Sciweavers

406 search results - page 6 / 82
» PASSing the provenance challenge
Sort
View
CCS
2010
ACM
15 years 4 months ago
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
CONCURRENCY
2008
142views more  CONCURRENCY 2008»
14 years 9 months ago
Provenance trails in the Wings/Pegasus system
Our research focuses on creating and executing large-scale scientific workflows that often involve thousands of computations over distributed, shared resources. We describe an app...
Jihie Kim, Ewa Deelman, Yolanda Gil, Gaurang Mehta...
CIDR
2011
233views Algorithms» more  CIDR 2011»
14 years 1 months ago
Ibis: A Provenance Manager for Multi-Layer Systems
End-to-end data processing environments are often comprised of several independently-developed (sub-)systems, e.g. for engineering, organizational or historical reasons. Unfortuna...
Christopher Olston, Anish Das Sarma
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
LCPC
2005
Springer
15 years 3 months ago
Code Transformations for One-Pass Analysis
With the growing popularity of streaming data model, processing queries over streaming data has become an important topic. Streaming data has received attention in a number of comm...
Xiaogang Li, Gagan Agrawal