201 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.In this dissertation, we explore techniques for providing integrity assurances for the history of data in an untrusted environment. We show that it is possible to provide strong integrity assurances for data history, without incurring high performance overheads, or using costly trusted hardware. We first focus on file systems and data provenance, and develop provably-secure schemes for securing file provenance information. With empirical evaluation using realistic file system workloads, we show that our scheme has low overhead, and can be deployed with minimal changes to existing applications. Next, we investigate history integrity in database systems. We develop an effi...
275 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This dissertation shows that ...
With the increased need of data sharing among multiple organizations, such as government organizatio...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
201 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.In this dissertation, we expl...
Abstract. Database provenance chronicles the history of updates and modifica-tions to data, and has ...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
As increasing amounts of valuable information are pro-duced and persist digitally, the ability to de...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
Data provenance (keeping track of who did what, where, when and how) boasts of various attractive us...
Data provenance (keeping track of who did what, where, when and how) boasts of various attractive us...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Data (or information) provenance has many important applications. However, prior work on data proven...
Data (or information) provenance has many important applications. However, prior work on data proven...
275 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This dissertation shows that ...
Given the significant increase of on-line services that require personal information from users, the...
275 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This dissertation shows that ...
With the increased need of data sharing among multiple organizations, such as government organizatio...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
201 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2009.In this dissertation, we expl...
Abstract. Database provenance chronicles the history of updates and modifica-tions to data, and has ...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
As increasing amounts of valuable information are pro-duced and persist digitally, the ability to de...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
Data provenance (keeping track of who did what, where, when and how) boasts of various attractive us...
Data provenance (keeping track of who did what, where, when and how) boasts of various attractive us...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Data (or information) provenance has many important applications. However, prior work on data proven...
Data (or information) provenance has many important applications. However, prior work on data proven...
275 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This dissertation shows that ...
Given the significant increase of on-line services that require personal information from users, the...
275 p.Thesis (Ph.D.)--University of Illinois at Urbana-Champaign, 2008.This dissertation shows that ...
With the increased need of data sharing among multiple organizations, such as government organizatio...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...