[1] Wang Y R, Madnick S E. A polygen model for heterogeneous database systems:the source tagging perspective[C]//Proceedings of the 16th International Conference on Very Large Data Bases, San Francisco, California, 1990:519-538. [2] Buneman P, Khanna S, Wang-Chiew T. Why and where:a characterization of data provenance[C]//International Conference on Database Theory. Heidelberg, Berlin:Springer, 2001:316-330. [3] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494. Yuan Y, Wang F Y. Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4):481-494. (in Chinese) [4] Liang X, Shetty S, Tosh D, et al. Provchain:a blockchain-based data provenance architecture in cloud environment with enhanced privacy and availability[C]//Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing, 2017:468-477. [5] Xia Q I, Sifah E B, Asamoah K O, et al. MeDShare:trustless medical data sharing among cloud service providers via blockchain[J]. IEEE Access, 2017, 5:14757-14767. [6] Ramachandran A, Kantarcioglu M. Smartprovenance:a distributed, blockchain based data provenance system[C]//Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018:35-42. [7] 刘耀宗, 刘云恒. 基于区块链的RFID大数据安全溯源模型[J]. 计算机科学, 2018, 45(增刊2):367-368, 381. Liu Y Z, Liu Y H. Security provenance model for RFID big data based on blockchain[J]. Computer Science, 2018, 45(Suppl.2):367-368, 381. (in Chinese) [8] 乔蕊, 曹琰, 王清贤. 基于联盟链的物联网动态数据溯源机制[J]. 软件学报, 2019, 30(6):1614-1631. Qiao R, Cao Y, Wang Q X. Traceability mechanism of dynamic data in Internet of things based on consortium blockchain[J]. Journal of Software, 2019, 30(6):1614-1631. (in Chinese) [9] 张国英, 毛燕琴. 一种基于区块链的去中心化数据溯源方法[J]. 南京邮电大学学报(自然科学版), 2019, 39(2):91-98. Zhang G Y, Mao Y Q. Blockchain-based decentralized data provenance method[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2019, 39(2):91-98. (in Chinese) [10] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2020-09-28]. https://bitcoin.org/bitcoin.pdf. [11] Merkle R C. A digital signature based on a conventional encryption function[C]//Conference on the Theory and Application of Cryptographic Techniques. Heidelberg, Berlin:Springer, 1987:369-378. [12] Todd P. Merkle mountain range[EB/OL].[2020-09-28]. https://github.com/opentimestamps/opentimestamps-server/blob/master/doc/merkle-mountain-range.md. [13] Bünz B, Kiffer L, Luu L, et al. Flyclient:super-light clients for cryptocurrencies[C]//2020 IEEE Symposium on Security and Privacy, 2020:928-946. [14] Moreau L, Clifford B, Freire J, et al. The open provenance model core specification[J]. Future Generation Computer Systems, 2011, 27(6):743-756. [15] W3C. Prov-o:the prov ontology[R/OL].[2020-09-28]. https://www.w3.org/TR/prov-o/. [16] 中华人民共和国国家质量监督检验检疫总局, 中国国家标准化管理委员会. 信息技术数据溯源描述模型:GB/T 34945-2017[S]. 北京:中国标准出版社, 2017. [17] 范贤丽, 范春晓, 吴岳辛. 基于区块链和IPFS技术实现粮食供应链隐私信息保护[J]. 应用科学学报, 2019, 37(2):179-190. Fan X L, Fan C X, Wu Y X. Realization of privacy protection of food supply chain based on blockchain and IPFS[J]. Journal of Applied Sciences, 2019, 37(2):179-190. (in Chinese) [18] 祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10):2170-2186. Zhu L H, Gao F, Shen M, et al. Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54(10):2170-2186. (in Chinese) [19] 王芳, 赵洪, 马嘉悦, 等. 数据科学视角下数据溯源研究与实践进展[J]. 中国图书馆学报, 2019(5):79-100. Wang F, Zhao H, Ma J Y, et al. Research and practice progress of data provenance from the perspective of data science[J]. Journal of Library Science in China, 2019(5):79-100. (in Chinese) [20] 明华, 张勇, 符小辉. 数据溯源技术综述[J]. 小型微型计算机系统, 2012, 33(9):1917-1923. Ming H, Zhang Y, Fu X H. Survey of data provenance[J]. Journal of Chinese Computer Systems, 2012, 33(9):1917-1923. (in Chinese) |