Secure audit logs to support computer forensics
ACM Transactions on Information and System Security (TISSEC)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Chimera: AVirtual Data System for Representing, Querying, and Automating Data Derivation
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
Authentic Third-party Data Publication
Proceedings of the IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security: Data and Application Security, Development and Directions
Applying Chimera virtual data concepts to cluster finding in the Sloan Sky Survey
Proceedings of the 2002 ACM/IEEE conference on Supercomputing
Flexible authentication of XML documents
Journal of Computer Security - Special issue on ACM conference on computer and communications security, 2001
Verifying completeness of relational query results in data publishing
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Dynamic authenticated index structures for outsourced databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Provenance management in curated databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
VisTrails: visualization meets data management
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Taverna: lessons in creating a workflow environment for the life sciences: Research Articles
Concurrency and Computation: Practice & Experience - Workflow in Grid Systems
ULDBs: databases with uncertainty and lineage
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
Tamper detection in audit logs
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Auditing compliance with a Hippocratic database
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
An annotation management system for relational databases
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Recording and using provenance in a protein compressibility experiment
HPDC '05 Proceedings of the High Performance Distributed Computing, 2005. HPDC-14. Proceedings. 14th IEEE International Symposium
Automatic capture and reconstruction of computational provenance
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Scientific Workflow Provenance Querying with Security Views
WAIM '08 Proceedings of the 2008 The Ninth International Conference on Web-Age Information Management
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Scalable access controls for lineage
TAPP'09 First workshop on on Theory and practice of provenance
TAPIDO: trust and authorization via provenance and integrity in distributed objects
ESOP'08/ETAPS'08 Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems
On the expressiveness of implicit provenance in query and update languages
ICDT'07 Proceedings of the 11th international conference on Database Theory
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Implementing a secure annotation service
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Trustworthy information: concepts and mechanisms
WAIM'10 Proceedings of the 11th international conference on Web-age information management
Non-interactive editable signatures for assured data provenance
Proceedings of the first ACM conference on Data and application security and privacy
Provenance security guarantee from origin up to now in the e-Science environment
Journal of Systems Architecture: the EUROMICRO Journal
Surrogate parenthood: protected and informative graphs
Proceedings of the VLDB Endowment
Provenance as a security control
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Context provenance to enhance the dependability of ambient intelligence systems
Personal and Ubiquitous Computing
A core calculus for provenance
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
Database provenance chronicles the history of updates and modifications to data, and has received much attention due to its central role in scientific data management. However, the use of provenance information still requires a leap of faith. Without additional protections, provenance records are vulnerable to accidental corruption, and even malicious forgery, a problem that is most pronounced in the loosely-coupled multi-user environments often found in scientific research. This paper investigates the problem of providing integrity and tamper-detection for database provenance. We propose a checksum-based approach, which is well-suited to the unique characteristics of database provenance, including non-linear provenance objects and provenance associated with multiple fine granularities of data. We demonstrate that the proposed solution satisfies a set of desirable security properties, and that the additional time and space overhead incurred by the checksum approach is manageable, making the solution feasible in practice.