header

Data provenance / (Record no. 61130)

MARC details
000 -LEADER
fixed length control field 02020cam a2200337 a 4500
003 - CONTROL NUMBER IDENTIFIER
control field EG-GiCUC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250223031730.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170608s2016 ua dh f m 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency EG-GiCUC
Language of cataloging eng
Transcribing agency EG-GiCUC
041 0# - LANGUAGE CODE
Language code of text/sound track or separate title eng
049 ## - LOCAL HOLDINGS (OCLC)
Holding library Deposite
097 ## - Thesis Degree
Thesis Level Ph.D
099 ## - LOCAL FREE-TEXT CALL NUMBER (OCLC)
Classification number Cai01.20.04.Ph.D.2016.No.D
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Noha Nagy Mohy Abdelrahman
245 10 - TITLE STATEMENT
Title Data provenance /
Statement of responsibility, etc. Noha Nagy Mohy Abdelrahman ; Supervised Mohamed E. Elsharkawi , Hoda M. O. Mokhtar
246 15 - VARYING FORM OF TITLE
Title proper/short title تتبع مصادر البيانات
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cairo :
Name of publisher, distributor, etc. Noha Nagy Mohy Abdelrahman ,
Date of publication, distribution, etc. 2016
300 ## - PHYSICAL DESCRIPTION
Extent 154 Leaves :
Other physical details charts , facsimiles ;
Dimensions 30cm
502 ## - DISSERTATION NOTE
Dissertation note Thesis (Ph.D.) - Cairo University - Faculty of Computers and Information - Department of Information Systems
520 ## - SUMMARY, ETC.
Summary, etc. As the number of provenance aware organizations increases, particularly in workflow scientific domains, sharing provenance data becomes a necessity. Current workflow provenance sanitization approaches do not address the disclosure problem of sensitive information through inferences. Consequently, the first part of this thesis, introduces a workflow provenance sanitization approach that maximize both graph utility and privacy with respect to the influences of various workflow constraints. The second part of this thesis introduces a Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegatee from attacking workflow privacy as well as extending the delegation functionalities. A comprehensive security framework that integrates the aforementioned techniques is presented in this thesis
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Issued also as CD
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Provenance security
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Workflow Provenance
653 #4 - INDEX TERM--UNCONTROLLED
Uncontrolled term Workflow security
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Hoda Mokhtar Omar Mokhtar ,
Relator term
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Mohamed Ezz Eldin Elsharkawi ,
Relator term
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="http://172.23.153.220/th.pdf">http://172.23.153.220/th.pdf</a>
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Enas
Reviser Cataloger
905 ## - LOCAL DATA ELEMENT E, LDE (RLIN)
Cataloger Nazla
Reviser Revisor
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Thesis
Holdings
Source of classification or shelving scheme Not for loan Home library Current library Date acquired Full call number Barcode Date last seen Koha item type Copy number
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة قاعة الرسائل الجامعية - الدور الاول 11.02.2024 Cai01.20.04.Ph.D.2016.No.D 01010110070992000 22.09.2023 Thesis  
Dewey Decimal Classification   المكتبة المركزبة الجديدة - جامعة القاهرة مخـــزن الرســائل الجـــامعية - البدروم 11.02.2024 Cai01.20.04.Ph.D.2016.No.D 01020110070992000 22.09.2023 CD - Rom 70992.CD