OceanStore: an architecture for global-scale persistent storage
ACM SIGPLAN Notices
Journal of the American Society for Information Science and Technology - Special issue on the still the frontier: Information Science at the Millenium
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Chimera: AVirtual Data System for Representing, Querying, and Automating Data Derivation
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Earth System Science Workbench: A Data Management Infrastructure for Earth Science Products
SSDBM '01 Proceedings of the 13th International Conference on Scientific and Statistical Database Management
Information Lifecycle Management: The EMC Perspective
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
SSDBM '04 Proceedings of the 16th International Conference on Scientific and Statistical Database Management
A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
A survey of data provenance in e-science
ACM SIGMOD Record
Toward a threat model for storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Provenance management in curated databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
A statistical analysis of disclosed storage security breaches
Proceedings of the second ACM workshop on Storage security and survivability
Secure untrusted data repository (SUNDR)
OSDI'04 Proceedings of the 6th conference on Symposium on Opearting Systems Design & Implementation - Volume 6
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Automatic generation of workflow provenance
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Towards low overhead provenance tracking in near real-time stream filtering
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Combining provenance with trust in social networks for semantic web content filtering
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
A provenance model for manually curated data
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Issues in automatic provenance collection
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
A Model for Sharing of Confidential Provenance Information in a Query Based System
Provenance and Annotation of Data and Processes
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Scalable access controls for lineage
TAPP'09 First workshop on on Theory and practice of provenance
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
Exploring many task computing in scientific workflows
Proceedings of the 2nd Workshop on Many-Task Computing on Grids and Supercomputers
A characterization of the problem of secure provenancemanagement
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Secure provenance: the essential of bread and butter of data forensics in cloud computing
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Reliable evidence: auditability by typing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Privacy issues in scientific workflow provenance
Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science
Trusted computing and provenance: better together
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Towards a secure and efficient system for end-to-end provenance
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
Proceedings of the 14th International Conference on Database Theory
A language for provenance access control
Proceedings of the first ACM conference on Data and application security and privacy
Provenance security guarantee from origin up to now in the e-Science environment
Journal of Systems Architecture: the EUROMICRO Journal
Provenance views for module privacy
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Surrogate parenthood: protected and informative graphs
Proceedings of the VLDB Endowment
Provenance as a security control
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Dependency path patterns as the foundation of access control in provenance-aware systems
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
Engineering access control policies for provenance-aware systems
Proceedings of the third ACM conference on Data and application security and privacy
Supporting secure provenance update by keeping "provenance" of the provenance
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Performance evaluation of parallel strategies in public clouds: A study with phylogenomic workflows
Future Generation Computer Systems
Interaction provenance model for unified authentication factors in service oriented computing
Proceedings of the 4th ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Data provenance summarizes the history of the ownership of the item, as well as the actions performed on it. While widely used in archives, art, and archeology, provenance is also very important in forensics, scientific computing, and legal proceedings involving data. Significant research has been conducted in this area, yet the security and privacy issues of provenance have not been explored. In this position paper, we define the secure provenance problem and argue that it is of vital importance in numerous applications. We then discuss a select few of the issues related to ensuring the privacy and integrity of provenance information.