-
1
-
-
78149345705
-
Provenance-based trustworthiness assessment in sensor networks
-
H. Lim, Y. Moon, and E. Bertino, "Provenance-Based Trustworthiness Assessment in Sensor Networks," Proc. Seventh Int'l Workshop Data Management for Sensor Networks, pp. 2-7, 2010.
-
(2010)
Proc. Seventh Int'l Workshop Data Management for Sensor Networks
, pp. 2-7
-
-
Lim, H.1
Moon, Y.2
Bertino, E.3
-
2
-
-
84948706138
-
Chimera: A virtual data system for representing, querying, and automating data derivation
-
I. Foster, J. Vockler, M. Wilde, and Y. Zhao, "Chimera: A Virtual Data System for Representing, Querying, and Automating Data Derivation," Proc. Conf. Scientific and Statistical Database Management, pp. 37-46, 2002.
-
(2002)
Proc. Conf. Scientific and Statistical Database Management
, pp. 37-46
-
-
Foster, I.1
Vockler, J.2
Wilde, M.3
Zhao, Y.4
-
3
-
-
85076227002
-
Provenance-aware storage systems
-
K. Muniswamy-Reddy, D. Holland, U. Braun, and M. Seltzer, "Provenance-Aware Storage systems," Proc. USENIX Ann. Technical Conf., pp. 4-4, 2006.
-
(2006)
Proc. USENIX Ann. Technical Conf.
, pp. 4-4
-
-
Muniswamy-Reddy, K.1
Holland, D.2
Braun, U.3
Seltzer, M.4
-
4
-
-
31444456909
-
A survey of data provenance in E-science
-
Y. Simmhan, B. Plale, and D. Gannon, "A Survey of Data Provenance in E-Science," ACMSIGMODRecord, vol. 34, pp. 31-36, 2005.
-
(2005)
ACMSIGMODRecord
, vol.34
, pp. 31-36
-
-
Simmhan, Y.1
Plale, B.2
Gannon, D.3
-
5
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
R. Hasan, R. Sion, and M. Winslett, "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance," Proc. Seventh Conf. File and Storage Technologies (FAST), pp. 1-14, 2009.
-
(2009)
Proc. Seventh Conf. File and Storage Technologies (FAST)
, pp. 1-14
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
6
-
-
84978428047
-
TAG: A tiny aggregation service for Ad-Hoc sensor networks
-
Dec.
-
S. Madden, J. Franklin, J. Hellerstein, and W. Hong, "TAG: A Tiny Aggregation Service for Ad-Hoc Sensor Networks," ACM SIGOPS Operating Systems Rev., vol. 36, no. SI, pp. 131-146, Dec. 2002.
-
(2002)
ACM SIGOPS Operating Systems Rev.
, vol.36
, Issue.SI
, pp. 131-146
-
-
Madden, S.1
Franklin, J.2
Hellerstein, J.3
Hong, W.4
-
7
-
-
84907681218
-
An efficient clustering based heuristic for data gathering and aggregation in sensor networks
-
K. Dasgupta, K. Kalpakis, and P. Namjoshi, "An Efficient Clustering Based Heuristic for Data Gathering and Aggregation in Sensor Networks," Proc. Wireless Comm. and Networking Conf., pp. 1948-1953, 2003.
-
(2003)
Proc. Wireless Comm. and Networking Conf.
, pp. 1948-1953
-
-
Dasgupta, K.1
Kalpakis, K.2
Namjoshi, P.3
-
8
-
-
80052392234
-
A provenance based mechanism to identify malicious packet dropping adversaries in sensor networks
-
S. Sultana, E. Bertino, and M. Shehab, "A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks," Proc. Int'l Conf. Distributed Computing Systems (ICDCS) Workshops, pp. 332-338, 2011.
-
(2011)
Proc. Int'l Conf. Distributed Computing Systems (ICDCS) Workshops
, pp. 332-338
-
-
Sultana, S.1
Bertino, E.2
Shehab, M.3
-
9
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
June
-
L. Fan, P. Cao, J. Almeida, and A.Z. Broder, "Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol," IEEE/ACM Trans. Networking, vol. 8, no. 3, pp. 281-293, June 2000.
-
(2000)
IEEE/ACM Trans. Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
11
-
-
79953777367
-
In-packet bloom filters: Design and networking applications
-
C. Rothenberg, C. Macapuna, M. Magalhaes, F. Verdi, and A. Wiesmaier, "In-Packet Bloom Filters: Design and Networking Applications," Computer Networks, vol. 55, no. 6, pp. 1364-1378, 2011.
-
(2011)
Computer Networks
, vol.55
, Issue.6
, pp. 1364-1378
-
-
Rothenberg, C.1
MacApuna, C.2
Magalhaes, M.3
Verdi, F.4
Wiesmaier, A.5
-
12
-
-
34548791705
-
Proof sketches: Verifiable in-netwok aggregation
-
M. Garofalakis, J. Hellerstein, and P. Maniatis, "Proof Sketches: Verifiable In-Netwok Aggregation," Proc. IEEE 23rd Int'l Conf. Data Eng. (ICDE), pp. 84-89, 2007.
-
(2007)
Proc. IEEE 23rd Int'l Conf. Data Eng. (ICDE)
, pp. 84-89
-
-
Garofalakis, M.1
Hellerstein, J.2
Maniatis, P.3
-
14
-
-
33845747795
-
Secure hierarchical in-network aggregation in sensor networks
-
H. Chan, A. Perrig, and D. Song, "Secure Hierarchical In-Network Aggregation in Sensor Networks," Proc. Conf. Computer and Comm. Security (CCS), pp. 278-287, 2006.
-
(2006)
Proc. Conf. Computer and Comm. Security (CCS)
, pp. 278-287
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
15
-
-
84861116512
-
Secure data aggregation in wireless sensor networks
-
June
-
S. Roy, M. Conti, S. Setia, and S. Jajodia, "Secure Data Aggregation in Wireless Sensor Networks," IEEE Trans. Information Forensics and Security, vol. 7, no. 3, pp. 1040-1052, June 2012.
-
(2012)
IEEE Trans. Information Forensics and Security
, vol.7
, Issue.3
, pp. 1040-1052
-
-
Roy, S.1
Conti, M.2
Setia, S.3
Jajodia, S.4
-
17
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. Int'l Conf. Mobile Computing and Networking, pp. 255-265, 2000.
-
(2000)
Proc. Int'l Conf. Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
18
-
-
79957865770
-
Secure and efficient in-network processing of exact sum queries
-
S. Papadopoulos, A. Kiayias, and D. Papadias, "Secure and Efficient In-Network Processing of Exact Sum Queries," Proc. Int'l Conf. Data Eng., pp. 517-528, 2011.
-
(2011)
Proc. Int'l Conf. Data Eng.
, pp. 517-528
-
-
Papadopoulos, S.1
Kiayias, A.2
Papadias, D.3
-
20
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: A Link Layer Security Architecture for Wireless Sensor Networks," Proc. Int'l Conf. Embedded Networked Sensor Systems, pp. 162-175, 2004.
-
(2004)
Proc. Int'l Conf. Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
21
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, pp. 422-426, 1970.
-
(1970)
Comm. ACM
, vol.13
, pp. 422-426
-
-
Bloom, B.1
-
23
-
-
3543100577
-
Statistical en-Route filtering of injected false data in sensor networks
-
F. Ye, H. Luo, S. Lu, and L. Zhang, "Statistical en-Route Filtering of Injected False Data in Sensor Networks," Proc. IEEE INFOCOM, pp. 839-850, 2004.
-
(2004)
Proc. IEEE INFOCOM
, pp. 839-850
-
-
Ye, F.1
Luo, H.2
Lu, S.3
Zhang, L.4
-
24
-
-
18844399081
-
TOSSIM: Accurate and scalable simulation of entire tinyos applications
-
P. Levis, N. Lee, M. Welsh, and D. Culler, "TOSSIM: Accurate and Scalable Simulation of Entire Tinyos Applications," Proc. Int'l Conf. Embedded Networked Sensor Systems, pp. 126-137, 2003.
-
(2003)
Proc. Int'l Conf. Embedded Networked Sensor Systems
, pp. 126-137
-
-
Levis, P.1
Lee, N.2
Welsh, M.3
Culler, D.4
-
25
-
-
84866494570
-
Powertossim z: Realistic energy modelling for wireless sensor network environments
-
E. Perla, A. Catháin, R.S. Carbajo, M. Huggard, and C.M. Goldrick, "Powertossim z: Realistic Energy Modelling for Wireless Sensor Network Environments," Proc. ACM Workshop Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, pp. 35-42, 2008.
-
(2008)
Proc. ACM Workshop Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks
, pp. 35-42
-
-
Perla, E.1
Catháin, A.2
Carbajo, R.S.3
Huggard, M.4
Goldrick, C.M.5
-
26
-
-
78650064497
-
-
Technical Report, Georgia Tech
-
A. Ramachandran, K. Bhandankar, M. Tariq, and N. Feamster, "Packets with Provenance," Technical Report GT-CS-08-02, Georgia Tech, 2008.
-
(2008)
Packets with Provenance
-
-
Ramachandran, A.1
Bhandankar, K.2
Tariq, M.3
Feamster, N.4
-
27
-
-
77954746819
-
Efficient querying and maintenance of network provenance at internet-scale
-
W. Zhou, M. Sherr, T. Tao, X. Li, B. Loo, and Y. Mao, "Efficient Querying and Maintenance of Network Provenance at Internet-Scale," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 615-626, 2010.
-
(2010)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 615-626
-
-
Zhou, W.1
Sherr, M.2
Tao, T.3
Li, X.4
Loo, B.5
Mao, Y.6
-
28
-
-
82655175514
-
Secure network provenance
-
W. Zhou, Q. Fei, A. Narayan, A. Haeberlen, B. Loo, and M. Sherr, "Secure Network Provenance," Proc. ACMSOSP, pp. 295-310, 2011.
-
(2011)
Proc. ACMSOSP
, pp. 295-310
-
-
Zhou, W.1
Fei, Q.2
Narayan, A.3
Haeberlen, A.4
Loo, B.5
Sherr, M.6
-
29
-
-
77958511723
-
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
-
A. Syalim, T. Nishide, and K. Sakurai, "Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance," Proc. Working Conf. Data and Applications Security and Privacy, pp. 311-318, 2010.
-
(2010)
Proc. Working Conf. Data and Applications Security and Privacy
, pp. 311-318
-
-
Syalim, A.1
Nishide, T.2
Sakurai, K.3
-
31
-
-
77954474711
-
Self-identifying sensor data
-
S. Chong, C. Skalka, and J.A. Vaughan, "Self-Identifying Sensor Data," Proc. Ninth ACM/IEEE Int'l Conf. Information Processing in Sensor Networks (IPSN), pp. 82-93, 2010.
-
(2010)
Proc. Ninth ACM/IEEE Int'l Conf. Information Processing in Sensor Networks (IPSN)
, pp. 82-93
-
-
Chong, S.1
Skalka, C.2
Vaughan, J.A.3
-
32
-
-
84897743314
-
Secure provenance transmission for streaming data
-
Aug.
-
S. Sultana, M. Shehab, and E. Bertino, "Secure Provenance Transmission for Streaming Data," IEEE Trans. Knowledge and Data Eng., vol. 25, no. 8, pp. 1890-1903, Aug. 2013.
-
(2013)
IEEE Trans. Knowledge and Data Eng.
, vol.25
, Issue.8
, pp. 1890-1903
-
-
Sultana, S.1
Shehab, M.2
Bertino, E.3
-
33
-
-
47249087303
-
Towards stateless single-packet IP traceback
-
R. Laufer, P. Velloso, D. Cunha, I. Moraes, M. Bicudo, M. Moreira, and O. Duarte, "Towards Stateless Single-Packet IP Traceback," Proc. 32nd IEEE Conf. LocalComputer Networks (LCN), pp. 548-555, 2007.
-
(2007)
Proc. 32nd IEEE Conf. LocalComputer Networks (LCN)
, pp. 548-555
-
-
Laufer, R.1
Velloso, P.2
Cunha, D.3
Moraes, I.4
Bicudo, M.5
Moreira, M.6
Duarte, O.7
-
34
-
-
70450235220
-
LIPSIN: Line speed publish/subscribe inter-networking
-
P. Jokela, A. Zahemszky, C. Esteve, S. Arianfar, and P. Nikander, "LIPSIN: Line Speed Publish/Subscribe Inter-Networking," Proc. ACM SIGCOMM Conf. Data Comm., pp. 195-206, 2009.
-
(2009)
Proc. ACM SIGCOMM Conf. Data Comm.
, pp. 195-206
-
-
Jokela, P.1
Zahemszky, A.2
Esteve, C.3
Arianfar, S.4
Nikander, P.5
|