Security Principles for Public-Resource Modeling Research
WETICE '04 Proceedings of the 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises
The Trustworthy Computing Security Development Lifecycle
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Lineage retrieval for scientific data processing: a survey
ACM Computing Surveys (CSUR)
A survey of data provenance in e-science
ACM SIGMOD Record
Trusted Computing for Disk Drives and Other Peripherals
IEEE Security and Privacy
Design and implementation of a TCG-based integrity measurement architecture
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
A technical architecture for enforcing usage control requirements in service-oriented architectures
Proceedings of the 2007 ACM workshop on Secure web services
The provenance of electronic data
Communications of the ACM - The psychology of security: why do good users make bad decisions?
Special Issue: The First Provenance Challenge
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Tracking provenance in a virtual data grid
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Trusted Logging for Grid Computing
APTC '08 Proceedings of the 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference
A High Efficiency Protocol for Reporting Integrity Measurements
ISDA '08 Proceedings of the 2008 Eighth International Conference on Intelligent Systems Design and Applications - Volume 02
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Integrity Management Infrastructure for Trusted Computing
IEICE - Transactions on Information and Systems
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
First workshop on on Theory and practice of provenance
TAPP'09 First workshop on on Theory and practice of provenance
Making a cloud provenance-aware
TAPP'09 First workshop on on Theory and practice of provenance
Transparently gathering provenance with provenance aware condor
TAPP'09 First workshop on on Theory and practice of provenance
Provenance in Databases: Why, How, and Where
Foundations and Trends in Databases
The Eucalyptus Open-Source Cloud-Computing System
CCGRID '09 Proceedings of the 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid
Recording Process Documentation for Provenance
IEEE Transactions on Parallel and Distributed Systems
Proceedings of the 6th VLDB Workshop on Secure Data Management
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
On the Feasibility of Remote Attestation for Web Services
CSE '09 Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03
Towards trusted cloud computing
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
PrIMe: A methodology for developing provenance-aware applications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Enhancing grid security using trusted virtualization
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Privacy issues in scientific workflow provenance
Proceedings of the 1st International Workshop on Workflow Approaches to New Data-centric Science
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Proceedings of the 14th International Conference on Database Theory
Non-interactive editable signatures for assured data provenance
Proceedings of the first ACM conference on Data and application security and privacy
Provenance views for module privacy
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
RepCloud: achieving fine-grained cloud TCB attestation with reputation systems
Proceedings of the sixth ACM workshop on Scalable trusted computing
Provenance as a security control
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Provenance-Based model for verifying trust-properties
TRUST'12 Proceedings of the 5th international conference on Trust and Trustworthy Computing
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
A core calculus for provenance
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
It is widely realised that provenance systems can benefit from greater awareness of security principles and the use of security technology. In this paper, we argue that Trusted Computing, a hardware-based method for establishing platform integrity, is not only useful, but immediately applicable. We demonstrate how existing Trusted Computing mechanisms can be used for provenance, and identify the remarkable similarity and overlap between the two research areas. This is accomplished through presenting architectural ideas for a trusted provenance system, and by comparing the respective requirements and capabilities of trusted systems and provenance systems.