Secure Provenance: Protecting theGenealogy of Bits.
Ragib HasanRadu SionMarianne WinslettPublished in: login Usenix Mag. (2009)
Keyphrases
- access control
- block cipher
- protection mechanisms
- fine grained
- unauthorized access
- metadata
- sensitive data
- data quality
- privacy preservation
- security mechanisms
- error correcting codes
- encryption scheme
- key management
- security requirements
- security issues
- security protocols
- data security
- lightweight
- hamming distance
- data protection
- bit string
- provenance information
- authentication scheme
- cryptographic protocols
- scientific workflows
- security analysis