Login / Signup

An access control model for protecting provenance graphs.

Liang ChenPeter EdwardsJohn D. NelsonTimothy J. Norman
Published in: PST (2015)
Keyphrases