메뉴 건너뛰기




Volumn , Issue , 2009, Pages 1-14

The case of the fake Picasso: Preventing history forgery with secure provenance

Author keywords

[No Author keywords available]

Indexed keywords

REGULATORY COMPLIANCE;

EID: 85062006160     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (179)

References (60)
  • 1
    • 85077302720 scopus 로고    scopus 로고
    • Online at accessed on December 22, 2008
    • Monotone Distributed Version Control. Online at http://www.monotone.ca/, accessed on December 22, 2008.
    • Monotone Distributed Version Control
  • 4
    • 33750073829 scopus 로고    scopus 로고
    • Automatic generation of workflow provenance
    • R. S. Barga and L. A. Digiampietri. Automatic generation of workflow provenance. In Moreau and Foster [36], pages 1–9.
    • Moreau and Foster , pp. 1-9
    • Barga, R.S.1    Digiampietri, L.A.2
  • 5
    • 0000576322 scopus 로고
    • CVS II: Parallelizing software development
    • USENIX Assoc
    • B. Berliner. CVS II: parallelizing software development. In Proc. of the Winter 1990 USENIX Conference, pages 341–352. USENIX Assoc., 1990.
    • (1990) Proc. of the Winter 1990 USENIX Conference , pp. 341-352
    • Berliner, B.1
  • 6
    • 0003651338 scopus 로고
    • Coin flipping by telephone
    • M. Blum. Coin flipping by telephone. In Proc. of Crypto, pages 11–15, 1981.
    • (1981) Proc. Of Crypto , pp. 11-15
    • Blum, M.1
  • 15
    • 2942710667 scopus 로고    scopus 로고
    • The subversion project: Buiding a better CVS
    • B. Collins-Sussman. The subversion project: Buiding a better CVS. Linux J., 2002(94):3, 2002.
    • (2002) Linux J , vol.2002 , Issue.94 , pp. 3
    • Collins-Sussman, B.1
  • 21
    • 33750077260 scopus 로고    scopus 로고
    • Combining provenance with trust in social networks for semantic web content filtering
    • 36
    • J. Golbeck. Combining provenance with trust in social networks for semantic web content filtering. In Moreau and Foster [36], pages 101–108.
    • Moreau and Foster , pp. 101-108
    • Golbeck, J.1
  • 27
    • 33750913340 scopus 로고    scopus 로고
    • A practical revocation scheme for broadcast encryption using smartcards
    • N. Kogan, Y. Shavitt, and A. Wool. A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inf. Syst. Secur., 9(3):325–351, 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.3 , pp. 325-351
    • Kogan, N.1    Shavitt, Y.2    Wool, A.3
  • 30
    • 73849136095 scopus 로고    scopus 로고
    • Collaborating with GIT
    • June
    • J. Loeliger. Collaborating with Git. Linux Magazine, June 2006.
    • (2006) Linux Magazine
    • Loeliger, J.1
  • 31
    • 0035124553 scopus 로고    scopus 로고
    • When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
    • C. A. Lynch. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web. Journal of the American Society for Information Science and Technology, 52(1):12–17, 2001.
    • (2001) Journal of the American Society for Information Science and Technology , vol.52 , Issue.1 , pp. 12-17
    • Lynch, C.A.1
  • 32
    • 85084161556 scopus 로고    scopus 로고
    • Secure history preservation through timeline entanglement
    • Berkeley, CA, USA, USENIX Assoc
    • P. Maniatis and M. Baker. Secure history preservation through timeline entanglement. In Proc. of the 11th USENIX Security Symposium, pages 297–312, Berkeley, CA, USA, 2002. USENIX Assoc.
    • (2002) Proc. of the 11th USENIX Security Symposium , pp. 297-312
    • Maniatis, P.1    Baker, M.2
  • 33
    • 33845524696 scopus 로고    scopus 로고
    • Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems
    • G. Mella, E. Ferrari, E. Bertino, and Y. Koglin. Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. ACM Trans. Inf. Syst. Secur., 9(4):421–460, 2006.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.4 , pp. 421-460
    • Mella, G.1    Ferrari, E.2    Bertino, E.3    Koglin, Y.4
  • 40
    • 51849086986 scopus 로고    scopus 로고
    • National Assoc. of Insurance Commissioners. Graham-Leach-Bliley Act, 1999. www.naic.org/GLBA.
    • (1999) Graham-Leach-Bliley Act
  • 43
    • 0025436383 scopus 로고
    • Skip lists: A probabilistic alternative to balanced trees
    • W. Pugh. Skip lists: a probabilistic alternative to balanced trees. Communications of the ACM, 33(6):668–676, 1990.
    • (1990) Communications of the ACM , vol.33 , Issue.6 , pp. 668-676
    • Pugh, W.1
  • 46
    • 71949091308 scopus 로고    scopus 로고
    • Online at January
    • C. Sar and P. Cao. Lineage file system. Online at http://crypto.stanford.edu/ cao/lineage.html, January 2005.
    • (2005) Lineage File System
    • Sar, C.1    Cao, P.2
  • 47
    • 85021950441 scopus 로고    scopus 로고
    • Secure audit logs to support computer forensics
    • B. Schneier and J. Kelsey. Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur., 2(2):159–176, 1999.
    • (1999) ACM Trans. Inf. Syst. Secur. , vol.2 , Issue.2 , pp. 159-176
    • Schneier, B.1    Kelsey, J.2
  • 49
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22(11):612–613, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 50
    • 31444456909 scopus 로고    scopus 로고
    • A survey of data provenance in e-science
    • September
    • Y. L. Simmhan, B. Plale, and D. Gannon. A survey of data provenance in e-science. SIGMOD Rec., 34(3):31–36, September 2005.
    • (2005) SIGMOD Rec , vol.34 , Issue.3 , pp. 31-36
    • Simmhan, Y.L.1    Plale, B.2    Gannon, D.3
  • 57
    • 33750047467 scopus 로고    scopus 로고
    • Towards low overhead provenance tracking in near real-time stream filtering
    • 36
    • N. N. Vijayakumar and B. Plale. Towards low overhead provenance tracking in near real-time stream filtering. In Moreau and Foster [36], pages 46–54.
    • Moreau and Foster , pp. 46-54
    • Vijayakumar, N.N.1    Plale, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.