Part 3: System SecurityInternational audienceThe advantage of collecting data provenance information has driven research on how to extend or modify applications and systems in order to provide it, or the creation of architectures that are built from the ground up with provenance capabilities. In this paper we propose a universal data provenance framework, using dynamic instrumentation, which gathers data provenance information for real-world applications without any code modifications. Our framework simplifies the task of finding the right points to instrument, which can be cumbersome in large and complex systems. We have built a proof-of-concept implementation of the framework on top of DTrace. Moreover, we evaluated its functionality by u...
Data provenance (keeping track of who did what, where, when and how) boasts of various attractive us...
Digital provenance is metadata that describes the ancestry or history of a digital object. Provenanc...
There is underlying need to support data provenance in a service-based computing environment such as...
Part 3: System SecurityInternational audienceThe advantage of collecting data provenance information...
Knowing the provenance of a data item helps in ascertaining its trustworthiness. Various approaches ...
While provenance research is common in distributed systems, many proposed solutions do not address t...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
This paper distils three decades of provenance research, and we propose a layered framework, the Ful...
As wireless networking becomes more robust and sensor technology, cameras, and low-power compute dev...
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. H...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Scientists can facilitate data intensive applications to study and understand the behavior of a comp...
Large-scale, dynamic and open environments such as the Grid and Web Services build upon existing com...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Data provenance (keeping track of who did what, where, when and how) boasts of various attractive us...
Digital provenance is metadata that describes the ancestry or history of a digital object. Provenanc...
There is underlying need to support data provenance in a service-based computing environment such as...
Part 3: System SecurityInternational audienceThe advantage of collecting data provenance information...
Knowing the provenance of a data item helps in ascertaining its trustworthiness. Various approaches ...
While provenance research is common in distributed systems, many proposed solutions do not address t...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
This paper distils three decades of provenance research, and we propose a layered framework, the Ful...
As wireless networking becomes more robust and sensor technology, cameras, and low-power compute dev...
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. H...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Scientists can facilitate data intensive applications to study and understand the behavior of a comp...
Large-scale, dynamic and open environments such as the Grid and Web Services build upon existing com...
AbstractSecuring provenance data in distributed environment is a challenge and with the rapid increa...
Data provenance (keeping track of who did what, where, when and how) boasts of various attractive us...
Digital provenance is metadata that describes the ancestry or history of a digital object. Provenanc...
There is underlying need to support data provenance in a service-based computing environment such as...