The process group approach to reliable distributed computing
Communications of the ACM
Supporting Fine-grained Data Lineage in a Database Visualization Environment
ICDE '97 Proceedings of the Thirteenth International Conference on Data Engineering
Lineage tracing for general data warehouse transformations
The VLDB Journal — The International Journal on Very Large Data Bases
Cryptographic File Systems Performance: What You Don't Know Can Hurt You
SISW '03 Proceedings of the Second IEEE International Security in Storage Workshop
Lineage retrieval for scientific data processing: a survey
ACM Computing Surveys (CSUR)
A survey of data provenance in e-science
ACM SIGMOD Record
Tracefs: A File System to Trace Them All
FAST '04 Proceedings of the 3rd USENIX Conference on File and Storage Technologies
Provenance management in curated databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Trio: a system for data, uncertainty, and lineage
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Accurate and efficient replaying of file system traces
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Operating system profiling via latency analysis
OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
The provenance of electronic data
Communications of the ACM - The psychology of security: why do good users make bad decisions?
Automatic capture and efficient storage of e-Science experiment provenance
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
A nine year study of file system and storage benchmarking
ACM Transactions on Storage (TOS)
DARC: dynamic analysis of root causes of latency distributions
SIGMETRICS '08 Proceedings of the 2008 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Efficient lineage tracking for scientific workflows
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
Evaluating performance and energy in file system server workloads
FAST'10 Proceedings of the 8th USENIX conference on File and storage technologies
Proceedings of the 2006 international conference on Provenance and Annotation of Data
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Towards low overhead provenance tracking in near real-time stream filtering
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
A provenance model for manually curated data
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Issues in automatic provenance collection
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Provenance-based auditing of private data use
VoCS'08 Proceedings of the 2008 international conference on Visions of Computer Science: BCS International Academic Conference
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
Hi-index | 0.00 |
Work on the End-to-End Provenance System (EEPS) began in the late summer of 2009. The EEPS effort seeks to explore the three central questions in provenance systems: (1) "Where and how do I design secure host-level provenance collecting instruments (called provenance monitors)?"; (2) "How do I extend completeness and accuracy guarantees to distributed systems and computations?"; and (3) "What are the costs associated with provenance collection?" This position paper discusses our initial exploration into these issues and posits several challenges to the realization of the EEPS vision.