Serveur d'exploration sur la télématique

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Document Provenance in the Cloud: Constraints and Challenges

Identifieur interne : 000C18 ( Istex/Corpus ); précédent : 000C17; suivant : 000C19

Document Provenance in the Cloud: Constraints and Challenges

Auteurs : Mohamed Amin Sakka ; Bruno Defude ; Jorge Tellez

Source :

RBID : ISTEX:26295521B7F2A520F3C7ECE34B7789602E785D50

Abstract

Abstract: The amounts of digital information are growing in size and complexity. With the emergence of distributed services over internet and the booming of electronic exchanges, the need to identify information origins and its lifecycle history becomes essential. Essential because it’s the only factor ensuring information integrity and probative value. That’s why in different areas like government, commerce, medicine and science, tracking data origins is essential and can serve for informational, quality, forensics, regulatory compliance, rights protection and intellectual property purposes. Managing information provenance is a complex task and it has been extensively treated in databases, file system and scientific workflows. However, provenance in the cloud is a more challenging task due to specific problems related to the cloud added to the traditional ones.

Url:
DOI: 10.1007/978-3-642-13971-0_11

Links to Exploration step

ISTEX:26295521B7F2A520F3C7ECE34B7789602E785D50

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Document Provenance in the Cloud: Constraints and Challenges</title>
<author>
<name sortKey="Sakka, Mohamed Amin" sort="Sakka, Mohamed Amin" uniqKey="Sakka M" first="Mohamed Amin" last="Sakka">Mohamed Amin Sakka</name>
<affiliation>
<mods:affiliation>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: amin.sakka@novapost.fr</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Defude, Bruno" sort="Defude, Bruno" uniqKey="Defude B" first="Bruno" last="Defude">Bruno Defude</name>
<affiliation>
<mods:affiliation>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: bruno.defude@it-sudparis.eu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Tellez, Jorge" sort="Tellez, Jorge" uniqKey="Tellez J" first="Jorge" last="Tellez">Jorge Tellez</name>
<affiliation>
<mods:affiliation>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: jorge.tellez@novapost.fr</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:26295521B7F2A520F3C7ECE34B7789602E785D50</idno>
<date when="2010" year="2010">2010</date>
<idno type="doi">10.1007/978-3-642-13971-0_11</idno>
<idno type="url">https://api.istex.fr/document/26295521B7F2A520F3C7ECE34B7789602E785D50/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000C18</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">000C18</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Document Provenance in the Cloud: Constraints and Challenges</title>
<author>
<name sortKey="Sakka, Mohamed Amin" sort="Sakka, Mohamed Amin" uniqKey="Sakka M" first="Mohamed Amin" last="Sakka">Mohamed Amin Sakka</name>
<affiliation>
<mods:affiliation>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: amin.sakka@novapost.fr</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Defude, Bruno" sort="Defude, Bruno" uniqKey="Defude B" first="Bruno" last="Defude">Bruno Defude</name>
<affiliation>
<mods:affiliation>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: bruno.defude@it-sudparis.eu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Tellez, Jorge" sort="Tellez, Jorge" uniqKey="Tellez J" first="Jorge" last="Tellez">Jorge Tellez</name>
<affiliation>
<mods:affiliation>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: jorge.tellez@novapost.fr</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2010</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">26295521B7F2A520F3C7ECE34B7789602E785D50</idno>
<idno type="DOI">10.1007/978-3-642-13971-0_11</idno>
<idno type="ChapterID">11</idno>
<idno type="ChapterID">Chap11</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: The amounts of digital information are growing in size and complexity. With the emergence of distributed services over internet and the booming of electronic exchanges, the need to identify information origins and its lifecycle history becomes essential. Essential because it’s the only factor ensuring information integrity and probative value. That’s why in different areas like government, commerce, medicine and science, tracking data origins is essential and can serve for informational, quality, forensics, regulatory compliance, rights protection and intellectual property purposes. Managing information provenance is a complex task and it has been extensively treated in databases, file system and scientific workflows. However, provenance in the cloud is a more challenging task due to specific problems related to the cloud added to the traditional ones.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Mohamed Amin Sakka</name>
<affiliations>
<json:string>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</json:string>
<json:string>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</json:string>
<json:string>E-mail: amin.sakka@novapost.fr</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bruno Defude</name>
<affiliations>
<json:string>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</json:string>
<json:string>E-mail: bruno.defude@it-sudparis.eu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jorge Tellez</name>
<affiliations>
<json:string>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</json:string>
<json:string>E-mail: jorge.tellez@novapost.fr</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<abstract>Abstract: The amounts of digital information are growing in size and complexity. With the emergence of distributed services over internet and the booming of electronic exchanges, the need to identify information origins and its lifecycle history becomes essential. Essential because it’s the only factor ensuring information integrity and probative value. That’s why in different areas like government, commerce, medicine and science, tracking data origins is essential and can serve for informational, quality, forensics, regulatory compliance, rights protection and intellectual property purposes. Managing information provenance is a complex task and it has been extensively treated in databases, file system and scientific workflows. However, provenance in the cloud is a more challenging task due to specific problems related to the cloud added to the traditional ones.</abstract>
<qualityIndicators>
<score>6.752</score>
<pdfVersion>1.6</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>874</abstractCharCount>
<pdfWordCount>3776</pdfWordCount>
<pdfCharCount>24463</pdfCharCount>
<pdfPageCount>11</pdfPageCount>
<abstractWordCount>123</abstractWordCount>
</qualityIndicators>
<title>Document Provenance in the Cloud: Constraints and Challenges</title>
<genre.original>
<json:string>OriginalPaper</json:string>
</genre.original>
<chapterId>
<json:string>11</json:string>
<json:string>Chap11</json:string>
</chapterId>
<genre>
<json:string>conference [eBooks]</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
<affiliations>
<json:string>Lancaster University, Lancaster, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Takeo Kanade</name>
<affiliations>
<json:string>Carnegie Mellon University, Pittsburgh, PA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josef Kittler</name>
<affiliations>
<json:string>University of Surrey, Guildford, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
<affiliations>
<json:string>Cornell University, Ithaca, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
<affiliations>
<json:string>ETH Zurich, Zurich, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>John C. Mitchell</name>
<affiliations>
<json:string>Stanford University, Stanford, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moni Naor</name>
<affiliations>
<json:string>Weizmann Institute of Science, Rehovot, Israel</json:string>
</affiliations>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
<affiliations>
<json:string>University of Bern, Bern, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
<affiliations>
<json:string>Indian Institute of Technology, Madras, India</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
<affiliations>
<json:string>University of Dortmund, Dortmund, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Madhu Sudan</name>
<affiliations>
<json:string>Massachusetts Institute of Technology, MA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
<affiliations>
<json:string>University of California, Los Angeles, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Doug Tygar</name>
<affiliations>
<json:string>University of California, Berkeley, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
<affiliations>
<json:string>Rice University, Houston, TX, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
<affiliations>
<json:string>Max-Planck Institute of Computer Science, Saarbrücken, Germany</json:string>
</affiliations>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2010</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Finn Arve Aagesen</name>
<affiliations>
<json:string>Department of Telematics, Norwegian University of Science and Technology (NTNU), O.S. Bragstads plass 2B, 7491, Trondheim, Norway</json:string>
<json:string>E-mail: finnarve@item.ntnu.no</json:string>
</affiliations>
</json:item>
<json:item>
<name>Svein Johan Knapskog</name>
<affiliations>
<json:string>Centre for Quantifiable Quality of Service in Communication Systems (Q2S), Norwegian University of Science and Technology, O.S. Bragstads plass 2E, 7491, Trondheim, Norway</json:string>
<json:string>E-mail: knapskog@q2s.ntnu.no</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Data Encryption</value>
</json:item>
<json:item>
<value>Management of Computing and Information Systems</value>
</json:item>
<json:item>
<value>Algorithm Analysis and Problem Complexity</value>
</json:item>
<json:item>
<value>Computers and Society</value>
</json:item>
<json:item>
<value>Systems and Data Security</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-642-13970-3</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Networked Services and Applications - Engineering, Control and Management</title>
<genre.original>
<json:string>Proceedings</json:string>
</genre.original>
<bookId>
<json:string>978-3-642-13971-0</json:string>
</bookId>
<volume>6164</volume>
<pages>
<last>117</last>
<first>107</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>Book Series</json:string>
</genre>
<eisbn>
<json:string>978-3-642-13971-0</json:string>
</eisbn>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-13971-0</json:string>
</doi>
</host>
<publicationDate>2010</publicationDate>
<copyrightDate>2010</copyrightDate>
<doi>
<json:string>10.1007/978-3-642-13971-0_11</json:string>
</doi>
<id>26295521B7F2A520F3C7ECE34B7789602E785D50</id>
<score>1</score>
<fulltext>
<json:item>
<original>true</original>
<mimetype>application/pdf</mimetype>
<extension>pdf</extension>
<uri>https://api.istex.fr/document/26295521B7F2A520F3C7ECE34B7789602E785D50/fulltext/pdf</uri>
</json:item>
<json:item>
<original>false</original>
<mimetype>application/zip</mimetype>
<extension>zip</extension>
<uri>https://api.istex.fr/document/26295521B7F2A520F3C7ECE34B7789602E785D50/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/26295521B7F2A520F3C7ECE34B7789602E785D50/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Document Provenance in the Cloud: Constraints and Challenges</title>
<respStmt xml:id="ISTEX-API" resp="Références bibliographiques récupérées via GROBID" name="ISTEX-API (INIST-CNRS)"></respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>SPRINGER</p>
</availability>
<date>2010</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Document Provenance in the Cloud: Constraints and Challenges</title>
<author>
<persName>
<forename type="first">Mohamed</forename>
<surname>Sakka</surname>
</persName>
<email>amin.sakka@novapost.fr</email>
<affiliation>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</affiliation>
<affiliation>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</affiliation>
</author>
<author>
<persName>
<forename type="first">Bruno</forename>
<surname>Defude</surname>
</persName>
<email>bruno.defude@it-sudparis.eu</email>
<affiliation>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</affiliation>
</author>
<author>
<persName>
<forename type="first">Jorge</forename>
<surname>Tellez</surname>
</persName>
<email>jorge.tellez@novapost.fr</email>
<affiliation>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Networked Services and Applications - Engineering, Control and Management</title>
<title level="m" type="sub">16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings</title>
<idno type="pISBN">978-3-642-13970-3</idno>
<idno type="eISBN">978-3-642-13971-0</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/978-3-642-13971-0</idno>
<idno type="BookID">978-3-642-13971-0</idno>
<idno type="BookTitleID">211890</idno>
<idno type="BookSequenceNumber">6164</idno>
<idno type="BookVolumeNumber">6164</idno>
<idno type="BookChapterCount">30</idno>
<editor>
<persName>
<forename type="first">Finn</forename>
<forename type="first">Arve</forename>
<surname>Aagesen</surname>
</persName>
<email>finnarve@item.ntnu.no</email>
<affiliation>Department of Telematics, Norwegian University of Science and Technology (NTNU), O.S. Bragstads plass 2B, 7491, Trondheim, Norway</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Svein</forename>
<forename type="first">Johan</forename>
<surname>Knapskog</surname>
</persName>
<email>knapskog@q2s.ntnu.no</email>
<affiliation>Centre for Quantifiable Quality of Service in Communication Systems (Q2S), Norwegian University of Science and Technology, O.S. Bragstads plass 2E, 7491, Trondheim, Norway</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2010"></date>
<biblScope unit="volume">6164</biblScope>
<biblScope unit="page" from="107">107</biblScope>
<biblScope unit="page" to="117">117</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>University of Surrey, Guildford, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Doug</forename>
<surname>Tygar</surname>
</persName>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>Rice University, Houston, TX, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
</editor>
<biblScope>
<date>2010</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="seriesId">558</idno>
</series>
<idno type="istex">26295521B7F2A520F3C7ECE34B7789602E785D50</idno>
<idno type="DOI">10.1007/978-3-642-13971-0_11</idno>
<idno type="ChapterID">11</idno>
<idno type="ChapterID">Chap11</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2010</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: The amounts of digital information are growing in size and complexity. With the emergence of distributed services over internet and the booming of electronic exchanges, the need to identify information origins and its lifecycle history becomes essential. Essential because it’s the only factor ensuring information integrity and probative value. That’s why in different areas like government, commerce, medicine and science, tracking data origins is essential and can serve for informational, quality, forensics, regulatory compliance, rights protection and intellectual property purposes. Managing information provenance is a complex task and it has been extensively treated in databases, file system and scientific workflows. However, provenance in the cloud is a more challenging task due to specific problems related to the cloud added to the traditional ones.</p>
</abstract>
<textClass>
<keywords scheme="Book Subject Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book Subject Group">
<list>
<label>I</label>
<label>I13022</label>
<label>I15033</label>
<label>I24067</label>
<label>I16021</label>
<label>I24040</label>
<label>I14050</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Computer Communication Networks</term>
</item>
<item>
<term>Data Encryption</term>
</item>
<item>
<term>Management of Computing and Information Systems</term>
</item>
<item>
<term>Algorithm Analysis and Problem Complexity</term>
</item>
<item>
<term>Computers and Society</term>
</item>
<item>
<term>Systems and Data Security</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2010">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-3-19">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<original>false</original>
<mimetype>text/plain</mimetype>
<extension>txt</extension>
<uri>https://api.istex.fr/document/26295521B7F2A520F3C7ECE34B7789602E785D50/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff8">
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff9">
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff10">
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff11">
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff12">
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff13">
<EditorName DisplayOrder="Western">
<GivenName>Doug</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff14">
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff15">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Lancaster University</OrgName>
<OrgAddress>
<City>Lancaster</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>University of Surrey</OrgName>
<OrgAddress>
<City>Guildford</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff4">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<City>Ithaca</City>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgName>ETH Zurich</OrgName>
<OrgAddress>
<City>Zurich</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgName>Stanford University</OrgName>
<OrgAddress>
<City>Stanford</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>Weizmann Institute of Science</OrgName>
<OrgAddress>
<City>Rehovot</City>
<Country>Israel</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgName>University of Bern</OrgName>
<OrgAddress>
<City>Bern</City>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgName>Indian Institute of Technology</OrgName>
<OrgAddress>
<City>Madras</City>
<Country>India</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff10">
<OrgName>University of Dortmund</OrgName>
<OrgAddress>
<City>Dortmund</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff11">
<OrgName>Massachusetts Institute of Technology</OrgName>
<OrgAddress>
<State>MA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff12">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Los Angeles</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff13">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Berkeley</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff14">
<OrgName>Rice University</OrgName>
<OrgAddress>
<City>Houston</City>
<State>TX</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff15">
<OrgName>Max-Planck Institute of Computer Science</OrgName>
<OrgAddress>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-642-13971-0</BookID>
<BookTitle>Networked Services and Applications - Engineering, Control and Management</BookTitle>
<BookSubTitle>16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings</BookSubTitle>
<BookVolumeNumber>6164</BookVolumeNumber>
<BookSequenceNumber>6164</BookSequenceNumber>
<BookDOI>10.1007/978-3-642-13971-0</BookDOI>
<BookTitleID>211890</BookTitleID>
<BookPrintISBN>978-3-642-13970-3</BookPrintISBN>
<BookElectronicISBN>978-3-642-13971-0</BookElectronicISBN>
<BookChapterCount>30</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>IFIP International Federation for Information Processing</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I13022" Priority="1" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I15033" Priority="2" Type="Secondary">Data Encryption</BookSubject>
<BookSubject Code="I24067" Priority="3" Type="Secondary">Management of Computing and Information Systems</BookSubject>
<BookSubject Code="I16021" Priority="4" Type="Secondary">Algorithm Analysis and Problem Complexity</BookSubject>
<BookSubject Code="I24040" Priority="5" Type="Secondary">Computers and Society</BookSubject>
<BookSubject Code="I14050" Priority="6" Type="Secondary">Systems and Data Security</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Finn</GivenName>
<GivenName>Arve</GivenName>
<FamilyName>Aagesen</FamilyName>
</EditorName>
<Contact>
<Email>finnarve@item.ntnu.no</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff17">
<EditorName DisplayOrder="Western">
<GivenName>Svein</GivenName>
<GivenName>Johan</GivenName>
<FamilyName>Knapskog</FamilyName>
</EditorName>
<Contact>
<Email>knapskog@q2s.ntnu.no</Email>
</Contact>
</Editor>
<Affiliation ID="Aff16">
<OrgDivision>Department of Telematics</OrgDivision>
<OrgName>Norwegian University of Science and Technology (NTNU)</OrgName>
<OrgAddress>
<Street>O.S. Bragstads plass 2B</Street>
<Postcode>7491</Postcode>
<City>Trondheim</City>
<Country>Norway</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff17">
<OrgDivision>Centre for Quantifiable Quality of Service in Communication Systems (Q2S)</OrgDivision>
<OrgName>Norwegian University of Science and Technology</OrgName>
<OrgAddress>
<Street>O.S. Bragstads plass 2E</Street>
<Postcode>7491</Postcode>
<City>Trondheim</City>
<Country>Norway</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part4">
<PartInfo TocLevels="0">
<PartID>4</PartID>
<PartSequenceNumber>4</PartSequenceNumber>
<PartTitle>Security</PartTitle>
<PartChapterCount>4</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Networked Services and Applications - Engineering, Control and Management</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap11" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>11</ChapterID>
<ChapterDOI>10.1007/978-3-642-13971-0_11</ChapterDOI>
<ChapterSequenceNumber>11</ChapterSequenceNumber>
<ChapterTitle Language="En">Document Provenance in the Cloud: Constraints and Challenges</ChapterTitle>
<ChapterFirstPage>107</ChapterFirstPage>
<ChapterLastPage>117</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2010</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>4</PartID>
<BookID>978-3-642-13971-0</BookID>
<BookTitle>Networked Services and Applications - Engineering, Control and Management</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff18 Aff19">
<AuthorName DisplayOrder="Western">
<GivenName>Mohamed</GivenName>
<GivenName>Amin</GivenName>
<FamilyName>Sakka</FamilyName>
</AuthorName>
<Contact>
<Email>amin.sakka@novapost.fr</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff18">
<AuthorName DisplayOrder="Western">
<GivenName>Bruno</GivenName>
<FamilyName>Defude</FamilyName>
</AuthorName>
<Contact>
<Email>bruno.defude@it-sudparis.eu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff19">
<AuthorName DisplayOrder="Western">
<GivenName>Jorge</GivenName>
<FamilyName>Tellez</FamilyName>
</AuthorName>
<Contact>
<Email>jorge.tellez@novapost.fr</Email>
</Contact>
</Author>
<Affiliation ID="Aff18">
<OrgName>Novapost, Novapost R&D</OrgName>
<OrgAddress>
<Street>13, Boulevard de Rochechouart</Street>
<Postcode>75009</Postcode>
<City>Paris</City>
<Country>France</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff19">
<OrgName>TELECOM& Management SudParis, CNRS UMR Samovar</OrgName>
<OrgAddress>
<Street>9, Rue Charles Fourrier</Street>
<Postcode>91011</Postcode>
<City>Evry cedex</City>
<Country>France</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>The amounts of digital information are growing in size and complexity. With the emergence of distributed services over internet and the booming of electronic exchanges, the need to identify information origins and its lifecycle history becomes essential. Essential because it’s the only factor ensuring information integrity and probative value. That’s why in different areas like government, commerce, medicine and science, tracking data origins is essential and can serve for informational, quality, forensics, regulatory compliance, rights protection and intellectual property purposes. Managing information provenance is a complex task and it has been extensively treated in databases, file system and scientific workflows. However, provenance in the cloud is a more challenging task due to specific problems related to the cloud added to the traditional ones.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Document Provenance in the Cloud: Constraints and Challenges</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Document Provenance in the Cloud: Constraints and Challenges</title>
</titleInfo>
<name type="personal">
<namePart type="given">Mohamed</namePart>
<namePart type="given">Amin</namePart>
<namePart type="family">Sakka</namePart>
<affiliation>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</affiliation>
<affiliation>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</affiliation>
<affiliation>E-mail: amin.sakka@novapost.fr</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bruno</namePart>
<namePart type="family">Defude</namePart>
<affiliation>Novapost, Novapost R&D, 13, Boulevard de Rochechouart, 75009, Paris, France</affiliation>
<affiliation>E-mail: bruno.defude@it-sudparis.eu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jorge</namePart>
<namePart type="family">Tellez</namePart>
<affiliation>TELECOM& Management SudParis, CNRS UMR Samovar, 9, Rue Charles Fourrier, 91011, Evry cedex, France</affiliation>
<affiliation>E-mail: jorge.tellez@novapost.fr</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference [eBooks]" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2010</dateIssued>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: The amounts of digital information are growing in size and complexity. With the emergence of distributed services over internet and the booming of electronic exchanges, the need to identify information origins and its lifecycle history becomes essential. Essential because it’s the only factor ensuring information integrity and probative value. That’s why in different areas like government, commerce, medicine and science, tracking data origins is essential and can serve for informational, quality, forensics, regulatory compliance, rights protection and intellectual property purposes. Managing information provenance is a complex task and it has been extensively treated in databases, file system and scientific workflows. However, provenance in the cloud is a more challenging task due to specific problems related to the cloud added to the traditional ones.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Networked Services and Applications - Engineering, Control and Management</title>
<subTitle>16th EUNICE/IFIP WG 6.6 Workshop, EUNICE 2010, Trondheim, Norway, June 28-30, 2010. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Finn</namePart>
<namePart type="given">Arve</namePart>
<namePart type="family">Aagesen</namePart>
<affiliation>Department of Telematics, Norwegian University of Science and Technology (NTNU), O.S. Bragstads plass 2B, 7491, Trondheim, Norway</affiliation>
<affiliation>E-mail: finnarve@item.ntnu.no</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Svein</namePart>
<namePart type="given">Johan</namePart>
<namePart type="family">Knapskog</namePart>
<affiliation>Centre for Quantifiable Quality of Service in Communication Systems (Q2S), Norwegian University of Science and Technology, O.S. Bragstads plass 2E, 7491, Trondheim, Norway</affiliation>
<affiliation>E-mail: knapskog@q2s.ntnu.no</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="Book Series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book Subject Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book Subject Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I15033">Data Encryption</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24067">Management of Computing and Information Systems</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I16021">Algorithm Analysis and Problem Complexity</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24040">Computers and Society</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14050">Systems and Data Security</topic>
</subject>
<identifier type="DOI">10.1007/978-3-642-13971-0</identifier>
<identifier type="ISBN">978-3-642-13970-3</identifier>
<identifier type="eISBN">978-3-642-13971-0</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">211890</identifier>
<identifier type="BookID">978-3-642-13971-0</identifier>
<identifier type="BookChapterCount">30</identifier>
<identifier type="BookVolumeNumber">6164</identifier>
<identifier type="BookSequenceNumber">6164</identifier>
<identifier type="PartChapterCount">4</identifier>
<part>
<date>2010</date>
<detail type="part">
<title>Security</title>
</detail>
<detail type="volume">
<number>6164</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>107</start>
<end>117</end>
</extent>
</part>
<recordInfo>
<recordOrigin>IFIP International Federation for Information Processing, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<affiliation>Lancaster University, Lancaster, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, Stanford, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>University of California, Los Angeles, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Doug</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbrücken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2010</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>IFIP International Federation for Information Processing, 2010</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">26295521B7F2A520F3C7ECE34B7789602E785D50</identifier>
<identifier type="DOI">10.1007/978-3-642-13971-0_11</identifier>
<identifier type="ChapterID">11</identifier>
<identifier type="ChapterID">Chap11</identifier>
<accessCondition type="use and reproduction" contentType="copyright">IFIP International Federation for Information Processing, 2010</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2010</recordOrigin>
</recordInfo>
</mods>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/TelematiV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000C18 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 000C18 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Ticri/CIDE
   |area=    TelematiV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:26295521B7F2A520F3C7ECE34B7789602E785D50
   |texte=   Document Provenance in the Cloud: Constraints and Challenges
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Thu Nov 2 16:09:04 2017. Site generation: Sun Mar 10 16:42:28 2024