Data provenance / Noha Nagy Mohy Abdelrahman ; Supervised Mohamed E. Elsharkawi , Hoda M. O. Mokhtar
Material type:
- تتبع مصادر البيانات [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.04.Ph.D.2016.No.D (Browse shelf(Opens below)) | Not for loan | 01010110070992000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.04.Ph.D.2016.No.D (Browse shelf(Opens below)) | 70992.CD | Not for loan | 01020110070992000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.20.04.Ph.D.2016.Gh.O Optimizing memory utilization in main-memory cloud database / | Cai01.20.04.Ph.D.2016.Mo.D A Data mining algorithm for hyperspectral images / | Cai01.20.04.Ph.D.2016.Mo.D A Data mining algorithm for hyperspectral images / | Cai01.20.04.Ph.D.2016.No.D Data provenance / | Cai01.20.04.Ph.D.2016.No.D Data provenance / | Cai01.20.04.Ph.D.2017.Ah.C A context-based framework for variant generation of business process models / | Cai01.20.04.Ph.D.2017.Ah.C A context-based framework for variant generation of business process models / |
Thesis (Ph.D.) - Cairo University - Faculty of Computers and Information - Department of Information Systems
As the number of provenance aware organizations increases, particularly in workflow scientific domains, sharing provenance data becomes a necessity. Current workflow provenance sanitization approaches do not address the disclosure problem of sensitive information through inferences. Consequently, the first part of this thesis, introduces a workflow provenance sanitization approach that maximize both graph utility and privacy with respect to the influences of various workflow constraints. The second part of this thesis introduces a Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegatee from attacking workflow privacy as well as extending the delegation functionalities. A comprehensive security framework that integrates the aforementioned techniques is presented in this thesis
Issued also as CD
There are no comments on this title.