Data provenance / Noha Nagy Mohy Abdelrahman ; Supervised Mohamed E. Elsharkawi , Hoda M. O. Mokhtar
Material type:
- تتبع مصادر البيانات [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.04.Ph.D.2016.No.D (Browse shelf(Opens below)) | Not for loan | 01010110070992000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.04.Ph.D.2016.No.D (Browse shelf(Opens below)) | 70992.CD | Not for loan | 01020110070992000 |
Thesis (Ph.D.) - Cairo University - Faculty of Computers and Information - Department of Information Systems
As the number of provenance aware organizations increases, particularly in workflow scientific domains, sharing provenance data becomes a necessity. Current workflow provenance sanitization approaches do not address the disclosure problem of sensitive information through inferences. Consequently, the first part of this thesis, introduces a workflow provenance sanitization approach that maximize both graph utility and privacy with respect to the influences of various workflow constraints. The second part of this thesis introduces a Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegatee from attacking workflow privacy as well as extending the delegation functionalities. A comprehensive security framework that integrates the aforementioned techniques is presented in this thesis
Issued also as CD
There are no comments on this title.