Towards a Secure and Efficient System for End-to-End Provenance

نویسندگان

  • Patrick D. McDaniel
  • Kevin R. B. Butler
  • Stephen E. McLaughlin
  • Radu Sion
  • Erez Zadok
  • Marianne Winslett
چکیده

Work on the End-to-End Provenance System (EEPS) began in the late summer of 2009. The EEPS effort seeks to explore the three central questions in provenance systems: (1) “Where and how do I design secure hostlevel provenance collecting instruments (called provenance monitors)?”; (2) “How do I extend completeness and accuracy guarantees to distributed systems and computations?”; and (3) “What are the costs associated with provenance collection?” This position paper discusses our initial exploration into these issues and posits several challenges to the realization of the EEPS vision.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure and Efficient End-to-End Provenance System (EEPS)

Work on the End-to-End Provenance System (EEPS) was begun in the later summer of 2009. The EEPS effort seeks to explore the three central questions in provenance systems; a) ”where and how do I design secure hostlevel provenance collecting instruments (called provenance monitors)?”, b) ”how do I extend completeness and accuracy guarantees to distributed systems and computations?”, and c) ”what ...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

Retrofitting Applications with Provenance-Based Security Monitoring

Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker’s actions following an intrusion, or even control the flow of outbound data within an organization. Unfortunately, providing relevant data provenance fo...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Towards Semantic Provenance in CRISTAL

Traceability is an important feature of workflow based systems, and is a key source of provenance data. This paper presents CRISTAL, a mature software platform developed and used at CERN for experiment construction at the LHC. It is entirely workflow based capturing provenance on every aspect of its use from application development to end-user interaction. In this paper we summarize some initia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010