메뉴 건너뛰기




Volumn 5, Issue 4, 2009, Pages

Preventing history forgery with secure provenance

Author keywords

Audit; Confidentiality; Integrity; Lineage; Provenance; Security

Indexed keywords

APPLICATION LAYERS; DATA PROVENANCE; EMPIRICAL RESULTS; FILE SYSTEMS; MEDICAL DATA; RECORDING PROVENANCE; RIGHTS PROTECTION; RUNTIME OVERHEADS; SECURITY AND PRIVACY ISSUES; SYSTEM PROTOTYPE;

EID: 73849140516     PISSN: 15533077     EISSN: 15533093     Source Type: Journal    
DOI: 10.1145/1629080.1629082     Document Type: Article
Times cited : (78)

References (58)
  • 3
    • 33750073829 scopus 로고    scopus 로고
    • Automatic generation of workflow provenance
    • L. Moreau and I. T. Foster Eds, Springer
    • BARGA, R. S. AND DIGIAMPIETRI, L. A. 2006. Automatic generation of workflow provenance. Lecture Notes in Computer Science, vol.4145, L. Moreau and I. T. Foster Eds, Springer, 1-9.
    • (2006) Lecture Notes in Computer Science , vol.4145 , pp. 1-9
    • Barga, R.S.1    Digiampietri, L.A.2
  • 4
    • 0000576322 scopus 로고
    • CVS II: Parallelizing software development
    • USENIX Assoc., Berkeley, CA
    • BERLINER, B. 1990. CVS II: Parallelizing software development. In Proceedings of the Winter USENIX Conference. USENIX Assoc., Berkeley, CA, 341-352.
    • (1990) Proceedings of the Winter USENIX Conference , pp. 341-352
    • Berliner, B.1
  • 9
    • 33750051336 scopus 로고    scopus 로고
    • A provenance model for manually curated data
    • L. Morean and I. T. Foster Eds., Springer
    • BUNEMAN, P., CHAPMAN, A., CHENEY, J., AND VANSUMMEREN, S. 2006b. A provenance model for manually curated data. Lecture Notes in Computer Science, vol.4145, L. Morean and I. T. Foster Eds., Springer, 162-170.
    • (2006) Lecture Notes in Computer Science , vol.4145 , pp. 162-170
    • Buneman, P.1    Chapman, A.2    Cheney, J.3    Vansummeren, S.4
  • 11
  • 14
    • 2942710667 scopus 로고    scopus 로고
    • The subversion project: Buiding a better CVS
    • COLLINS-SUSSMAN, B. 2002. The subversion project: Buiding a better CVS. Linux J. 94, 3.
    • (2002) Linux J , vol.94 , pp. 3
    • Collins-Sussman, B.1
  • 15
    • 73849127170 scopus 로고    scopus 로고
    • CONGRESS OF THE UNITED STATES. Public. Law No. 106- 102, 113 Stat. 1338
    • CONGRESS OF THE UNITED STATES. 1999. Gramm-Leach-Bliley Financial Services Modernization Act. Public. Law No. 106-102, 113 Stat. 1338.
    • (1999) Gramm-Leach-Bliley Financial Services Modernization Act
  • 20
    • 0035946056 scopus 로고    scopus 로고
    • How to sign digital streams
    • GENNARO, R. AND ROHATGI, P. 2001. How to sign digital streams. Inform. Comput. 165, 1, 100-116.
    • (2001) Inform. Comput. , vol.165 , Issue.1 , pp. 100-116
    • Gennaro, R.1    Rohatgi, P.2
  • 21
    • 33751058375 scopus 로고    scopus 로고
    • Position statement: Musings on provenance, workflow workflow and (semantic web) annotations for bioinformatics
    • GOBLE, C. 2002. Position statement: Musings on provenance, workflow workflow and (semantic web) annotations for bioinformatics. In Proceedings of the Workshop on Data Derivation and Provenance.
    • (2002) Proceedings of the Workshop on Data Derivation and Provenance
    • Goble, C.1
  • 22
    • 33750077260 scopus 로고    scopus 로고
    • Combining provenance with trust in social networks for semantic web content filtering
    • I. Moreau and I. T. Foster Eds, Springer
    • GOLBECK, J. 2006. Combining provenance with trust in social networks for semantic web content filtering. Lecture Notes in Computer Science, vol.4145, I. Moreau and I. T. Foster Eds, Springer, 101-108.
    • (2006) Lecture Notes in Computer Science , vol.4145 , pp. 101-108
    • Golbeck, J.1
  • 28
    • 33750913340 scopus 로고    scopus 로고
    • A practical revocation scheme for broadcast encryption using smartcards
    • KOGAN, N., SHAVITT, Y., ANDWOOL, A. 2006. A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inform. Syst. Secur. 9, 3, 325-351.
    • (2006) ACM Trans. Inform. Syst. Secur. , vol.9 , Issue.3 , pp. 325-351
    • Kogan, N.1    Shavitt, Y.2    Andwool, A.3
  • 30
    • 73849136095 scopus 로고    scopus 로고
    • Collaborating with GIT
    • LOELIGER, J. 2006. Collaborating with GIT. Linux Mag.
    • (2006) Linux Mag
    • Loeliger, J.1
  • 31
    • 0035124553 scopus 로고    scopus 로고
    • When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
    • LYNCH,C.A. 2001. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web. J. Amer. Soci. Inform. Sci. Tech. 52, 1, 12-17.
    • (2001) J. Amer. Soci. Inform. Sci. Tech. , vol.52 , Issue.1 , pp. 12-17
    • Lynchc, A.1
  • 32
    • 85084161556 scopus 로고    scopus 로고
    • Secure history preservation through timeline entanglement
    • USENIX Association, Berkeley, CA
    • MANIATIS, P. AND BAKER, M. 2002. Secure history preservation through timeline entanglement. In Proceedings of the 11th USENIX Security Symposium. USENIX Association, Berkeley, CA, 297-312.
    • (2002) Proceedings of the 11th USENIX Security Symposium , pp. 297-312
    • Maniatis, P.1    Baker, M.2
  • 33
    • 33845524696 scopus 로고    scopus 로고
    • Controlled and cooperative updates of XML documents in Byzantine and failure-prone distributed systems
    • MELLA, G., FERRARI, E., BERTINO, E., AND KOGLIN, Y. 2006. Controlled and cooperative updates of XML documents in Byzantine and failure-prone distributed systems. ACM Trans. Inform. Syst. Secur. 9, 4, 421-460.
    • (2006) ACM Trans. Inform. Syst. Secur. , vol.9 , Issue.4 , pp. 421-460
    • Mella, G.1    Ferrari, E.2    Bertino, E.3    Koglin, Y.4
  • 42
    • 0025436383 scopus 로고
    • Skip lists: A probabilistic alternative to balanced trees
    • PUGH, W. 1990. Skip lists: A probabilistic alternative to balanced trees. Comm. ACM 33, 6, 668-676.
    • (1990) Comm. ACM , vol.33 , Issue.6 , pp. 668-676
    • Pugh, W.1
  • 46
    • 85021950441 scopus 로고    scopus 로고
    • Secure audit logs to support computer forensics
    • SCHNEIER, B. AND KELSEY, J. 1999. Secure audit logs to support computer forensics. ACM Trans. Inform. Syst. Secur. 2, 2, 159-176.
    • (1999) ACM Trans. Inform. Syst. Secur. , vol.2 , Issue.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2
  • 48
    • 0018545449 scopus 로고
    • How to share a secret
    • SHAMIR, A. 1979. How to share a secret. Comm. ACM 22, 11, 612-613.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 49
    • 31444456909 scopus 로고    scopus 로고
    • Asurvey of data provenance in e-science
    • SIMMHAN,Y. L., PLALE, B., ANDGANNON,D. 2005. Asurvey of data provenance in e-science.SIGMOD Rec. 34, 3, 31-36.
    • (2005) SIGMOD Rec , vol.34 , Issue.3 , pp. 31-36
    • Simmhany., L.1    Plale, B.2    Andgannon, D.3
  • 55
    • 73849133378 scopus 로고    scopus 로고
    • U.S. PUBLIC LAW NO. 107-204, 116 STAT. 745. 2002. Public Company Accounting Reform and Investor Protection Act
    • U.S. PUBLIC LAW NO. 107-204, 116 STAT. 745. 2002. Public Company Accounting Reform and Investor Protection Act.
  • 56
    • 33750047467 scopus 로고    scopus 로고
    • Towards low overhead provenance tracking in near realtime stream filtering
    • I. Moreau and I. T. Foster Eds, Springer
    • VIJAYAKUMAR, N. N. AND PLALE, B. 2006. Towards low overhead provenance tracking in near realtime stream filtering. Lecture Notes in Computer Science, vol.4145, I. Moreau and I. T. Foster Eds, Springer, 46-54.
    • (2006) Lecture Notes in Computer Science , vol.4145 , pp. 46-54
    • Vijayakumar, N.N.1    Plale, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.