{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:51:43Z","timestamp":1704840703558},"reference-count":35,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2011,4,1]],"date-time":"2011-04-01T00:00:00Z","timestamp":1301616000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems Architecture"],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1016\/j.sysarc.2010.04.006","type":"journal-article","created":{"date-parts":[[2010,5,21]],"date-time":"2010-05-21T08:46:06Z","timestamp":1274431566000},"page":"425-440","source":"Crossref","is-referenced-by-count":3,"title":["Provenance security guarantee from origin up to now in the e-Science environment"],"prefix":"10.1016","volume":"57","author":[{"given":"Im Y.","family":"Jung","sequence":"first","affiliation":[]},{"given":"Heon Y.","family":"Yeom","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.sysarc.2010.04.006_b0005","doi-asserted-by":"crossref","unstructured":"Siddharta S. Gadang, Brajendra Panda, Joseph E. Hoag, Provenance tracking with bit vectors, in: Fourth International Conference on Information Assurance and Security (ISIAS \u201908), 2008, pp.132\u2013137.","DOI":"10.1109\/IAS.2008.47"},{"key":"10.1016\/j.sysarc.2010.04.006_b0010","doi-asserted-by":"crossref","unstructured":"Ragib Hasan, Radu Sion, Marianne Winslett, Introducing Secure Provenance: Problems and Challenges, StorageSS\u201907, 2007.","DOI":"10.1145\/1314313.1314318"},{"key":"10.1016\/j.sysarc.2010.04.006_b0015","unstructured":"Paul Groth, Sheng Jiang, Simon Miles, Steve Munroe, Victor Tan, Sofia Tsasakou, Luc Moreau, An architecture for provenance systems, Technical Report, Electronics and Computer Science, University of Southampton, October 2006. Available at: ."},{"key":"10.1016\/j.sysarc.2010.04.006_b0020","unstructured":"Uri Braun, Avi Shinnar, Margo Seltzer, Securing provenance, in: HotSec \u201908: The 3rd USENIX Workshop on Hot Topics in Security, 2008."},{"key":"10.1016\/j.sysarc.2010.04.006_b0025","unstructured":"Jing Zhang, Adriane Chapman, Kristen LeFevre, Do you know where your datas been? in: Tamper-Evident Database Provenance. Lecture Notes in Computer Science, vol. 5776, 2009, pp. 17\u201332."},{"key":"10.1016\/j.sysarc.2010.04.006_b0030","unstructured":"V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, S. Tuecke, Security for grid services, in: Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), 2003."},{"key":"10.1016\/j.sysarc.2010.04.006_b0035","unstructured":"Rajendra Bose, A conceptual framework for composing and managing scientific data lineage, in: The 14th International Conference on Scientific and Statistical Database Management, Edinburgh, Scotland, 2002, pp. 15\u201319."},{"key":"10.1016\/j.sysarc.2010.04.006_b0040","unstructured":"Uri Braun, Avi Shinnar, A Security Model for Provenance, Harvard University Computer Science Technical Report TR-04-06, 2006."},{"key":"10.1016\/j.sysarc.2010.04.006_b0045","doi-asserted-by":"crossref","unstructured":"Ragib Hasan, Radu Sion, Marianne Winslett, Introducing Secure Provenance: Problems and Challenges, StorageSS\u201907, 2007.","DOI":"10.1145\/1314313.1314318"},{"key":"10.1016\/j.sysarc.2010.04.006_b0050","doi-asserted-by":"crossref","unstructured":"Yogesh L. Simmhan, Beth Plale, Dennis Gannon, A Survey of Data Provenance in e-Science, SIGMOD Record, vol. 34, 2005, pp. 31\u201336.","DOI":"10.1145\/1084805.1084812"},{"key":"10.1016\/j.sysarc.2010.04.006_b0055","unstructured":"Bo Lang, Ian Foster, Frank Siebenlist, Rachana Ananthakrishnan, Tim Freeman, A multipolicy authorization framework for grid security, in: IEEE NCA06 Workshop on Adaptive Grid Computing, 2006."},{"issue":"3","key":"10.1016\/j.sysarc.2010.04.006_b0060","doi-asserted-by":"crossref","DOI":"10.1177\/109434200101500302","article-title":"The anatomy of the grid: enabling scalable virtual organizations","volume":"15","author":"Foster","year":"2001","journal-title":"International Journal of Supercomputer Applications"},{"key":"10.1016\/j.sysarc.2010.04.006_b0065","doi-asserted-by":"crossref","unstructured":"Globus toolkit version 4: software for service-oriented systems, in: I. Foster (Ed.), IFIP International Conference on Network and Parallel Computing, LNCS, vol. 3779, Springer-Verlag, 2006, pp. 2\u201313.","DOI":"10.1007\/11577188_2"},{"key":"10.1016\/j.sysarc.2010.04.006_b0070","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1006\/jnca.2000.0110","article-title":"The data grid: towards an architecture for the distributed management and analysis of large scientific datasets","volume":"23","author":"Chervenak","year":"2001","journal-title":"Journal of Network and Computer Applications"},{"issue":"1","key":"10.1016\/j.sysarc.2010.04.006_b0075","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/602421.602448","article-title":"Bistro: a scalable and secure data transfer service for digital government applications","volume":"46","author":"Golubchik","year":"2003","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.sysarc.2010.04.006_b0080","doi-asserted-by":"crossref","unstructured":"Sami Noponen, Kaarina Karppinen, Information security of remote file transfers with mobile devices, in: 32nd Annual IEEE International Computer Software and Applications Conference, 2008, pp. 973\u2013978.","DOI":"10.1109\/COMPSAC.2008.128"},{"key":"10.1016\/j.sysarc.2010.04.006_b0085","unstructured":"D. Filho, P. Barreto, Demonstrating Data Posession and Uncheatable Data Transfer, Cryptology ePrint Archive, Report 2006\/150, 2006."},{"key":"10.1016\/j.sysarc.2010.04.006_b0090","unstructured":"Xu Jia, Ee-Chien Chang, Remote integrity check with dishonest storage server, in: 13th European Symposium on Research in Computer Security (ESORICS), 2008."},{"key":"10.1016\/j.sysarc.2010.04.006_b0095","unstructured":"Stephen Chong, Towards semantics for provenance security, in: First Workshop on on Theory and Practice of Provenance, 2009."},{"key":"10.1016\/j.sysarc.2010.04.006_b0100","unstructured":"Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu, Trust Evaluation of Data Provenance, CERIAS Tech Report 2008-18, Purdue Univ., 2008."},{"key":"10.1016\/j.sysarc.2010.04.006_b0105","series-title":"International Provenance and Annotation Workshop (IPAW\u201906)","first-page":"46","article-title":"Towards low overhead provenance tracking in near real-time stream filtering","volume":"vol. 4145","author":"Vijayakumar","year":"2006"},{"key":"10.1016\/j.sysarc.2010.04.006_b0110","doi-asserted-by":"crossref","unstructured":"Martin Szomszor, Luc Moreau, Recording and reasoning over data provenance in web and grid services, in: International Conference on Ontologies, Databases and Applications of SEmantics (ODBASE\u201903), 2003.","DOI":"10.1007\/978-3-540-39964-3_39"},{"issue":"1","key":"10.1016\/j.sysarc.2010.04.006_b0115","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10723-006-9055-3","article-title":"The requirements of using provenance in e-Science experiments","volume":"5","author":"Miles","year":"2007","journal-title":"Journal of Grid Computing"},{"key":"10.1016\/j.sysarc.2010.04.006_b0120","doi-asserted-by":"crossref","unstructured":"Yogesh L. Simmhan, Beth Plale, Dennis Gannon, Suresh Marru, Performance evaluation of the karma provenance framework for scientific workflows, in: International Provenance and Annotation Workshop (IPAW\u201906), 2006, pp. 222\u2013236 (also published in LNCS 4145).","DOI":"10.1007\/11890850_23"},{"key":"10.1016\/j.sysarc.2010.04.006_b0125","doi-asserted-by":"crossref","unstructured":"Hyuck Han, Hyungsoo Jung, Heon Y. Yeom, Hee S. Kweon, Jysoo Lee, HVEM grid: experiences in constructing an electron microscopy grid, in: The Eighth Asia Pacific Web Conference, 2006, pp.1159\u20131162 (also published in LNCS 3841).","DOI":"10.1007\/11610113_125"},{"key":"10.1016\/j.sysarc.2010.04.006_b0130","doi-asserted-by":"crossref","unstructured":"Im Young Jung, In Soon Cho, Heon Y.Yeom, Hee S.Kweon, Jysoo Lee, HVEM datagrid: implementation of a biologic data management system for experiments with high voltage electron microscope, in: Distributed, High-Performance and Grid Computing in Computational Biology (GCCB 2006), 2007, pp. 175\u2013190 ((also published in LNCS 4360).","DOI":"10.1007\/978-3-540-69968-2_13"},{"key":"10.1016\/j.sysarc.2010.04.006_b0135","unstructured":"Hyeong Seog Kim, In Soon Cho, Heon Y. Yeom, A Task Pipelining Framework for e-Science Workflow Management Systems, WSES 2008 (in conjunction with CCGrid 2008)."},{"key":"10.1016\/j.sysarc.2010.04.006_b0140","doi-asserted-by":"crossref","unstructured":"Susan B. Davidson, Juliana Freire, Provenance and scientific workflows: challenges and opportunities, in: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, 2008, pp. 1345\u20131350.","DOI":"10.1145\/1376616.1376772"},{"key":"10.1016\/j.sysarc.2010.04.006_b0145","doi-asserted-by":"crossref","unstructured":"Im Young Jung, In Soon Jo, Heon Young Yeom, Hee S. Kweon, Dong H. Choi, A stateful web service with scalable security on HVEM DataGrid, in: Third IEEE International Conference on e-Science and Grid Computing (eScience 2007), 2007.","DOI":"10.1109\/E-SCIENCE.2007.8"},{"issue":"9","key":"10.1016\/j.sysarc.2010.04.006_b0150","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1002\/spe.691","article-title":"R-What? Development of a role-based access control (RBAC) policy-writing tool for e-Scientists","volume":"35","author":"Brostoff","year":"2005","journal-title":"Software: Practice and Experience"},{"key":"10.1016\/j.sysarc.2010.04.006_b0155","doi-asserted-by":"crossref","unstructured":"Yuri Demchenko, Cees de Laat, Domain based access control model for distributed collaborative applications, in: Second IEEE International Conference on e-Science and Grid Computing (eScience 2006), 2006.","DOI":"10.1109\/E-SCIENCE.2006.261108"},{"key":"10.1016\/j.sysarc.2010.04.006_b0160","unstructured":"Crypto++ library 5.5.2. Available at: ."},{"key":"10.1016\/j.sysarc.2010.04.006_b0165","unstructured":"QuickHash Library. Available at: ."},{"key":"10.1016\/j.sysarc.2010.04.006_b0170","doi-asserted-by":"crossref","unstructured":"Ragib Hasan, Radu Sion, Marianne Winslett, The case of the fake picasso: preventing history forgery with secure provenance, in: Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST 2009), 2009, pp. 1\u201314.","DOI":"10.1145\/1629080.1629082"},{"issue":"4","key":"10.1016\/j.sysarc.2010.04.006_b0175","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/1629080.1629082","article-title":"Preventing history forgery with secure provenance","volume":"5","author":"Hasan","year":"2009","journal-title":"ACM Transactions on Storage"}],"container-title":["Journal of Systems Architecture"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762110000263?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1383762110000263?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T10:11:22Z","timestamp":1559124682000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1383762110000263"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,4]]}},"alternative-id":["S1383762110000263"],"URL":"https:\/\/doi.org\/10.1016\/j.sysarc.2010.04.006","relation":{},"ISSN":["1383-7621"],"issn-type":[{"value":"1383-7621","type":"print"}],"subject":[],"published":{"date-parts":[[2011,4]]}}}