Login / Signup
Provenance-aware secure networks.
Wenchao Zhou
Eric Cronin
Boon Thau Loo
Published in:
ICDE Workshops (2008)
Keyphrases
</>
social networks
complex networks
heterogeneous networks
metadata
relational databases
fine grained
network structure
network analysis
security issues
security requirements
encryption scheme
network topologies