Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Secure provenance: the essential of bread and butter of data forensics in cloud computing
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
FAST'10 Proceedings of the 8th USENIX conference on File and storage technologies
Trusted computing and provenance: better together
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks
ICDCSW '11 Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops
A Formal Framework for Provenance Security
CSF '11 Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium
Towards a mechanism for discretionary overriding of access control
SP'04 Proceedings of the 12th international conference on Security Protocols
A core calculus for provenance
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
Much has been written about security and provenance. Although both have their own large areas of concern, there is a very significant intersection. One is often brought to bear upon the other, in the study of the security of provenance. We discuss through a series of examples how provenance might be regarded as a security control in its own right. We argue that a risk-based approach to provenance is appropriate, and is already being used informally. A case study illustrates the applicability of this line of reasoning.