• No results found

Towards Secure Provenance-Based Access Control in Cloud Environments

N/A
N/A
Protected

Academic year: 2021

Share "Towards Secure Provenance-Based Access Control in Cloud Environments"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

Loading

References

Related documents

Local watershed staff will be responsible for performing necessary quality assurance/quality control (QA/QC) procedures prior to data being uploaded to the STEWARDS

2008) focus on the specifics in transition economies; they stress the important role that agricultural development still has for poverty reduction in rural areas of transition

For studying the critical limit of minimum surface roughness that can be achieved by the optimum fluid con- centration, a fresh primary-finished FDM workpiece sample was

Support for Microsoft SQL Server 2008 Express has been added with v9.0 of Predator CNC Editor Enterprise.. Support for this edition of SQL Server provides a free version of Microsoft

A major issue in building low-cost head-mounted eye-tracking system is to achieve a certain degree of accuracy. The accuracy is affected by both video capture device, and the data

F igure 3.—The statistical genetic signature of the biological interactions in motifs 1 and 10 as the proportion of genetic var- iance explained by marginal (additive and

As described in Figure 12, the assignProgramsToServer method appends elements of the program list parameter to the playlist of the Wowza server designated by

We conducted longitudinal analyses that aimed to exam- ine how (i) caregiving commencement and (ii) its duration were associated with caregiver psychological distress and