Securing Data Provenance in the Cloud
暂无分享,去创建一个
[1] Sanjeev Khanna,et al. On provenance and privacy , 2010, ICDT '11.
[2] Susan B. Davidson,et al. Privacy issues in scientific workflow provenance , 2010, Wands '10.
[3] Margo I. Seltzer,et al. Securing Provenance , 2008, HotSec.
[4] Marianne Winslett,et al. Preventing history forgery with secure provenance , 2009, TOS.
[5] Naranker Dulay,et al. Shared and Searchable Encrypted Data for Untrusted Servers , 2008, DBSec.
[6] Marianne Winslett,et al. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.
[7] Luc Moreau,et al. Securing Provenance-Based Audits , 2010, IPAW.
[8] Xiaozhou Li,et al. Efficient querying and maintenance of network provenance at internet-scale , 2010, SIGMOD Conference.
[9] Martín Abadi,et al. Unified Declarative Platform for Secure Netwoked Information Systems , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[10] Niels Provos,et al. Proceedings of the 3rd conference on Hot topics in security , 2008 .
[11] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Yogesh L. Simmhan,et al. The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..
[13] Paul T. Groth,et al. Security Issues in a SOA-Based Provenance System , 2006, IPAW.
[14] Heon Young Yeom,et al. Provenance security guarantee from origin up to now in the e-Science environment , 2011, J. Syst. Archit..
[15] Margo I. Seltzer,et al. Provenance for the Cloud , 2010, FAST.
[16] V. Vianu,et al. Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .
[17] Xiaohui Liang,et al. Secure provenance: the essential of bread and butter of data forensics in cloud computing , 2010, ASIACCS '10.
[18] Margo I. Seltzer,et al. Provenance as first class cloud data , 2010, OPSR.
[19] Naranker Dulay,et al. Shared and Searchable Encrypted Data for Untrusted Servers , 2008 .
[20] Sanjeev Khanna,et al. Data Provenance: Some Basic Issues , 2000, FSTTCS.
[21] Luc Moreau,et al. The Open Provenance Model: An Overview , 2008, IPAW.
[22] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[23] Sudha Ram,et al. Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling , 2006, Active Conceptual Modeling of Learning.