International audienceIdentifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to their root causes.Although existing provenance-based auditing techniques provide value in forensic analysis, they assume that such analysis takes place only retrospectively. Such post-hoc analysis is insufficient for realtime security applications; moreover, even for forensic tasks, prior provenance collection systems exhibited poor performance and scalability, jeopardizing the timeliness of query responses.We present CamQuery, which provides inline, realtime provenance analy...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Data provenance—a record of the origin and evolution of data in a system—is a useful tool for forens...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...
Provenance is defined as the origin or the earliest known history of a thing. In the aspect of dat...
Complex heterogeneous dynamic networks, such as knowledge graphs, are important constructions for si...
Data provenance describes how data came to be in its present form. It includes data sources and the ...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. H...
Advanced Persistent Threats (APT) are a class of security threats in which a well-resourced attacker...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Data provenance—a record of the origin and evolution of data in a system—is a useful tool for forens...
International audienceIdentifying the root cause and impact of a system intrusion remains a foundati...
Provenance is defined as the origin or the earliest known history of a thing. In the aspect of dat...
Complex heterogeneous dynamic networks, such as knowledge graphs, are important constructions for si...
Data provenance describes how data came to be in its present form. It includes data sources and the ...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. H...
Advanced Persistent Threats (APT) are a class of security threats in which a well-resourced attacker...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
Data provenance—a record of the origin and evolution of data in a system—is a useful tool for forens...