[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …
sources in the cloud during transit and processing. For instance, data provenance, which …
A survey of trust in workflows and relevant contexts
W Viriyasitavat, A Martin - IEEE Communications Surveys & …, 2011 - ieeexplore.ieee.org
With the fast-growing Internet technology, several service-based interactions are prevalent
and appear in several forms such as e-commerce, content provider, Virtual Organizations …
and appear in several forms such as e-commerce, content provider, Virtual Organizations …
The foundations for provenance on the web
L Moreau - Foundations and Trends® in Web Science, 2010 - nowpublishers.com
Provenance, ie, the origin or source of something, is becoming an important concern, since it
offers the means to verify data products, to infer their quality, to analyse the processes that …
offers the means to verify data products, to infer their quality, to analyse the processes that …
On provenance and privacy
Provenance in scientific workflows is a double-edged sword. On the one hand, recording
information about the module executions used to produce a data item, as well as the …
information about the module executions used to produce a data item, as well as the …
Security and data accountability in distributed systems: A provenance survey
While provenance research is common in distributed systems, many proposed solutions do
not address the security of systems and accountability of data stored in those systems. In this …
not address the security of systems and accountability of data stored in those systems. In this …
Provenance views for module privacy
Scientific workflow systems increasingly store provenance information about the module
executions used to produce a data item, as well as the parameter settings and intermediate …
executions used to produce a data item, as well as the parameter settings and intermediate …
SciBlock: A blockchain-based tamper-proof non-repudiable storage for scientific workflow provenance
D Fernando, S Kulshrestha, JD Herath… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Modern scientific workflow systems lack strong support for protecting the scientific data and
their provenance from being forged or altered. As a result, scientists may be misled into …
their provenance from being forged or altered. As a result, scientists may be misled into …
On optimizing the trade-off between privacy and utility in data provenance
Organizations that collect and analyze data may wish or be mandated by regulation to justify
and explain their analysis results. At the same time, the logic that they have followed to …
and explain their analysis results. At the same time, the logic that they have followed to …
Improving data workflow systems with cloud services and use of open data for bioinformatics research
Data workflow systems (DWFSs) enable bioinformatics researchers to combine components
for data access and data analytics, and to share the final data analytics approach with their …
for data access and data analytics, and to share the final data analytics approach with their …
Scientific workflows and provenance: Introduction and research opportunities
Scientific workflows are becoming increasingly popular for compute-intensive and data-
intensive scientific applications. The vision and promise of scientific workflows includes …
intensive scientific applications. The vision and promise of scientific workflows includes …