Author of the publication

Repairing Provenance Policy Violations by Inventing Non-Functional Nodes.

, , and . RED@ESWC, volume 737 of CEUR Workshop Proceedings, CEUR-WS.org, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UP & DOWN: Improving Provenance Precision by Combining Workflow- and Trace-Level Information., , , , , and . TAPP, USENIX Association, (2014)Scientific Workflows and Provenance: Introduction and Research Opportunities., , , , and . Datenbank-Spektrum, 12 (3): 193-203 (2012)Computing Location-Based Lineage from Workflow Specifications to Optimize Provenance Queries., , , and . IPAW, volume 8628 of Lecture Notes in Computer Science, page 180-193. Springer, (2014)A declarative approach to customize workflow provenance., and . EDBT/ICDT Workshops, page 9-16. ACM, (2013)D-PROV: Extending the PROV Provenance Model with Workflow Structure., , , , and . TaPP, USENIX Association, (2013)Reconciling Provenance Policy Conflicts by Inventing Anonymous Nodes., , and . ESWC Workshops, volume 7117 of Lecture Notes in Computer Science, page 172-185. Springer, (2011)Scientific Workflows and Provenance: Introduction and Research Opportunities., , , , and . CoRR, (2013)Provenance Storage, Querying, and Visualization in PBase., , , , , , , and . IPAW, volume 8628 of Lecture Notes in Computer Science, page 239-241. Springer, (2014)ProPub: Towards a Declarative Approach for Publishing Customized, Policy-Aware Provenance., , and . SSDBM, volume 6809 of Lecture Notes in Computer Science, page 225-243. Springer, (2011)On implementing provenance-aware regular path queries with relational query engines., , , , , and . EDBT/ICDT Workshops, page 214-223. ACM, (2013)