[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
Tactical provenance analysis for endpoint detection and response systems
Endpoint Detection and Response (EDR) tools provide visibility into sophisticated intrusions
by matching system events against known adversarial behaviors. However, current solutions …
by matching system events against known adversarial behaviors. However, current solutions …
A survey on provenance: What for? What form? What from?
Provenance refers to any information describing the production process of an end product,
which can be anything from a piece of digital data to a physical object. While this survey …
which can be anything from a piece of digital data to a physical object. While this survey …
Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions
Past studies show that middleboxes are a critical piece of network infrastructure for providing
security and performance guarantees. Unfortunately, the dynamic and traffic-dependent …
security and performance guarantees. Unfortunately, the dynamic and traffic-dependent …
TrustCloud: A framework for accountability and trust in cloud computing
The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by
potential customers. While preventive controls for security and privacy are actively …
potential customers. While preventive controls for security and privacy are actively …
Trustworthy {Whole-System} provenance for the linux kernel
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …
history of each object being processed on the system, allowing users to understand how …
SPADE: Support for provenance auditing in distributed environments
A Gehani, D Tariq - ACM/IFIP/USENIX International Conference on …, 2012 - Springer
SPADE is an open source software infrastructure for data provenance collection and
management. The underlying data model used throughout the system is graph-based …
management. The underlying data model used throughout the system is graph-based …
Scaling hardware accelerated network monitoring to concurrent and dynamic queries with {* Flow}
Measurement plays a key role in network operation and management. An important but
unaddressed practical requirement in high speed networks is supporting concurrent …
unaddressed practical requirement in high speed networks is supporting concurrent …
[HTML][HTML] Titian: Data provenance support in spark
Debugging data processing logic in Data-Intensive Scalable Computing (DISC) systems is a
difficult and time consuming effort. Today's DISC systems offer very little tooling for …
difficult and time consuming effort. Today's DISC systems offer very little tooling for …
Provenance for aggregate queries
We study in this paper provenance information for queries with aggregation. Provenance
information was studied in the context of various query languages that do not allow for …
information was studied in the context of various query languages that do not allow for …