Data provenance refers to the history of creation and manipulation of a data object and is being widely used in various application domains including scientific experiments, grid computing, file and storage system, streaming data etc. However, existing provenance systems operate at a single layer of abstraction (workflow/process/OS) at which they record and store provenance whereas the provenance captured from different layers provide the highest benefit when integrated through a unified provenance framework. To build such a framework, a comprehensive provenance model able to represent the provenance of data objects with various semantics and granularity is the first step. In this thesis, we propose a such a comprehensive provenance model a...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
While provenance research is common in distributed systems, many proposed solutions do not address t...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
A malicious foe may introduce additional nodes within the network or compromise existing ones. There...
Digital provenance is metadata that describes the ancestry or history of a digital object. Provenanc...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
Data provenance represents an important consider evaluating the standing of sensor data. Large-scale...
In recent years, network accountability and forensic analysis have become increasingly important, as...
In recent years, network accountability and forensic analysis have become increasingly important, as...
As wireless networking becomes more robust and sensor technology, cameras, and low-power compute dev...
Most security models are designed to protect data. Some also deal with traditional metadata. Provena...
In recent years, network accountability and forensic analysis have become increasingly important, as...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
While provenance research is common in distributed systems, many proposed solutions do not address t...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Data provenance refers to the history of creation and manipulation of a data object and is being wid...
Abstract-Large-scale sensor networks are being deployed in numerous application domains, and often t...
A malicious foe may introduce additional nodes within the network or compromise existing ones. There...
Digital provenance is metadata that describes the ancestry or history of a digital object. Provenanc...
Project (M.S., Computer Science)--California State University, Sacramento, 2013.Data Provenance refe...
Data provenance represents an important consider evaluating the standing of sensor data. Large-scale...
In recent years, network accountability and forensic analysis have become increasingly important, as...
In recent years, network accountability and forensic analysis have become increasingly important, as...
As wireless networking becomes more robust and sensor technology, cameras, and low-power compute dev...
Most security models are designed to protect data. Some also deal with traditional metadata. Provena...
In recent years, network accountability and forensic analysis have become increasingly important, as...
Abstract—Malicious software typically resides stealthily on a user’s computer and interacts with the...
Malicious packet dropping attack is a major security threat to the data traffic in the sensor networ...
While provenance research is common in distributed systems, many proposed solutions do not address t...