메뉴 건너뛰기




Volumn 5776 LNCS, Issue , 2009, Pages 17-32

Do you know where your data's been? - Tamper-evident database provenance

Author keywords

[No Author keywords available]

Indexed keywords

CHECKSUM; FINE GRANULARITY; MULTIUSER ENVIRONMENTS; NON-LINEAR; SCIENTIFIC DATA MANAGEMENT; SCIENTIFIC RESEARCHES; SECURITY PROPERTIES; TAMPER-EVIDENT; TIME AND SPACE;

EID: 70349887668     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-04219-5_2     Document Type: Conference Paper
Times cited : (24)

References (39)
  • 8
    • 84878730909 scopus 로고    scopus 로고
    • On the expressiveness of implicit provenance in query and update languages
    • Schwentick, T., Suciu, D. (eds.) ICDT 2007. Springer, Heidelberg
    • Buneman, P., Cheney, J., Vansummeren, S.: On the expressiveness of implicit provenance in query and update languages. In: Schwentick, T., Suciu, D. (eds.) ICDT 2007. LNCS, vol.4353, pp. 209-223. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4353 , pp. 209-223
    • Buneman, P.1    Cheney, J.2    Vansummeren, S.3
  • 9
    • 79960570447 scopus 로고    scopus 로고
    • What and where: A characterization of data provenance
    • Buneman, P., Khanna, S., Tan, W.-C.: What and where: A characterization of data provenance. LNCS (2001)
    • (2001) LNCS
    • Buneman, P.1    Khanna, S.2    Tan, W.-C.3
  • 12
    • 51849083449 scopus 로고    scopus 로고
    • Scientific workflow provenance querying with security views
    • Chebotko, A., Chang, S., Lu, S., Fotouhi, F., Yang, P.: Scientific workflow provenance querying with security views. In: WAIM (2008)
    • (2008) WAIM
    • Chebotko, A.1    Chang, S.2    Lu, S.3    Fotouhi, F.4    Yang, P.5
  • 13
    • 47249132159 scopus 로고    scopus 로고
    • Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects
    • Drossopoulou, S. (ed.) ESOP 2008. Springer, Heidelberg
    • Cirillo, A., Jagadeesan, R., Pitcher, C., Riely, J.: Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects. In: Drossopoulou, S. (ed.) ESOP 2008. LNCS, vol.4960, pp. 208-223. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4960 , pp. 208-223
    • Cirillo, A.1    Jagadeesan, R.2    Pitcher, C.3    Riely, J.4
  • 17
    • 84948706138 scopus 로고    scopus 로고
    • Chimera: A virtual data system for representing, querying, and automating data derivation
    • July
    • Foster, I., Vockler, J., Eilde, M., Zhao, Y.: Chimera: A virtual data system for representing, querying, and automating data derivation. In: SSDBM (July 2002)
    • (2002) SSDBM
    • Foster, I.1    Vockler, J.2    Eilde, M.3    Zhao, Y.4
  • 18
    • 41149178153 scopus 로고    scopus 로고
    • Automatic capture and reconstruction of computational provenance
    • Frew, J., Metzger, D., Slaughter, P.: Automatic capture and reconstruction of computational provenance. Concurr. Comput.: Pract. Exper. 20(5), 485-496 (2008)
    • (2008) Concurr. Comput.: Pract. Exper. , vol.20 , Issue.5 , pp. 485-496
    • Frew, J.1    Metzger, D.2    Slaughter, P.3
  • 22
    • 85062006160 scopus 로고    scopus 로고
    • The case of the fake picasso: Preventing history forgery with secure provenance
    • Hasan, R., Sion, R., Winslett, M.: The case of the fake picasso: Preventing history forgery with secure provenance. In: FAST (2009)
    • (2009) FAST
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 23
    • 33750054098 scopus 로고    scopus 로고
    • Implementing a Secure Annotation Service
    • Moreau, L., Foster, I. (eds.) IPAW 2006. Springer, Heidelberg
    • Khan, I., Schroeter, R., Hunter, J.: Implementing a Secure Annotation Service. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.4145, pp. 212-221. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4145 , pp. 212-221
    • Khan, I.1    Schroeter, R.2    Hunter, J.3
  • 24
  • 26
    • 33744910535 scopus 로고    scopus 로고
    • Managing integrity for data exchanged on the web
    • Miklau, G., Suciu, D.:Managing integrity for data exchanged on the web. In:WebDB (2005)
    • (2005) WebDB
    • Miklau, G.1    Suciu, D.2
  • 28
    • 85084162561 scopus 로고    scopus 로고
    • Certificate revocation and certificate update
    • Naor, M., Nissim, K.: Certificate revocation and certificate update. In: USENIX (1998)
    • (1998) USENIX
    • Naor, M.1    Nissim, K.2
  • 30
    • 50649104772 scopus 로고    scopus 로고
    • Open provenance model (2008), http://twikiflipaw.info/bin/view/Challenge/ OPM
    • (2008) Open Provenance Model
  • 31
    • 29844457793 scopus 로고    scopus 로고
    • Verifying completeness of relational query results in data publishing
    • Pang, H., Jain, A., Ramamritham, K., Tan, K.: Verifying completeness of relational query results in data publishing. In: ACM SIGMOD (2005)
    • (2005) ACM SIGMOD
    • Pang, H.1    Jain, A.2    Ramamritham, K.3    Tan, K.4
  • 32
    • 84862396472 scopus 로고    scopus 로고
    • Electronic Commerce with Verifiable Audit Trails
    • Peha, J.M.: Electronic commerce with verifiable audit trails. In: Internet Society (1999)
    • (1999) Internet Society
    • Peha, J.M.1
  • 34
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Rivest, R., Shamir, A., Adelman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2) (1978)
    • (1978) Communications of the ACM , vol.21 , Issue.2
    • Rivest, R.1    Shamir, A.2    Adelman, L.3
  • 38
    • 33750087260 scopus 로고    scopus 로고
    • Security Issues in a SOA-Based Provenance System
    • Moreau, L., Foster, I. (eds.) IPAW 2006. Springer, Heidelberg
    • Tan, V., Groth, P., Miles, S., Jiang, S., Munroe, S., Tsasakou, S., Moreau, L.: Security Issues in a SOA-Based Provenance System. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.4145, pp. 203-211. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4145 , pp. 203-211
    • Tan, V.1    Groth, P.2    Miles, S.3    Jiang, S.4    Munroe, S.5    Tsasakou, S.6    Moreau, L.7


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.