While provenance research is common in distributed systems, many proposed solutions do not address the security of systems and accountability of data stored in those systems. In this paper, we survey provenance solutions which were proposed to address the problems of system security and data accountability in distributed systems. From our survey, we derive a set of minimum requirements that are necessary for a provenance system to be effective in addressing the two problems. Finally, we identify several gaps in the surveyed solutions and present them as challenges that future provenance researchers should tackle. We argue that these gaps have to be addressed before a complete and fool-proof provenance solution can be arrived at in the futur...
Abstract. Recent work has begun exploring the characterization and utilization of provenance in syst...
Given the ubiquity of data acquisition and processing in our everyday life,protecting data sovereign...
As cloud computing and virtualization technologies become mainstream, the need to be able to track d...
Modern organizations increasingly depend heavily on information stored and processed in distributed,...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Part 3: System SecurityInternational audienceThe advantage of collecting data provenance information...
Data (or information) provenance has many important applications. However, prior work on data proven...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
There is underlying need to support data provenance in a service-based computing environment such as...
Abstract. We examine provenance in the context of a distributed job execution system. It is crucial ...
One of the research fields at the Institute for Simulation and Software Technology at the German Aer...
This paper distils three decades of provenance research, and we propose a layered framework, the Ful...
Abstract. Recent work has begun exploring the characterization and utilization of provenance in syst...
Given the ubiquity of data acquisition and processing in our everyday life,protecting data sovereign...
As cloud computing and virtualization technologies become mainstream, the need to be able to track d...
Modern organizations increasingly depend heavily on information stored and processed in distributed,...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Part 3: System SecurityInternational audienceThe advantage of collecting data provenance information...
Data (or information) provenance has many important applications. However, prior work on data proven...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Operators of distributed systems often find themselves needing to answer forensic questions, to perf...
There is underlying need to support data provenance in a service-based computing environment such as...
Abstract. We examine provenance in the context of a distributed job execution system. It is crucial ...
One of the research fields at the Institute for Simulation and Software Technology at the German Aer...
This paper distils three decades of provenance research, and we propose a layered framework, the Ful...
Abstract. Recent work has begun exploring the characterization and utilization of provenance in syst...
Given the ubiquity of data acquisition and processing in our everyday life,protecting data sovereign...
As cloud computing and virtualization technologies become mainstream, the need to be able to track d...