Filters








440,428 Hits in 2.1 sec

Secure provenance

Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
<span title="">2010</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security - ASIACCS &#39;10</a> </i> &nbsp;
In this paper, to tackle this unexplored area in cloud computing, we proposed a new secure provenance scheme based on the bilinear pairing techniques.  ...  Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue today.  ...  Definition of Secure Provenance To fit for the above system model, we formally define the secure provenance (SP) in this subsection. Definition 1.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1755688.1755723">doi:10.1145/1755688.1755723</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/LuLLS10.html">dblp:conf/ccs/LuLLS10</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/io4swhbpsjdblongml3houtm5q">fatcat:io4swhbpsjdblongml3houtm5q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170808021038/http://bbcr.uwaterloo.ca/~x27liang/papers/asiaccs185-lu.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/fc/33/fc33c3dbf05391ce08ea093da0fe677cc8da0096.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1755688.1755723"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Introducing secure provenance

Ragib Hasan, Radu Sion, Marianne Winslett
<span title="">2007</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/lqa4sx5c3rbbbl275ev4o5jf5a" style="color: black;">Proceedings of the 2007 ACM workshop on Storage security and survivability - StorageSS &#39;07</a> </i> &nbsp;
Significant research has been conducted in this area, yet the security and privacy issues of provenance have not been explored.  ...  In this position paper, we define the secure provenance problem and argue that it is of vital importance in numerous applications.  ...  SECURE PROVENANCE Providing security and trustworthiness for provenance records is a big problem. To define the secure provenance problem, we start by informally defining a few basic terms.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1314313.1314318">doi:10.1145/1314313.1314318</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/storagess/HasanSW07.html">dblp:conf/storagess/HasanSW07</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/5tlq4kbswvbnnef7t4rotcos4m">fatcat:5tlq4kbswvbnnef7t4rotcos4m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20090625202224/http://www.cs.sunysb.edu/~sion/research/sion2007storagess-provenance.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/94/c8/94c842e328b49cc63d8c00b59857f34c41b5e13e.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1314313.1314318"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Secure network provenance

Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, Micah Sherr
<span title="">2011</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jj2vupi7offrtmqekd7qqfaxdm" style="color: black;">Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP &#39;11</a> </i> &nbsp;
This paper introduces secure network provenance (SNP), a novel technique that enables networked systems to explain to their operators why they are in a certain state -e.g., why a suspicious routing table  ...  Secure provenance: McDaniel et al. [27] outlines requirements for secure network provenance, emphasizing the need for provenance to be tamper-proof and non-repudiable.  ...  CONCLUSION This paper introduces secure network provenance (SNP), a technique for securely constructing network provenance graphs in untrusted environments with Byzantine faults.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2043556.2043584">doi:10.1145/2043556.2043584</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sosp/ZhouFNHLS11.html">dblp:conf/sosp/ZhouFNHLS11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hdx5vpuqyfgbhgs5wa6fdwmhjm">fatcat:hdx5vpuqyfgbhgs5wa6fdwmhjm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20111115152125/http://www.cis.upenn.edu/~ahae/papers/snp-tr2.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4d/7d/4d7de698e459289866f8edcc59b8cf5d2be5b546.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2043556.2043584"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance [chapter]

Amril Syalim, Takashi Nishide, Kouichi Sakurai
<span title="">2013</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In this paper, we propose a method that allows updates in the signature chain-based secure provenance, while keeping the signature consistent.  ...  The main idea is by keeping the "provenance" of the provenance itself, that is the history of update of the provenance, in the form of the signatures of the previous versions of the nodes.  ...  Integrity Scheme for Provenance by Keeping "The Provenance" of the Provenance Provenance Recording: Securing Provenance with Signature-Chain For a secure provenance recording, when querying inputs I  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-36818-9_40">doi:10.1007/978-3-642-36818-9_40</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/bqkgstc5jzgqjb6zob4b3n45fe">fatcat:bqkgstc5jzgqjb6zob4b3n45fe</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180726195500/https://link.springer.com/content/pdf/10.1007%2F978-3-642-36818-9_40.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/8e/74/8e74fb57f50dfa5caeea175c4116d04011b2b36c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-36818-9_40"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Provenance-aware secure networks

Wenchao Zhou, Eric Cronin, Boon Thau Loo
<span title="">2008</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/vuw5ktdyknehrehttg5qm4rfqm" style="color: black;">2008 IEEE 24th International Conference on Data Engineering Workshop</a> </i> &nbsp;
In particular, one can utilize declarative networks with appropriate security and provenance extensions to provide a unified declarative framework for specifying, analyzing and auditing networks.  ...  communication and provenance.  ...  In particular, one can utilize provenance-aware secure networks with appropriate security extensions to provide a flexible declarative framework for specifying, analyzing and auditing networks.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icdew.2008.4498315">doi:10.1109/icdew.2008.4498315</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/icde/ZhouCL08.html">dblp:conf/icde/ZhouCL08</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/gr24qfuzbrajdmy3ehr3vquf4m">fatcat:gr24qfuzbrajdmy3ehr3vquf4m</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20100623042950/http://netdb.cis.upenn.edu/ds2/publication/netprovenance_netdb08.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/59/37/5937bba228bb250a30bd2dfd4aca35d5d17e95a4.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/icdew.2008.4498315"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Securing Provenance-Based Audits [chapter]

Rocío Aldeco-Pérez, Luc Moreau
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
The aim of this paper is to secure provenance-based audits by the inclusion of cryptographic elements in the communication between the involved entities as well as in the provenance representation.  ...  This paper also presents a formalisation and an automatic verification of a set of security properties that increase the level of trust in provenance-based audit results.  ...  Fig. 1 . 1 Provenance-based Auditing Architecture Fig. 3 . 3 Secured Graph Example Theorem 1 ( 1 Secure Provenance Based-Auditing Architecture).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-17819-1_18">doi:10.1007/978-3-642-17819-1_18</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rg4ocog7sfegvm62wp7xrhfazm">fatcat:rg4ocog7sfegvm62wp7xrhfazm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20181030080847/https://link.springer.com/content/pdf/10.1007%2F978-3-642-17819-1_18.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/cb/d3/cbd377b65d414c97a311b31eab661d9bd231fc3b.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-17819-1_18"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

A Formal Framework for Provenance Security

James Cheney
<span title="">2011</span> <i title="IEEE"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/kea5jpvemrdmvbwvgh5jn6gog4" style="color: black;">2011 IEEE 24th Computer Security Foundations Symposium</a> </i> &nbsp;
In this paper, we outline a formal model of provenance, propose formalizations of security properties for provenance such as disclosure and obfuscation, and explore their implications in domains based  ...  and relate it to security goals such as availability, confidentiality or privacy.  ...  However, most of this work focuses on applying existing security mechanisms to provenance data, rather than on understanding security policies involving provenance.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/csf.2011.26">doi:10.1109/csf.2011.26</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/csfw/Cheney11.html">dblp:conf/csfw/Cheney11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6cr3xbvmwnf2nf4gh6ofclae4e">fatcat:6cr3xbvmwnf2nf4gh6ofclae4e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180719080834/https://www.pure.ed.ac.uk/ws/files/17654878/cheney11csf.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f9/19/f919dc63c041aeb53af24755167a4e625876d594.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/csf.2011.26"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Securing Data Provenance in the Cloud [chapter]

Muhammad Rizwan Asghar, Mihaela Ion, Giovanni Russello, Bruno Crispo
<span title="">2012</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
This paper proposes a scheme to secure data provenance in the cloud while offering the encrypted search.  ...  Data provenance needs to be secured since it may reveal private information about the sensitive data while the cloud service provider does not guarantee confidentiality of the data stored in dispersed  ...  Secure Data Provenance Schemes The Secure Provenance (SPROV) scheme [10, 9] automatically collects data provenance at the application layer.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-27585-2_12">doi:10.1007/978-3-642-27585-2_12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rs32oipfhzdhticut4r6brrp5e">fatcat:rs32oipfhzdhticut4r6brrp5e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190505063702/https://link.springer.com/content/pdf/10.1007%2F978-3-642-27585-2_12.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/98/55/9855bfec4f018d05f65580060dbfa7de62982c13.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-27585-2_12"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Preventing history forgery with secure provenance

Ragib Hasan, Radu Sion, Marianne Winslett
<span title="2009-12-01">2009</span> <i title="Association for Computing Machinery (ACM)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/3mmwgsm7yjg6toqdso3ci66o5y" style="color: black;">ACM Transactions on Storage</a> </i> &nbsp;
While significant research has been conducted in this area, the associated security and privacy issues have not been explored, leaving provenance information vulnerable to illicit alteration as it passes  ...  We describe Sprov, our provenance-aware system prototype that implements provenance tracking of data writes at the application layer, which makes Sprov extremely easy to deploy.  ...  Our approaches to securing provenance chains can be applied to these systems, to increase their security guarantees.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1629080.1629082">doi:10.1145/1629080.1629082</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4zjpvvdnsvgdlbyh4g6xlcgsju">fatcat:4zjpvvdnsvgdlbyh4g6xlcgsju</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170810100501/https://www.ideals.illinois.edu/bitstream/handle/2142/13004/hasan-secure-provenance.pdf?sequence=2" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/2a/f0/2af0588d980e92365371c1883f96d250342e5d23.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1629080.1629082"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Has quantum cryptography been proven secure?

Tassos Nakassis, J. C. Bienfang, P. Johnson, A. Mink, D. Rogers, X. Tang, C. J. Williams, Eric J. Donkor, Andrew R. Pirich, Howard E. Brandt
<span title="2006-05-05">2006</span> <i title="SPIE"> Quantum Information and Computation IV </i> &nbsp;
DECOY STATES Apart from the fact that better proofs and more engineering detail are necessary, it is mildly disconcerting that the devotees of the provably secure system have more than once proven security  ...  Each time, large or small changes in privacy amplification are devised so that we would still have a provably secure system by sacrificing more of the bits previously deemed to be secure.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.665086">doi:10.1117/12.665086</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/xmf3o6d24ffbfozcf3rhhepcua">fatcat:xmf3o6d24ffbfozcf3rhhepcua</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20070417155137/http://w3.antd.nist.gov/pubs/quantum_sec7.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e5/9a/e59a53c18f07180d5c7ac5e9cc16679a0fcf7cf3.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1117/12.665086"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Secure Provenance Transmission for Streaming Data

Salmin Sultana, Mohamed Shehab, Elisa Bertino
<span title="">2013</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/ht3yl6qfebhwrg7vrxkz4gxv3q" style="color: black;">IEEE Transactions on Knowledge and Data Engineering</a> </i> &nbsp;
In this paper, we propose a novel approach to securely transmit provenance for streaming data (focusing on sensor network) by embedding provenance into the inter-packet timing domain while addressing the  ...  Provenance management for streaming data requires addressing several challenges, including the assurance of high processing throughput, low bandwidth consumption, storage efficiency and secure transmission  ...  and secure implementation of provenance for real-time systems.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tkde.2012.31">doi:10.1109/tkde.2012.31</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hlfi6cwvnnce3atjdpoz4w6jou">fatcat:hlfi6cwvnnce3atjdpoz4w6jou</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170830065146/http://www.profsandhu.com/provsec_publications/2012tkde-prov-streaming.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/13/bc/13bcc1617f016f8b0b9a38fe217126762f095b66.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tkde.2012.31"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Data-Provenance Verification For Secure Hosts

Kui Xu, Huijun Xiong, Chehai Wu, Deian Stefan, Danfeng Yao
<span title="">2012</span> <i title="Institute of Electrical and Electronics Engineers (IEEE)"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/okrr6mjegfbtbjrfrxtci54s6i" style="color: black;">IEEE Transactions on Dependable and Secure Computing</a> </i> &nbsp;
We define dataprovenance integrity as the security property stating that the source where a piece of data is generated cannot be spoofed or tampered with.  ...  We describe a cryptographic provenance verification approach for ensuring system properties and system-data integrity at kernel-level.  ...  We propose the security model and operations in cryptographic provenance verification.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tdsc.2011.50">doi:10.1109/tdsc.2011.50</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6udb5iwqzjfg3c7osddz5tftlq">fatcat:6udb5iwqzjfg3c7osddz5tftlq</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151020114925/http://people.cs.vt.edu/~danfeng/papers/CPV-TDSC.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/ec/f4/ecf426d3b33b512b4745994df7aa3e91971e7353.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1109/tdsc.2011.50"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> ieee.com </button> </a>

Provenance-Based Security Risk Assessment Framework

Guillermo Horacio Ramirez Caceres, Koji Zettsu
<span title="">2014</span> <i title="Information Processing Society of Japan"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/dpojic4iejf5ni3no6ddhgbqaq" style="color: black;">Journal of Information Processing</a> </i> &nbsp;
Our proposed system implements a graphic representation of provenance using Open Provenance Model (OPM), and users are allowed to see graphically where and what kinds of data generate security conflicts  ...  In addition, since KLG allows user to access security knowledge-bases, it is possible to provide actual and on time information about risk and security controls.  ...  Provenance-based Risk Assessment Framework The main objective of this research is to implement a provenance-based security risk assessment to support the secure leverage of information assets.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2197/ipsjjip.22.617">doi:10.2197/ipsjjip.22.617</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h3fd3tokaffwdhc6ixrcnt4a2e">fatcat:h3fd3tokaffwdhc6ixrcnt4a2e</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190508204238/https://www.jstage.jst.go.jp/article/ipsjjip/22/4/22_617/_pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e5/05/e5051070cd9b0fd21d7b1f858e1b5bee8c34b700.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.2197/ipsjjip.22.617"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Security & privacy in IoT Data Provenance

Adarsh. T.K, R Jebakumar Dr.
<span title="2018-06-30">2018</span> <i title="ENGG Journals Publications"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rm2oud7tpnfwtpubgeudnvvonm" style="color: black;">International Journal of Engineering and Technology</a> </i> &nbsp;
To this end we will mention different challenges to meet security and privacy in IoT data provenance  ...  The data provenance deals with detecting creation and propagation of data, The main purpose of the paper is to address security and privacy issues by implementing data provenance in IoT.  ...  techniques in the following section data provenance is discussed to meet the security and privacy in IoT data provenance III.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21817/ijet/2018/v10i3/181003085">doi:10.21817/ijet/2018/v10i3/181003085</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ohy2ky4bmrhchilr25c77d3qim">fatcat:ohy2ky4bmrhchilr25c77d3qim</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190427120738/http://www.enggjournals.com/ijet/docs/IJET18-10-03-085.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/25/c7/25c77af5113f217d08addc6e95f773a5059089e9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.21817/ijet/2018/v10i3/181003085"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> Publisher / doi.org </button> </a>

Practical proven secure authentication with arbitration [chapter]

Yvo Desmedt, Jennifer Seberry
<span title="">1993</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Proven secure signature schemes and unconditionally secure authentication schemes with arbiter have been proposed. The former are not practical (too slow) and the latter cannot be reused.  ...  Proven secure signature schemes and unconditionally secure authentication schemes with arbiter have been proposed. The former are not practical (too slow) and the latter cannot be reused.  ...  We assume the existence of a conditionally proven secure authentication scheme.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-57220-1_49">doi:10.1007/3-540-57220-1_49</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/6taum7bvfjg57gptnlr2v7fu2q">fatcat:6taum7bvfjg57gptnlr2v7fu2q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180721020750/http://ro.uow.edu.au/cgi/viewcontent.cgi?article=2097&amp;context=infopapers" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/e6/9d/e69d484c5506c32f621293005f33173d260b7cf0.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/3-540-57220-1_49"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 440,428 results