메뉴 건너뛰기




Volumn E95-D, Issue 7, 2012, Pages 1894-1907

Securing provenance of distributed processes in an untrusted environment

Author keywords

Access control model; Database encryption; Provenance security

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; DIGITAL STORAGE; DIRECTED GRAPHS; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY;

EID: 84863460285     PISSN: 09168532     EISSN: 17451361     Source Type: Journal    
DOI: 10.1587/transinf.E95.D.1894     Document Type: Conference Paper
Times cited : (2)

References (35)
  • 1
    • 68849108353 scopus 로고    scopus 로고
    • Recording process documentation for provenance
    • P. Groth and L. Moreau, "Recording process documentation for provenance," IEEE Trans. Parallel Distrib. Syst., vol.20, no.9, pp.1246-1259, 2009.
    • (2009) IEEE Trans. Parallel Distrib. Syst. , vol.20 , Issue.9 , pp. 1246-1259
    • Groth, P.1    Moreau, L.2
  • 4
    • 31444456909 scopus 로고    scopus 로고
    • A survey of data provenance in e-science
    • DOI 10.1145/1084805.1084812
    • Y. Simmhan, B. Plale, and D. Gannon, "A survey of data provenance in e-science," SIGMOD Record, pp.31-36, 2005. (Pubitemid 43152529)
    • (2005) SIGMOD Record , vol.34 , Issue.3 , pp. 31-36
    • Simmhan, Y.L.1    Plale, B.2    Gannon, D.3
  • 6
    • 79960570447 scopus 로고    scopus 로고
    • Why and where: A characterization of data provenance
    • P. Buneman, S. Khanna, and W.C. Tan, "Why and where: A characterization of data provenance," International Conference on Database Theory (ICDT 2001), LNCS 1973, pp.316-330, 2001. (Pubitemid 33213333)
    • (2001) Lecture Notes in Computer Science , Issue.1973 , pp. 316-330
    • Buneman, P.1    Khanna, S.2    Tan, W.-C.3
  • 10
    • 33745593742 scopus 로고    scopus 로고
    • Research problems in data provenance
    • W.C. Tan, "Research problems in data provenance," IEEE Data Eng. Bull., vol.27, no.4, pp.45-52, 2004.
    • (2004) IEEE Data Eng. Bull. , vol.27 , Issue.4 , pp. 45-52
    • Tan, W.C.1
  • 11
    • 42449132132 scopus 로고    scopus 로고
    • Provenance in databases: Past, current, and future
    • W.C. Tan, "Provenance in databases: Past, current, and future," IEEE Data Eng. Bull., vol.30, no.4, pp.3-12, 2007.
    • (2007) IEEE Data Eng. Bull. , vol.30 , Issue.4 , pp. 3-12
    • Tan, W.C.1
  • 12
    • 41149088295 scopus 로고    scopus 로고
    • Automatic capture and efficient storage of e-Science experiment provenance
    • DOI 10.1002/cpe.1235
    • R.S. Barga and L.A. Digiampietri, "Automatic capture and efficient storage of e-science experiment provenance," Concurrency and Computation: Practice and Experience, vol.20, no.5, pp.419-429, 2008. (Pubitemid 351428356)
    • (2008) Concurrency Computation Practice and Experience , vol.20 , Issue.5 , pp. 419-429
    • Barga, R.S.1    Digiampietri, L.A.2
  • 13
    • 34250328839 scopus 로고    scopus 로고
    • The requirements of using provenance in e-science experiments
    • DOI 10.1007/s10723-006-9055-3
    • S. Miles, P.T. Groth, M. Branco, and L. Moreau, "The requirements of using provenance in e-science experiments," J. Grid Comput., vol.5, no.1, pp.1-25, 2007. (Pubitemid 46909010)
    • (2007) Journal of Grid Computing , vol.5 , Issue.1 , pp. 1-25
    • Miles, S.1    Groth, P.2    Branco, M.3    Moreau, L.4
  • 18
    • 21244466307 scopus 로고    scopus 로고
    • New approaches to digital evidence
    • U.M. Maurer, "New approaches to digital evidence," Proc. IEEE, vol.92, no.6, pp.933-947, 2004.
    • (2004) Proc. IEEE , vol.92 , Issue.6 , pp. 933-947
    • Maurer, U.M.1
  • 19
    • 79952938809 scopus 로고    scopus 로고
    • Database-centric chain-of-custody in biometric forensic systems
    • M. Schäler, S. Schulze, and S. Kiltz, "Database-centric chain-of-custody in biometric forensic systems," BIOID, pp.250-261, 2011.
    • (2011) BIOID , pp. 250-261
    • Schäler, M.1    Schulze, S.2    Kiltz, S.3
  • 21
    • 0025849585 scopus 로고
    • How to time-stamp a digital document
    • S. Haber and W.S. Stornetta, "How to time-stamp a digital document," J. Cryptology, vol.3, no.2, pp.99-111, 1991. (Pubitemid 21700570)
    • (1991) Journal of Cryptology , vol.3 , Issue.2 , pp. 99-111
    • Haber Stuart1    Stornetta W.Scott2
  • 24
    • 73849140516 scopus 로고    scopus 로고
    • Preventing history forgery with secure provenance
    • Dec.
    • R. Hasan, R. Sion, and M. Winslett, "Preventing history forgery with secure provenance," ACM Trans. Storage, vol.5, no.4, pp.12:1-12:43, Dec. 2009.
    • (2009) ACM Trans. Storage , vol.5 , Issue.4 , pp. 121-1243
    • Hasan, R.1    Sion, R.2    Winslett, M.3
  • 25
    • 62749160024 scopus 로고    scopus 로고
    • Kairos: An architecture for securing authorship and temporal information of provenance data in grid-enabled workflow management systems
    • Dec.
    • L.M.R. Gadelha and M. Mattoso, "Kairos: An architecture for securing authorship and temporal information of provenance data in grid-enabled workflow management systems," 2008 IEEE Fourth International Conference on eScience, pp.597-602, Dec. 2008.
    • (2008) 2008 IEEE Fourth International Conference on EScience , pp. 597-602
    • Gadelha, L.M.R.1    Mattoso, M.2
  • 35
    • 85027204186 scopus 로고    scopus 로고
    • AESCrypt, "http://www.aescrypt.com/"


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.