Sciweavers

7607 search results - page 19 / 1522
» Querying data provenance
Sort
View
CCS
2010
ACM
14 years 1 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
IPAW
2010
13 years 5 months ago
Data Provenance in Distributed Propagator Networks
Abstract. The heterogeneous and unreliable nature of distributed systems has created a distinct need for the inclusion of provenance within their design to allow for error correcti...
Ian Jacobi
FAST
2009
13 years 5 months ago
A Framework for Fine-grained Data Integration and Curation, with Provenance, in a Dataspace
Some tasks in a dataspace (a loose collection of heterogeneous data sources) require integration of fine-grained data from diverse sources. This work is often done by end users kn...
David W. Archer, Lois M. L. Delcambre, David Maier
BCS
2008
13 years 8 months ago
Provenance-Based Auditing of Private Data Use
Across the world, organizations are required to comply with regulatory frameworks dictating how to manage personal information. Despite these, several cases of data leaks and expo...
Rocío Aldeco-Pérez, Luc Moreau
CIKM
2010
Springer
13 years 6 months ago
Towards a provenance framework for sub-image processing for astronomical data
While there has been advances in observational equipment that generate huge high quality images, the processing of these images remains a major bottleneck. We show that provenance...
Johnson Mwebaze, John McFarland, Danny Booxhorn, E...