A Provenance-Aware Policy Language (cProvl) and a Data Traceability Model (cProv) for the Cloud, 2013 International Conference on Cloud and Green Computing, pp.479-486, 2013. ,
DOI : 10.1109/CGC.2013.81
URL : http://roar.uel.ac.uk/5265/1/PRISECCSN%237.pdf
The next 700 access control models or a unifying meta-model?, Proceedings of the 14th ACM symposium on Access control models and technologies, SACMAT '09, pp.187-196, 2009. ,
DOI : 10.1145/1542207.1542238
Tabled evaluation with delaying for general logic programs, Journal of the ACM, vol.43, issue.1, pp.20-74, 1996. ,
DOI : 10.1145/227595.227597
Design and Implementation of a Trust Service for the Cloud, Proc. of OTM '15, pp.620-638, 2015. ,
DOI : 10.1007/978-3-319-26148-5_42
Trust Based Access Control Policy in Multi-domain of Cloud Computing, Journal of Computers, vol.8, issue.5, 2013. ,
DOI : 10.4304/jcp.8.5.1357-1365
PROV-DM: The PROV Data Model, 2013. ,
PROV-N: The Provenance Notation, 2013. ,
DOI : 10.2200/s00528ed1v01y201308wbe007
A provenance-based access control model, 2012 Tenth Annual International Conference on Privacy, Security and Trust, pp.137-144, 2012. ,
DOI : 10.1109/PST.2012.6297930
Engineering access control policies for provenance-aware systems, Proceedings of the third ACM conference on Data and application security and privacy, CODASPY '13, pp.285-292, 2013. ,
DOI : 10.1145/2435349.2435390