Abstract. The automation of large scale computational scientific experiments can be accomplished with the use of scientific workflow management systems, which allow for the definition of their activities and data dependencies. The man-ual analysis of the data resulting from their execution is burdensome, due to the usually large amounts of information. Provenance systems can be used to support this task since they gather details about the design and execution of these exper-iments. However, provenance information disclosure can also be seen as a threat to correct attribution, if the proper security mechanisms are not in place to protect it. In this article, we address the problem of providing adequate security controls for protecting proven...
Scientists and, more generally end users of computer systems, need to be able to trust the data they...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Abstract. In e-Science experiments, it is vital to record the experimental process for later use suc...
In e-Science experiments, it is vital to record the experimental process for later use such as in in...
In e-Science experiments, it is vital to record the experimental process for later use such as in in...
Capturing and exploiting provenance information is considered to be important across a range of scie...
Process adaptation has been in the focus of the BPM community also in the scope of interdisciplinary...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Like experiments performed at a laboratory bench, the data associated with an e-Science experiment a...
Data management is growing in complexity as largescale applications take advantage of the loosely co...
This article offers a briefing in one of the knowledge management issues of in silico experimentatio...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
A scientific workflow consists of ordered, non-linear tasks connected by their inputs and outputs. P...
With the development of data transactions, data security issues have become increasingly important. ...
Scientists and, more generally end users of computer systems, need to be able to trust the data they...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Abstract. In e-Science experiments, it is vital to record the experimental process for later use suc...
In e-Science experiments, it is vital to record the experimental process for later use such as in in...
In e-Science experiments, it is vital to record the experimental process for later use such as in in...
Capturing and exploiting provenance information is considered to be important across a range of scie...
Process adaptation has been in the focus of the BPM community also in the scope of interdisciplinary...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Like experiments performed at a laboratory bench, the data associated with an e-Science experiment a...
Data management is growing in complexity as largescale applications take advantage of the loosely co...
This article offers a briefing in one of the knowledge management issues of in silico experimentatio...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
A scientific workflow consists of ordered, non-linear tasks connected by their inputs and outputs. P...
With the development of data transactions, data security issues have become increasingly important. ...
Scientists and, more generally end users of computer systems, need to be able to trust the data they...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...