Sciweavers

1494 search results - page 4 / 299
» Efficient provenance storage
Sort
View
SIGMOD
2010
ACM
167views Database» more  SIGMOD 2010»
13 years 5 months ago
Efficient querying and maintenance of network provenance at internet-scale
Network accountability, forensic analysis, and failure diagnosis are becoming increasingly important for network management and security. Such capabilities often utilize network p...
Wenchao Zhou, Micah Sherr, Tao Tao, Xiaozhou Li, B...
DSN
2008
IEEE
13 years 7 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
ICDE
2009
IEEE
102views Database» more  ICDE 2009»
14 years 3 days ago
On the Efficiency of Provenance Queries
Anastasios Kementsietsidis, Min Wang
FAST
2010
13 years 7 months ago
Provenance for the Cloud
The cloud is poised to become the next computing environment for both data storage and computation due to its pay-as-you-go and provision-as-you-go models. Cloud storage is alread...
Kiran-Kumar Muniswamy-Reddy, Peter Macko, Margo I....
SIGMOD
2010
ACM
170views Database» more  SIGMOD 2010»
13 years 10 months ago
Querying data provenance
Many advanced data management operations (e.g., incremental maintenance, trust assessment, debugging schema mappings, keyword search over databases, or query answering in probabil...
Grigoris Karvounarakis, Zachary G. Ives, Val Tanne...