Sciweavers

258 search results - page 3 / 52
» Securing Provenance
Sort
View
SDMW
2009
Springer
14 years 2 months ago
An Access Control Language for a General Provenance Model
Provenance access control has been recognized as one of the most important components in an enterprise-level provenance system. However, it has only received little attention in th...
Qun Ni, Shouhuai Xu, Elisa Bertino, Ravi S. Sandhu...
CCS
2010
ACM
14 years 2 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
SDMW
2009
Springer
14 years 2 months ago
Do You Know Where Your Data's Been? - Tamper-Evident Database Provenance
Abstract. Database provenance chronicles the history of updates and modifications to data, and has received much attention due to its central role in scientific data management. ...
Jing Zhang, Adriane Chapman, Kristen LeFevre
SIGMOD
2010
ACM
167views Database» more  SIGMOD 2010»
13 years 8 months ago
Efficient querying and maintenance of network provenance at internet-scale
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...
POST
2012
218views more  POST 2012»
12 years 3 months ago
A Core Calculus for Provenance
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer sys...
Umut A. Acar, Amal Ahmed, James Cheney, Roly Perer...