Securing provenance by distributing the provenance storage (マルチメディア通信と分散処理・コンピュータセキュリティ)
スポンサーリンク
概要
- 論文の詳細を見る
Provenance is defined in some literature as a complete documentation of processes that led to an object. Provenance can be applied in some systems: database systems, file systems and grid systems. Provenance is very important to verify the processes that led to an object. There are many research to develop a provenance system. Main provenance implementations use a centralized model or a centralized management of provenance system. Although many provenance stores may be used and the users may choose a trusted provenance store as the place to store their provenance, when recording a provenance information, the users should store a complete provenance information in a particular provenance store. We believe that this model has a weakness, that is the user can not restrict access of the administrator that maintains the provenance store where the user store their provenance. We propose an alternative to this model, that is a user may store some parts of the provenance information in a provenance store and some other parts in other provenance stores. We also discuss security advantages of this approach.
- 一般社団法人情報処理学会の論文
- 2009-02-26
著者
-
Sakurai Kouichi
Faculty Of Information Science And Electrical Engineering Kyushu University
-
SYALIM AMRIL
Graduate School of Information Science and Electrical Engineering, Kyushu University
-
Hori Yoshiaki
Faculty of Information Science and Electrical Engineering, Kyushu University
-
Syalim Amril
Graduate School Of Information Science And Electrical Engineering Kyushu University
-
Hori Yoshiaki
Faculty Of Information Science And Electrical Engineering Kyushu University
-
Sakurai Kouichi
Faculty Of Computer Science And Communication Engineering Kyushu University
-
Sakurai Kouichi
Faculty of Information Science and Electrical Engineering, Kyushu University
-
堀 良彰
Faculty of Information Science and Electrical Engineering, Kyushu University
-
櫻井 幸一
Faculty of Information Science and Electrical Engineering, Kyushu University
関連論文
- A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment(Application)(Cryptography and Information Security)
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider(Network Security)
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- A-7-21 Security Policy Pre-evaluation towards Risk Analysis
- Securing Provenance by Distributing the Provenance Storage
- Securing provenance by distributing the provenance storage (マルチメディア通信と分散処理・コンピュータセキュリティ)
- Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems(Special Section on Cryptography and Information Security)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems
- Analysis and Design of SHA-V and RIPEMD-V with Variable Output-Length
- Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems(Side Channel Analysis, Cryptography and Information Security)
- Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card (特集:新たな脅威に立ち向かうコンピュータセキュリティ技術)
- An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider
- Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider