Cited By
View all- Sonnekalb THeinze TKurnatowski LSchreiber AGonzalez-Barahona JPacker HGalster MMirakhorli MWilliams L(2020)Towards automated, provenance-driven security audit for git-based repositories: applied to germany's corona-warn-app: vision paperProceedings of the 3rd ACM SIGSOFT International Workshop on Software Security from Design to Deployment10.1145/3416507.3423190(15-18)Online publication date: 9-Nov-2020
- Pimentel JFreire JMurta LBraganholo V(2019)A Survey on Collecting, Managing, and Analyzing Provenance from ScriptsACM Computing Surveys10.1145/331195552:3(1-38)Online publication date: 18-Jun-2019
- Sarikhani MWendelborn A(2018)Mechanisms for provenance collection in scientific workflow systemsComputing10.1007/s00607-017-0578-1100:5(439-472)Online publication date: 1-May-2018
- Show More Cited By