-
1
-
-
85077302720
-
-
Online at accessed on December 22, 2008
-
Monotone Distributed Version Control. Online at http://www.monotone.ca/, accessed on December 22, 2008.
-
Monotone Distributed Version Control
-
-
-
2
-
-
82655166471
-
A five-year study of file-system metadata
-
Berkeley, CA, USA, USENIX Assoc
-
N. Agrawal, W. J. Bolosky, J. R. Douceur, and J. R. Lorch. A five-year study of file-system metadata. In Proc. of the 5th USENIX conference on File and Storage Technologies (FAST), Berkeley, CA, USA, 2007. USENIX Assoc.
-
(2007)
Proc. of the 5th USENIX Conference on File and Storage Technologies (FAST)
-
-
Agrawal, N.1
Bolosky, W.J.2
Douceur, J.R.3
Lorch, J.R.4
-
5
-
-
0000576322
-
CVS II: Parallelizing software development
-
USENIX Assoc
-
B. Berliner. CVS II: parallelizing software development. In Proc. of the Winter 1990 USENIX Conference, pages 341–352. USENIX Assoc., 1990.
-
(1990)
Proc. of the Winter 1990 USENIX Conference
, pp. 341-352
-
-
Berliner, B.1
-
6
-
-
0003651338
-
Coin flipping by telephone
-
M. Blum. Coin flipping by telephone. In Proc. of Crypto, pages 11–15, 1981.
-
(1981)
Proc. Of Crypto
, pp. 11-15
-
-
Blum, M.1
-
7
-
-
33750071081
-
Issues in automatic provenance collection
-
36
-
U. Braun, S. L. Garfinkel, D. A. Holland, K.-K. Muniswamy-Reddy, and M. I. Seltzer. Issues in automatic provenance collection. In Moreau and Foster [36], pages 171–183.
-
Moreau and Foster
, pp. 171-183
-
-
Braun, U.1
Garfinkel, S.L.2
Holland, D.A.3
Muniswamy-Reddy, K.-K.4
Seltzer, M.I.5
-
9
-
-
33846076805
-
Provenance management in curated databases
-
New York, NY, USA, ACM Press
-
P. Buneman, A. Chapman, and J. Cheney. Provenance management in curated databases. In Proc. of the ACM International Conference on Management of Data (SIGMOD), pages 539–550, New York, NY, USA, 2006. ACM Press.
-
(2006)
Proc. of the ACM International Conference on Management of Data (SIGMOD)
, pp. 539-550
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
-
11
-
-
84947733945
-
Data provenance: Some basic issues
-
London, UK, Springer-Verlag
-
P. Buneman, S. Khanna, and W. C. Tan. Data provenance: Some basic issues. In Proc. of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science (FST TCS), pages 87–93, London, UK, 2000. Springer-Verlag.
-
(2000)
Proc. of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science (FST TCS)
, pp. 87-93
-
-
Buneman, P.1
Khanna, S.2
Tan, W.C.3
-
15
-
-
2942710667
-
The subversion project: Buiding a better CVS
-
B. Collins-Sussman. The subversion project: Buiding a better CVS. Linux J., 2002(94):3, 2002.
-
(2002)
Linux J
, vol.2002
, Issue.94
, pp. 3
-
-
Collins-Sussman, B.1
-
17
-
-
85077220466
-
Passive NFS tracing of email and research workloads
-
Berkeley, CA, USA, USENIX Assoc
-
D. Ellard, J. Ledlie, P. Malkani, and M. Seltzer. Passive NFS tracing of email and research workloads. In Proc. of the 2nd USENIX Conference on File and Storage Technologies (FAST), pages 203–216, Berkeley, CA, USA, 2003. USENIX Assoc.
-
(2003)
Proc. of the 2nd USENIX Conference on File and Storage Technologies (FAST)
, pp. 203-216
-
-
Ellard, D.1
Ledlie, J.2
Malkani, P.3
Seltzer, M.4
-
18
-
-
84948706138
-
Chimera: A virtual data system for representing, querying, and automating data derivation
-
Washington, DC, USA, IEEE Computer Society
-
I. T. Foster, J.-S. Vockler, M. Wilde, and Y. Zhao. Chimera: A virtual data system for representing, querying, and automating data derivation. In Proc. of the 14th International Conference on Scientific and Statistical Database Management (SSDBM), pages 37–46, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
Proc. of the 14th International Conference on Scientific and Statistical Database Management (SSDBM)
, pp. 37-46
-
-
Foster, I.T.1
Vockler, J.-S.2
Wilde, M.3
Zhao, Y.4
-
19
-
-
0013232092
-
Earth system science workbench: A data management infrastructure for earth science products
-
Washington, DC, USA, IEEE Computer Society
-
J. Frew and R. Bose. Earth system science workbench: A data management infrastructure for earth science products. In Proc. of the 13th International Conference on Scientific and Statistical Database Management (SSDBM), page 180, Washington, DC, USA, 2001. IEEE Computer Society.
-
(2001)
Proc. of the 13th International Conference on Scientific and Statistical Database Management (SSDBM)
, pp. 180
-
-
Frew, J.1
Bose, R.2
-
21
-
-
33750077260
-
Combining provenance with trust in social networks for semantic web content filtering
-
36
-
J. Golbeck. Combining provenance with trust in social networks for semantic web content filtering. In Moreau and Foster [36], pages 101–108.
-
Moreau and Foster
, pp. 101-108
-
-
Golbeck, J.1
-
25
-
-
62749161358
-
Introducing secure provenance: Problems and challenges
-
New York, NY, USA, ACM
-
R. Hasan, R. Sion, and M. Winslett. Introducing secure provenance: problems and challenges. In Proc. of the ACM workshop on Storage security and survivability (StorageSS), pages 13–18, New York, NY, USA, 2007. ACM.
-
(2007)
Proc. of the ACM Workshop on Storage Security and Survivability (StorageSS)
, pp. 13-18
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
27
-
-
33750913340
-
A practical revocation scheme for broadcast encryption using smartcards
-
N. Kogan, Y. Shavitt, and A. Wool. A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inf. Syst. Secur., 9(3):325–351, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.3
, pp. 325-351
-
-
Kogan, N.1
Shavitt, Y.2
Wool, A.3
-
28
-
-
84945511204
-
Measurement and analysis of large-scale network file system workloads
-
Berkeley, CA, USA, USENIX Assoc
-
A. W. Leung, S. Pasupathy, G. Goodson, and E. L. Miller. Measurement and analysis of large-scale network file system workloads. In Proc. of the USENIX Annual Technical Conference, pages 213–226, Berkeley, CA, USA, 2008. USENIX Assoc.
-
(2008)
Proc. of the USENIX Annual Technical Conference
, pp. 213-226
-
-
Leung, A.W.1
Pasupathy, S.2
Goodson, G.3
Miller, E.L.4
-
29
-
-
77952379905
-
Secure untrusted data repository (SUNDR)
-
J. Li, M. N. Krohn, D. Mazières, and D. Shasha. Secure untrusted data repository (SUNDR). In Proc. of the 6th Symposium on Operating Systems Design and Implementation (OSDI), pages 121–136, 2004.
-
(2004)
Proc. of the 6th Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 121-136
-
-
Li, J.1
Krohn, M.N.2
Mazières, D.3
Shasha, D.4
-
30
-
-
73849136095
-
Collaborating with GIT
-
June
-
J. Loeliger. Collaborating with Git. Linux Magazine, June 2006.
-
(2006)
Linux Magazine
-
-
Loeliger, J.1
-
31
-
-
0035124553
-
When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web
-
C. A. Lynch. When documents deceive: Trust and provenance as new factors for information retrieval in a tangled web. Journal of the American Society for Information Science and Technology, 52(1):12–17, 2001.
-
(2001)
Journal of the American Society for Information Science and Technology
, vol.52
, Issue.1
, pp. 12-17
-
-
Lynch, C.A.1
-
32
-
-
85084161556
-
Secure history preservation through timeline entanglement
-
Berkeley, CA, USA, USENIX Assoc
-
P. Maniatis and M. Baker. Secure history preservation through timeline entanglement. In Proc. of the 11th USENIX Security Symposium, pages 297–312, Berkeley, CA, USA, 2002. USENIX Assoc.
-
(2002)
Proc. of the 11th USENIX Security Symposium
, pp. 297-312
-
-
Maniatis, P.1
Baker, M.2
-
33
-
-
33845524696
-
Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems
-
G. Mella, E. Ferrari, E. Bertino, and Y. Koglin. Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems. ACM Trans. Inf. Syst. Secur., 9(4):421–460, 2006.
-
(2006)
ACM Trans. Inf. Syst. Secur.
, vol.9
, Issue.4
, pp. 421-460
-
-
Mella, G.1
Ferrari, E.2
Bertino, E.3
Koglin, Y.4
-
37
-
-
42149109673
-
The provenance of electronic data
-
L. Moreau, P. Groth, S. Miles, J. Vazquez-Salceda, J. Ibbotson, S. Jiang, S. Munroe, O. Rana, A. Schreiber, V. Tan, and L. Varga. The provenance of electronic data. Commun. ACM, 51(4):52–58, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.4
, pp. 52-58
-
-
Moreau, L.1
Groth, P.2
Miles, S.3
Vazquez-Salceda, J.4
Ibbotson, J.5
Jiang, S.6
Munroe, S.7
Rana, O.8
Schreiber, A.9
Tan, V.10
Varga, L.11
-
38
-
-
85076227002
-
Provenance-aware storage systems
-
K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. I. Seltzer. Provenance-aware storage systems. In Proc. of the USENIX Annual Technical Conference, pages 43–56, 2006.
-
(2006)
Proc. of the USENIX Annual Technical Conference
, pp. 43-56
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.A.2
Braun, U.3
Seltzer, M.I.4
-
39
-
-
10444244154
-
A collaborative informatics infrastructure for multi-scale science
-
Washington, DC, USA, IEEE Computer Society
-
J. D. Myers and et al. A collaborative informatics infrastructure for multi-scale science. In Proc. of the 2nd International Workshop on Challenges of Large Applications in Distributed Environments (CLADE), page 24, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
Proc. of the 2nd International Workshop on Challenges of Large Applications in Distributed Environments (CLADE)
, pp. 24
-
-
Myers, J.D.1
-
40
-
-
51849086986
-
-
National Assoc. of Insurance Commissioners. Graham-Leach-Bliley Act, 1999. www.naic.org/GLBA.
-
(1999)
Graham-Leach-Bliley Act
-
-
-
41
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
A. Perrig, R. Canetti, D. Tygar, and D. Song. Efficient authentication and signing of multicast streams over lossy channels. In Proc. of the IEEE Symposium on Security & Privacy, pages 56–73, May 2000.
-
(2000)
Proc. of the IEEE Symposium on Security & Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
42
-
-
85077267765
-
Design and implementation of verifiable audit trails for a versioning file system
-
Berkeley, CA, USA, USENIX Assoc
-
Z. N. J. Peterson, R. Burns, G. Ateniese, and S. Bono. Design and implementation of verifiable audit trails for a versioning file system. In Proc. of the 5th USENIX conference on File and Storage Technologies (FAST’07), pages 93–106, Berkeley, CA, USA, 2007. USENIX Assoc.
-
(2007)
Proc. of the 5th USENIX Conference on File and Storage Technologies (FAST’07)
, pp. 93-106
-
-
Peterson, Z.N.J.1
Burns, R.2
Ateniese, G.3
Bono, S.4
-
43
-
-
0025436383
-
Skip lists: A probabilistic alternative to balanced trees
-
W. Pugh. Skip lists: a probabilistic alternative to balanced trees. Communications of the ACM, 33(6):668–676, 1990.
-
(1990)
Communications of the ACM
, vol.33
, Issue.6
, pp. 668-676
-
-
Pugh, W.1
-
44
-
-
85084163129
-
A comparison of file system workloads
-
Berkeley, CA, USA, USENIX Assoc
-
D. Roselli, J. R. Lorch, and T. E. Anderson. A comparison of file system workloads. In Proc. of the USENIX Annual Technical Conference, Berkeley, CA, USA, 2000. USENIX Assoc.
-
(2000)
Proc. of the USENIX Annual Technical Conference
-
-
Roselli, D.1
Lorch, J.R.2
Anderson, T.E.3
-
46
-
-
71949091308
-
-
Online at January
-
C. Sar and P. Cao. Lineage file system. Online at http://crypto.stanford.edu/ cao/lineage.html, January 2005.
-
(2005)
Lineage File System
-
-
Sar, C.1
Cao, P.2
-
47
-
-
85021950441
-
Secure audit logs to support computer forensics
-
B. Schneier and J. Kelsey. Secure audit logs to support computer forensics. ACM Trans. Inf. Syst. Secur., 2(2):159–176, 1999.
-
(1999)
ACM Trans. Inf. Syst. Secur.
, vol.2
, Issue.2
, pp. 159-176
-
-
Schneier, B.1
Kelsey, J.2
-
48
-
-
85084163097
-
File system logging versus clustering: A performance comparison
-
Berkeley, CA, USA, USENIX Assoc
-
M. Seltzer, K. Smith, H. Balakrishnan, J. Chang, S. McMains, and V. Padmanabhan. File system logging versus clustering: a performance comparison. In Proc. of the USENIX 1995 Technical Conference, pages 249–264, Berkeley, CA, USA, 1995. USENIX Assoc.
-
(1995)
Proc. of the USENIX 1995 Technical Conference
, pp. 249-264
-
-
Seltzer, M.1
Smith, K.2
Balakrishnan, H.3
Chang, J.4
McMains, S.5
Padmanabhan, V.6
-
49
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22(11):612–613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
50
-
-
31444456909
-
A survey of data provenance in e-science
-
September
-
Y. L. Simmhan, B. Plale, and D. Gannon. A survey of data provenance in e-science. SIGMOD Rec., 34(3):31–36, September 2005.
-
(2005)
SIGMOD Rec
, vol.34
, Issue.3
, pp. 31-36
-
-
Simmhan, Y.L.1
Plale, B.2
Gannon, D.3
-
52
-
-
0242628854
-
Recording and reasoning over data provenance in web and grid services
-
Catania, Sicily, Italy, Nov
-
M. Szomszor and L. Moreau. Recording and reasoning over data provenance in web and grid services. In Proc. of the International Conference on Ontologies, Databases and Applications of SEmantics (ODBASE), volume 2888 of Lecture Notes in Computer Science, pages 603–620, Catania, Sicily, Italy, Nov. 2003.
-
(2003)
Proc. of the International Conference on Ontologies, Databases and Applications of SEmantics (ODBASE), Volume 2888 of Lecture Notes in Computer Science
, pp. 603-620
-
-
Szomszor, M.1
Moreau, L.2
-
53
-
-
33750087260
-
Security issues in a SOA-based provenance system
-
36
-
V. Tan, P. Groth, S. Miles, S. Jiang, S. Munroe, S. Tsasakou, and L. Moreau. Security issues in a SOA-based provenance system. In Moreau and Foster [36], pages 203–211.
-
Moreau and Foster
, pp. 203-211
-
-
Tan, V.1
Groth, P.2
Miles, S.3
Jiang, S.4
Munroe, S.5
Tsasakou, S.6
Moreau, L.7
-
57
-
-
33750047467
-
Towards low overhead provenance tracking in near real-time stream filtering
-
36
-
N. N. Vijayakumar and B. Plale. Towards low overhead provenance tracking in near real-time stream filtering. In Moreau and Foster [36], pages 46–54.
-
Moreau and Foster
, pp. 46-54
-
-
Vijayakumar, N.N.1
Plale, B.2
-
58
-
-
21644436375
-
PACLS: An access control list approach to anti-viral security
-
D. Wichers, D. Cook, R. Olsson, J. Crossley, P. Kerchen, K. Levitt, and R. Lo. PACLs: An access control list approach to anti-viral security. In Proc. of the 13th National Computer Security Conference, pages 340–349, 1990.
-
(1990)
Proc. of the 13th National Computer Security Conference
, pp. 340-349
-
-
Wichers, D.1
Cook, D.2
Olsson, R.3
Crossley, J.4
Kerchen, P.5
Levitt, K.6
Lo, R.7
-
60
-
-
35048829740
-
Semantically linking and browsing provenance logs for e-science
-
J. Zhao, C. A. Goble, R. Stevens, and S. Bechhofer. Semantically linking and browsing provenance logs for E-science. In Proc. of the 1st International IFIP Conference on Semantics of a Networked World (ICSNW), pages 158–176, 2004.
-
(2004)
Proc. of the 1st International IFIP Conference on Semantics of A Networked World (ICSNW)
, pp. 158-176
-
-
Zhao, J.1
Goble, C.A.2
Stevens, R.3
Bechhofer, S.4
|