Lightweight Intuitive Provenance (LiP) in a distributed computing environment
暂无分享,去创建一个
[1] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[2] Xiaohua Jia,et al. TSAS: Third-Party Storage Auditing Service , 2014 .
[3] Yan Zhang,et al. Classified scheduling algorithm of big data under cloud computing , 2017 .
[4] C. SIAMJ.. LOW REDUNDANCY IN STATIC DICTIONARIES WITH CONSTANT QUERY TIME , 2001 .
[5] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[6] Paul T. Groth,et al. PReServ: Provenance Recording for Services , 2005 .
[7] Brajendra Panda,et al. Provenance Tracking with Bit Vectors , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[8] Robert Stevens,et al. Knowledge Discovery for Biology with Taverna , 2006 .
[9] Carole A. Goble,et al. Data Lineage Model for Taverna Workflows with Lightweight Annotation Requirements , 2008, IPAW.
[10] Jing Zhang,et al. Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance , 2009, Secure Data Management.
[11] Fouzia Benchikha,et al. Integrating Ontological Data Sources Using Viewpoints-Based Approach , 2016, J. Comput. Inf. Technol..
[12] Elisa Bertino,et al. Demonstrating a lightweight data provenance for sensor networks , 2012, CCS '12.
[13] Yang Yang,et al. Efficient resource management techniques in cloud computing environment: a review and discussion , 2018 .
[14] Yuqing Zhang,et al. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2013, IEEE Transactions on Parallel and Distributed Systems.
[15] Margo I. Seltzer,et al. Issues in Automatic Provenance Collection , 2006, IPAW.
[16] Jia Zhu,et al. Research on data mining of electric power system based on Hadoop cloud computing platform , 2017 .
[17] Elisa Bertino,et al. Sensor Network Provenance Compression Using Dynamic Bayesian Networks , 2017, ACM Trans. Sens. Networks.
[18] Willem Jonker,et al. Secure Data Management, 7th VLDB Workshop, SDM 2010, Singapore, September 17, 2010. Proceedings , 2010, Secure Data Management.
[19] Wei Wu,et al. A practical device authentication scheme using SRAM PUFs , 2012, Journal of Cryptographic Engineering.
[20] Chen Chen,et al. Distributed Provenance Compression , 2017, SIGMOD Conference.
[21] Margo I. Seltzer,et al. Provenance for the Cloud , 2010, FAST.
[22] Elisa Bertino,et al. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks , 2015, IEEE Transactions on Dependable and Secure Computing.
[23] James Cheney,et al. Provenance management in curated databases , 2006, SIGMOD Conference.
[24] Jemal H. Abawajy,et al. Information Provenance for Open Distributed Collaborative System , 2009, 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks.
[25] Ian H. Witten,et al. Modeling for text compression , 1989, CSUR.
[26] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[27] Yixin Chen,et al. A comparison of a graph database and a relational database: a data provenance perspective , 2010, ACM SE '10.
[28] Kan Liu,et al. Improving reliability of cloud computing services for next generation mobile communication networks , 2018 .
[29] Jemal H. Abawajy,et al. A framework for scalable distributed provenance storage system , 2013, Comput. Stand. Interfaces.
[30] Kevin R. B. Butler,et al. Poster : Secure Provenance for Cloud Storage , 2011 .
[31] Sherif Sakr. An Experimental Investigation of XML Compression Tools , 2008, ArXiv.
[32] John E. Davis,et al. Sloan Digital Sky Survey: Early Data Release , 2002 .
[33] Hai Jin,et al. VRAS: A Lightweight Local Resource Allocation System for Virtual Machine Monitor , 2013, Wirel. Pers. Commun..
[34] Erez Zadok,et al. Story Book: An Efficient Extensible Provenance Framework , 2009, Workshop on the Theory and Practice of Provenance.
[35] Hai Jin,et al. VNIX: Managing Virtual Machines on Clusters , 2008, 2008 Japan-China Joint Workshop on Frontier of Computer Science and Technology.
[36] Heon Young Yeom,et al. Provenance security guarantee from origin up to now in the e-Science environment , 2011, J. Syst. Archit..
[37] Roberto Grossi,et al. High-order entropy-compressed text indexes , 2003, SODA '03.
[38] Elisa Bertino,et al. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.
[39] Roger S. Barga,et al. Automatic capture and efficient storage of e‐Science experiment provenance , 2008, Concurr. Comput. Pract. Exp..
[40] Jeffrey Scott Vitter,et al. Learning in parallel , 1988, COLT '88.
[41] Noga Alon,et al. Scalable Secure Storage when Half the System Is Faulty , 2000, ICALP.
[42] Juliana Freire,et al. Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.
[43] Fengqiong Zhang,et al. Research on reliability analysis of computer network based on intelligent cloud computing method , 2017 .
[44] Dr Tirumala Rao,et al. Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud , 2017 .
[45] Jennifer Widom,et al. Trio: A System for Integrated Management of Data, Accuracy, and Lineage , 2004, CIDR.
[46] Mladen A. Vouk,et al. Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.
[47] Goetz Graefe,et al. Data compression and database performance , 1991, [Proceedings] 1991 Symposium on Applied Computing.
[48] Marianne Winslett,et al. Introducing secure provenance: problems and challenges , 2007, StorageSS '07.
[49] Yogesh L. Simmhan,et al. Query capabilities of the Karma provenance framework , 2008, Concurr. Comput. Pract. Exp..
[50] Margo I. Seltzer,et al. BURRITO: Wrapping Your Lab Notebook in Computational Infrastructure , 2012, TaPP.
[51] Adriane Chapman,et al. Efficient provenance storage , 2008, SIGMOD Conference.
[52] Ya-Ching Lee,et al. Adoption Intention of Cloud Computing at the Firm Level , 2019, J. Comput. Inf. Syst..
[53] Andy Hopper,et al. OPUS: A Lightweight System for Observational Provenance in User Space , 2013, TaPP.