Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
The foundations for provenance on the web
L Moreau - Foundations and Trends® in Web Science, 2010 - nowpublishers.com
Provenance, ie, the origin or source of something, is becoming an important concern, since it
offers the means to verify data products, to infer their quality, to analyse the processes that …
offers the means to verify data products, to infer their quality, to analyse the processes that …
Towards secure provenance-based access control in cloud environments
As organizations become increasingly reliant on cloud computing for servicing their data
storage requirements, the need to govern access control at finer granularities becomes …
storage requirements, the need to govern access control at finer granularities becomes …
Security and data accountability in distributed systems: A provenance survey
While provenance research is common in distributed systems, many proposed solutions do
not address the security of systems and accountability of data stored in those systems. In this …
not address the security of systems and accountability of data stored in those systems. In this …
A language for provenance access control
T Cadenhead, V Khadilkar, M Kantarcioglu… - Proceedings of the first …, 2011 - dl.acm.org
Provenance is a directed acyclic graph that explains how a resource came to be in its
current form. Traditional access control does not support provenance graphs. We cannot …
current form. Traditional access control does not support provenance graphs. We cannot …
Sparkac: Fine-grained access control in spark for secure data sharing and analytics
With the development of computing and communication technologies, an extremely large
amount of data has been collected, stored, utilized, and shared, while new security and …
amount of data has been collected, stored, utilized, and shared, while new security and …
Sciblock: A blockchain-based tamper-proof non-repudiable storage for scientific workflow provenance
Modern scientific workflow systems lack strong support for protecting the scientific data and
their provenance from being forged or altered. As a result, scientists may be misled into …
their provenance from being forged or altered. As a result, scientists may be misled into …
[KNIHA][B] Big data analytics with applications in insider threat detection
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is
more intelligent, learning and adapting to new computer defenses on the fly. Using the same …
more intelligent, learning and adapting to new computer defenses on the fly. Using the same …
Towards provenance-based anomaly detection in MapReduce
C Liao, A Squicciarini - … Symposium on Cluster, Cloud and Grid …, 2015 - ieeexplore.ieee.org
MapReduce enables parallel and distributed processing of vast amount of data on a cluster
of machines. However, such computing paradigm is subject to threats posed by malicious …
of machines. However, such computing paradigm is subject to threats posed by malicious …
Plus: A provenance manager for integrated information
It can be difficult to fully understand the result of integrating information from diverse sources.
When all the information comes from a single organization, there is a collective knowledge …
When all the information comes from a single organization, there is a collective knowledge …