24 ◾ Secure Data Provenance and Inference Control
Zhao (2010), where the focus is on representing provenance as a directed graph
structure. In Braun et al. (2008), it is suggested that provenance needs its own
security model, while in Moreau et al. (2011) and Zhao (2010), an abstract graph
model is proposed and a corresponding vocabulary for describing the relationships
between nodes in a provenance graph is also presented.
We also found previous works related to the efficiency of a graph rewriting system in
Blostein et al. (1996), Dodds and Plump (2006), and Dorr (1995). In the general case,
graph pattern matching, which finds a homomorphic (or isomorphic) image of a given
graph in another graph a nondeterministic polynomial time (NP)-complete ...