF. W3C Recommendation","author":"Seaborne E.","year":"2008","unstructured":"E. Prud--hommeaux and A. Seaborne . SPARQL query language for RDF. W3C Recommendation , 2008 . E. Prud--hommeaux and A. Seaborne. SPARQL query language for RDF. W3C Recommendation, 2008."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/278918"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_21"},{"key":"e_1_3_2_1_27_1","volume-title":"Open Provenance Model Vocabulary Specification. Latest version: http:\/\/purl.org\/net\/opmv\/ns-20100827","author":"Zhao J.","year":"2010","unstructured":"J. Zhao . Open Provenance Model Vocabulary Specification. Latest version: http:\/\/purl.org\/net\/opmv\/ns-20100827 , 2010 . J. Zhao. Open Provenance Model Vocabulary Specification. Latest version: http:\/\/purl.org\/net\/opmv\/ns-20100827, 2010."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:5"}],"event":{"name":"SACMAT '11: 16th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Innsbruck Austria","acronym":"SACMAT '11"},"container-title":["Proceedings of the 16th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998441.1998456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1998441.1998456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:13Z","timestamp":1750244773000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1998441.1998456"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,15]]},"references-count":28,"alternative-id":["10.1145\/1998441.1998456","10.1145\/1998441"],"URL":"https:\/\/doi.org\/10.1145\/1998441.1998456","relation":{},"subject":[],"published":{"date-parts":[[2011,6,15]]},"assertion":[{"value":"2011-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}