-
1
-
-
82655166471
-
A five-year study of file-system metadata
-
USENIX Association, Berkeley, CA
-
AGRAWAL, N., BOLOSKY,W. J., DOUCEUR, J. R., AND LORCH, J. R. 2007. A five-year study of file-system metadata. In Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA.
-
(2007)
Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST)
-
-
Agrawal, N.1
Bolosky, W.J.2
Douceur, J.R.3
Lorch, J.R.4
-
3
-
-
33750073829
-
Automatic generation of workflow provenance
-
L. Moreau and I. T. Foster Eds, Springer
-
BARGA, R. S. AND DIGIAMPIETRI, L. A. 2006. Automatic generation of workflow provenance. Lecture Notes in Computer Science, vol.4145, L. Moreau and I. T. Foster Eds, Springer, 1-9.
-
(2006)
Lecture Notes in Computer Science
, vol.4145
, pp. 1-9
-
-
Barga, R.S.1
Digiampietri, L.A.2
-
4
-
-
0000576322
-
CVS II: Parallelizing software development
-
USENIX Assoc., Berkeley, CA
-
BERLINER, B. 1990. CVS II: Parallelizing software development. In Proceedings of the Winter USENIX Conference. USENIX Assoc., Berkeley, CA, 341-352.
-
(1990)
Proceedings of the Winter USENIX Conference
, pp. 341-352
-
-
Berliner, B.1
-
6
-
-
33750071081
-
Issues in automatic provenance collection
-
L. Moreau and I. T. Foster Eds., I. T. Foster Eds, Springer
-
BRAUN, U., GARFINKEL, S. L., HOLLAND, D. A., MUNISWAMY-REDDY, K.-K., AND SELTZER, M. I. 2006. Issues in automatic provenance collection. Lecture Notes in Computer Science, vol.4145, L. Moreau and I. T. Foster Eds., I. T. Foster Eds, Springer, 171-183.
-
(2006)
Lecture Notes in Computer Science
, vol.4145
, pp. 171-183
-
-
Braun, U.1
Garfinkel, S.L.2
Holland, D.A.3
Muniswamy-Reddy, K.-K.4
Seltzer, M.I.5
-
7
-
-
85091898032
-
Securing provenance
-
USENIX Association, Berkeley, CA
-
BRAUN, U., SHINNAR, A., AND SELTZER, M. 2008. Securing provenance. In Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (USENIX HotSec). USENIX Association, Berkeley, CA.
-
(2008)
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security (USENIX HotSec)
-
-
Braun, U.1
Shinnar, A.2
Seltzer, M.3
-
8
-
-
33846076805
-
Provenance management in curated databases
-
ACM Press, New York, NY
-
BUNEMAN, P., CHAPMAN, A., AND CHENEY, J. 2006a. Provenance management in curated databases. In Proceedings of the ACM International Conference on Management of Data (SIGMOD). ACM Press, New York, NY, 539-550.
-
(2006)
Proceedings of the ACM International Conference on Management of Data (SIGMOD)
, pp. 539-550
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
-
9
-
-
33750051336
-
A provenance model for manually curated data
-
L. Morean and I. T. Foster Eds., Springer
-
BUNEMAN, P., CHAPMAN, A., CHENEY, J., AND VANSUMMEREN, S. 2006b. A provenance model for manually curated data. Lecture Notes in Computer Science, vol.4145, L. Morean and I. T. Foster Eds., Springer, 162-170.
-
(2006)
Lecture Notes in Computer Science
, vol.4145
, pp. 162-170
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
Vansummeren, S.4
-
10
-
-
84947733945
-
Data provenance: Some basic issues
-
Springer-Verlag
-
BUNEMAN, P.,KHANNA, S., AND TAN,W. C. 2000. Data provenance: Some basic issues. In Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS). Springer-Verlag, 87-93.
-
(2000)
Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS)
, pp. 87-93
-
-
Buneman, P.1
Khanna, S.2
Tan, W.C.3
-
11
-
-
79960570447
-
Why and where: A characterization of data provenance
-
BUNEMAN, P., KHANNA, S., AND TAN, W. C. 2001. Why and where: A characterization of data provenance. Lecture Notes in Computer Science, vol.1973, 316-330.
-
(2001)
Lecture Notes in Computer Science
, vol.1973
, pp. 316-330
-
-
Buneman, P.1
Khanna, S.2
Tan, W.C.3
-
14
-
-
2942710667
-
The subversion project: Buiding a better CVS
-
COLLINS-SUSSMAN, B. 2002. The subversion project: Buiding a better CVS. Linux J. 94, 3.
-
(2002)
Linux J
, vol.94
, pp. 3
-
-
Collins-Sussman, B.1
-
15
-
-
73849127170
-
-
CONGRESS OF THE UNITED STATES. Public. Law No. 106- 102, 113 Stat. 1338
-
CONGRESS OF THE UNITED STATES. 1999. Gramm-Leach-Bliley Financial Services Modernization Act. Public. Law No. 106-102, 113 Stat. 1338.
-
(1999)
Gramm-Leach-Bliley Financial Services Modernization Act
-
-
-
17
-
-
85077220466
-
Passive NFS tracing of email and research workloads
-
USENIX Association, Berkeley, CA
-
ELLARD, D., LEDLIE, J., MALKANI, P., AND SELTZER, M. 2003. Passive NFS tracing of email and research workloads. In Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA, 203-216.
-
(2003)
Proceedings of the 2nd USENIX Conference on File and Storage Technologies (FAST)
, pp. 203-216
-
-
Ellard, D.1
Ledlie, J.2
Malkani, P.3
Seltzer, M.4
-
18
-
-
84948706138
-
Chimera: A virtual data system for representing, querying, and automating data derivation
-
IEEE Computer Society, Los Alamitos, CA
-
FOSTER, I. T., VOCKLER, J.-S., WILDE, M., AND ZHAO, Y. 2002. Chimera: A virtual data system for representing, querying, and automating data derivation. In Proceedings of the 14th International Conference on Scientific and Statistical Database Management (SSDBM'02). IEEE Computer Society, Los Alamitos, CA, 37-46.
-
(2002)
Proceedings of the 14th International Conference on Scientific and Statistical Database Management (SSDBM'02)
, pp. 37-46
-
-
Foster, I.T.1
Vockler, J.-S.2
Wilde, M.3
Zhao, Y.4
-
19
-
-
0013232092
-
Earth system science workbench: A data management infrastructure for earth science products
-
IEEE Computer Society, Los Alamitos, CA
-
FREW, J. AND BOSE, R. 2001. Earth system science workbench: A data management infrastructure for earth science products. In Proceedings of the 13th International Conference on Scientific and Statistical Database Management (SSDBM'01). IEEE Computer Society, Los Alamitos, CA, 180.
-
(2001)
Proceedings of the 13th International Conference on Scientific and Statistical Database Management (SSDBM'01)
, pp. 180
-
-
Frew, J.1
Bose, R.2
-
20
-
-
0035946056
-
How to sign digital streams
-
GENNARO, R. AND ROHATGI, P. 2001. How to sign digital streams. Inform. Comput. 165, 1, 100-116.
-
(2001)
Inform. Comput.
, vol.165
, Issue.1
, pp. 100-116
-
-
Gennaro, R.1
Rohatgi, P.2
-
21
-
-
33751058375
-
Position statement: Musings on provenance, workflow workflow and (semantic web) annotations for bioinformatics
-
GOBLE, C. 2002. Position statement: Musings on provenance, workflow workflow and (semantic web) annotations for bioinformatics. In Proceedings of the Workshop on Data Derivation and Provenance.
-
(2002)
Proceedings of the Workshop on Data Derivation and Provenance
-
-
Goble, C.1
-
22
-
-
33750077260
-
Combining provenance with trust in social networks for semantic web content filtering
-
I. Moreau and I. T. Foster Eds, Springer
-
GOLBECK, J. 2006. Combining provenance with trust in social networks for semantic web content filtering. Lecture Notes in Computer Science, vol.4145, I. Moreau and I. T. Foster Eds, Springer, 101-108.
-
(2006)
Lecture Notes in Computer Science
, vol.4145
, pp. 101-108
-
-
Golbeck, J.1
-
25
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
ACM Press, New York, NY
-
HASAN, R., SION, R., AND WINSLETT, M. 2007. Introducing secure provenance: Problems and challenges. In Proceedings of the ACM Workshop on Storage Security and Survivability (StorageSS). ACM Press, New York, NY, 13-18.
-
(2007)
Proceedings of the ACM Workshop on Storage Security and Survivability (StorageSS)
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
26
-
-
85062006160
-
The case of the fake Picasso: Preventing history forgery with secure provenance
-
USENIX Association, Berkeley, CA
-
HASAN, R., SION, R., AND WINSLETT, M. 2009. The case of the fake Picasso: Preventing history forgery with secure provenance. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA.
-
(2009)
Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST)
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
28
-
-
33750913340
-
A practical revocation scheme for broadcast encryption using smartcards
-
KOGAN, N., SHAVITT, Y., ANDWOOL, A. 2006. A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inform. Syst. Secur. 9, 3, 325-351.
-
(2006)
ACM Trans. Inform. Syst. Secur.
, vol.9
, Issue.3
, pp. 325-351
-
-
Kogan, N.1
Shavitt, Y.2
Andwool, A.3
-
29
-
-
84945511204
-
Measurement and analysis of large-scale network file system workloads
-
USENIX Association, Berkeley, CA
-
LEUNG, A. W., PASUPATHY, S., GOODSON, G., AND MILLER, E. L. 2008. Measurement and analysis of large-scale network file system workloads. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, 213-226.
-
(2008)
Proceedings of the USENIX Annual Technical Conference
, pp. 213-226
-
-
Leung, A.W.1
Pasupathy, S.2
Goodson, G.3
Miller, E.L.4
-
30
-
-
73849136095
-
Collaborating with GIT
-
LOELIGER, J. 2006. Collaborating with GIT. Linux Mag.
-
(2006)
Linux Mag
-
-
Loeliger, J.1
-
31
-
-
0035124553
-
When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
-
LYNCH,C.A. 2001. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web. J. Amer. Soci. Inform. Sci. Tech. 52, 1, 12-17.
-
(2001)
J. Amer. Soci. Inform. Sci. Tech.
, vol.52
, Issue.1
, pp. 12-17
-
-
Lynchc, A.1
-
32
-
-
85084161556
-
Secure history preservation through timeline entanglement
-
USENIX Association, Berkeley, CA
-
MANIATIS, P. AND BAKER, M. 2002. Secure history preservation through timeline entanglement. In Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, CA, 297-312.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 297-312
-
-
Maniatis, P.1
Baker, M.2
-
33
-
-
33845524696
-
Controlled and cooperative updates of XML documents in Byzantine and failure-prone distributed systems
-
MELLA, G., FERRARI, E., BERTINO, E., AND KOGLIN, Y. 2006. Controlled and cooperative updates of XML documents in Byzantine and failure-prone distributed systems. ACM Trans. Inform. Syst. Secur. 9, 4, 421-460.
-
(2006)
ACM Trans. Inform. Syst. Secur.
, vol.9
, Issue.4
, pp. 421-460
-
-
Mella, G.1
Ferrari, E.2
Bertino, E.3
Koglin, Y.4
-
35
-
-
84961817130
-
The open provenance model: An overview
-
MOREAU, L., FREIRE, J., FUTRELLE, J., MCGRATH, R. E., MYERS, J., AND PAULSON, P. 2008. The open provenance model: An overview. In Proceedings of the International Provenance and Associations Workshop (IPAW), J. Freire, D. Koop, and L. Moreau, Eds. Lecture Notes in Computer Science, vol.5272. Springer, 323-326.
-
(2008)
Proceedings of the International Provenance and Associations Workshop (IPAW)
, vol.5272
, pp. 323-326
-
-
Moreau, L.1
Freire, J.2
Futrelle, J.3
McGrath, R.E.4
Myers, J.5
Paulson, P.6
-
36
-
-
42149109673
-
The provenance of electronic data
-
MOREAU, L., GROTH, P., MILES, S., VAZQUEZ-SALCEDA, J., IBBOTSON, J., JIANG, S., MUNROE, S., RANA, O., SCHREIBER, A., TAN, V., ANDVARGA, L. 2008. The provenance of electronic data. Comm.ACM51, 4, 52-58.
-
(2008)
Comm.ACM51
, vol.4
, pp. 52-58
-
-
Moreau, L.1
Groth, P.2
Miles, S.3
Vazquez-Salceda, J.4
Ibbotson, J.5
Jiang, S.6
Munroe, S.7
Rana, O.8
Schreiber, A.9
Tan, V.10
Andvarga, L.11
-
37
-
-
85029476360
-
Layering in provenance systems
-
USENIX Association, Berkeley, CA
-
MUNISWAMY-REDDY, K.-K., BRAUN, U., HOLLAND, D. A., MACKO, P., MACLEAN, D., MARGO, D., SELTZER, M., AND SMOGOR, R. 2009. Layering in provenance systems. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA.
-
(2009)
Proceedings of the USENIX Annual Technical Conference
-
-
Muniswamy-Reddy, K.-K.1
Braun, U.2
Holland, D.A.3
MacKo, P.4
MacLean, D.5
Margo, D.6
Seltzer, M.7
Smogor, R.8
-
38
-
-
85076227002
-
Provenance-aware storage systems
-
USENIX Association, Berkeley, CA
-
MUNISWAMY-REDDY, K.-K., HOLLAND, D. A., BRAUN, U., AND SELTZER, M. I. 2006. Provenance-aware storage systems. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, 43-56.
-
(2006)
Proceedings of the USENIX Annual Technical Conference
, pp. 43-56
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.A.2
Braun, U.3
Seltzer, M.I.4
-
39
-
-
10444244154
-
A collaborative informatics infrastructure for multi-scale science
-
IEEE Computer Society, Los Alamitos, CA
-
MYERS, J. D., ALLISON, T. C., BITTNER, S., DIDIER, B., FRENKLACH, M., WILLIAM H. GREEN, J., HO, Y.-L., HEWSON, J., KOEGLER, W., LANSING, C., LEAHY, D., LEE, M., MCCOY, R., MINKOFF, M., NIJSURE, S., VON LASZEWSKI,G.,MONTOYA,D., PANCERELLA,C., PINZON, R., PITZ,W.,RAHN, L. A.,RUSCIC,B., SCHUCHARDT, K., STEPHAN, E., WAGNER, A., WINDUS, T., AND YANG, C. 2004. A collaborative informatics infrastructure for multi-scale science. In Proceedings of the 2nd International Workshop on Challenges of Large Applications in Distributed Environments (CLADE'04). IEEE Computer Society, Los Alamitos, CA, 24.
-
(2004)
Proceedings of the 2nd International Workshop on Challenges of Large Applications in Distributed Environments (CLADE'04)
, pp. 24
-
-
Myers, J.D.1
Allison, T.C.2
Bittner, S.3
Didier, B.4
Frenklach, M.5
William, H.6
Green, J.7
Ho, Y.-L.8
Hewson, J.9
Koegler, W.10
Lansing, C.11
Leahy, D.12
Lee, M.13
McCoy, R.14
Minkoff, M.15
Nijsure, S.16
Von Laszewski, G.17
Montoyad, D.18
Pancerella, C.19
Pinzon, R.20
Pitz, W.21
Rahn, L.A.22
Ruscic, B.23
Schuchardt, K.24
Stephan, E.25
Wagner, A.26
Windus, T.27
Yang, C.28
more..
-
40
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
PERRIG, A., CANETTI, R., TYGAR, D., AND SONG, D. X. 2000. Efficient authentication and signing of multicast streams over lossy channels. In Proceedings of the IEEE Symposium on Security and Privacy. 56-73.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.X.4
-
41
-
-
85077267765
-
Design and implementation of verifiable audit trails for a versioning file system
-
USENIX Association, Berkeley, CA
-
PETERSON, Z. N. J., BURNS, R., ATENIESE, G., AND BONO, S. 2007. Design and implementation of verifiable audit trails for a versioning file system. In Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST). USENIX Association, Berkeley, CA, 20-20
-
(2007)
Proceedings of the 5th USENIX Conference on File and Storage Technologies (FAST)
, pp. 20-20
-
-
Peterson, Z.N.J.1
Burns, R.2
Ateniese, G.3
Bono, S.4
-
42
-
-
0025436383
-
Skip lists: A probabilistic alternative to balanced trees
-
PUGH, W. 1990. Skip lists: A probabilistic alternative to balanced trees. Comm. ACM 33, 6, 668-676.
-
(1990)
Comm. ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
43
-
-
85084163129
-
A comparison of file system workloads
-
USENIX Association, Berkeley, CA
-
ROSELLI, D., LORCH, J. R., AND ANDERSON, T. E. 2000. A comparison of file system workloads. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA.
-
(2000)
Proceedings of the USENIX Annual Technical Conference
-
-
Roselli, D.1
Lorch, J.R.2
Anderson, T.E.3
-
46
-
-
85021950441
-
Secure audit logs to support computer forensics
-
SCHNEIER, B. AND KELSEY, J. 1999. Secure audit logs to support computer forensics. ACM Trans. Inform. Syst. Secur. 2, 2, 159-176.
-
(1999)
ACM Trans. Inform. Syst. Secur.
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
47
-
-
85084163097
-
File system logging versus clustering: A performance comparison
-
USENIX Association, Berkeley, CA
-
SELTZER, M., SMITH, K. A., BALAKRISHNAN, H., CHANG, J., MCMAINS, S., AND PADMANABHAN, V. 1995. File system logging versus clustering: A performance comparison. In Proceedings of the USENIX Annual Technical Conference. USENIX Association, Berkeley, CA, 21-21
-
(1995)
Proceedings of the USENIX Annual Technical Conference
, pp. 21-21
-
-
Seltzer, M.1
Smith, K.A.2
Balakrishnan, H.3
Chang, J.4
McMains, S.5
Padmanabhan, V.6
-
48
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
49
-
-
31444456909
-
Asurvey of data provenance in e-science
-
SIMMHAN,Y. L., PLALE, B., ANDGANNON,D. 2005. Asurvey of data provenance in e-science.SIGMOD Rec. 34, 3, 31-36.
-
(2005)
SIGMOD Rec
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhany., L.1
Plale, B.2
Andgannon, D.3
-
50
-
-
85054455230
-
Tamper detection in audit logs
-
VLDB Endowment, Toronto, Canada
-
SNODGRASS, R. T., YAO, S. S., AND COLLBERG, C. 2004. Tamper detection in audit logs. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB). VLDB Endowment, Toronto, Canada, 504-515.
-
(2004)
Proceedings of the 30th International Conference on Very Large Data Bases (VLDB)
, pp. 504-515
-
-
Snodgrass, R.T.1
Yao, S.S.2
Collberg, C.3
-
52
-
-
33750087260
-
Security issues in a SOA-based provenance system
-
I. Moreau and I. T. Foster Eds, Springer
-
TAN, V., GROTH, P., MILES, S., JIANG, S., MUNROE, S., TSASAKOU, S., AND MOREAU, L. 2006. Security issues in a SOA-based provenance system. Lecture Notes in Computer Science, vol.4145, I. Moreau and I. T. Foster Eds, Springer, 203-211.
-
(2006)
Lecture Notes in Computer Science
, vol.4145
, pp. 203-211
-
-
Tan, V.1
Groth, P.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
53
-
-
73849090652
-
-
Tech. rep., University of Southampton
-
TAN, V., MUNROE, S., GROTH, P., JIANG, S., MILES, S., AND MOREAU, L. 2006. A profile for nonrepudiable process documentation. Tech. rep., University of Southampton, http://eprints.ecs. soton.ac.uk/13054/.
-
(2006)
A Profile for Nonrepudiable Process Documentation
-
-
Tan, V.1
Munroe, S.2
Groth, P.3
Jiang, S.4
Miles, S.5
Moreau, L.6
-
55
-
-
73849133378
-
-
U.S. PUBLIC LAW NO. 107-204, 116 STAT. 745. 2002. Public Company Accounting Reform and Investor Protection Act
-
U.S. PUBLIC LAW NO. 107-204, 116 STAT. 745. 2002. Public Company Accounting Reform and Investor Protection Act.
-
-
-
-
56
-
-
33750047467
-
Towards low overhead provenance tracking in near realtime stream filtering
-
I. Moreau and I. T. Foster Eds, Springer
-
VIJAYAKUMAR, N. N. AND PLALE, B. 2006. Towards low overhead provenance tracking in near realtime stream filtering. Lecture Notes in Computer Science, vol.4145, I. Moreau and I. T. Foster Eds, Springer, 46-54.
-
(2006)
Lecture Notes in Computer Science
, vol.4145
, pp. 46-54
-
-
Vijayakumar, N.N.1
Plale, B.2
-
58
-
-
35048829740
-
Semantically linking and browsing provenance logs for e-science
-
ZHAO, J., GOBLE, C. A., STEVENS, R., AND BECHHOFER, S. 2004. Semantically linking and browsing provenance logs for e-science. In Proceedings of the 1st International IFIP Conference on Semantics of a Networked World (ICSNW). 158-176.
-
(2004)
Proceedings of the 1st International IFIP Conference on Semantics of A Networked World (ICSNW)
, pp. 158-176
-
-
Zhao, J.1
Goble, C.A.2
Stevens, R.3
Bechhofer, S.4
|