{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:58:34Z","timestamp":1729637914159,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.73","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"594-602","source":"Crossref","is-referenced-by-count":48,"title":["S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance"],"prefix":"10.1109","author":[{"given":"Chun Hui","family":"Suen","sequence":"first","affiliation":[]},{"given":"Ryan K.L.","family":"Ko","sequence":"additional","affiliation":[]},{"given":"Yu Shyang","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Jagadpramana","sequence":"additional","affiliation":[]},{"given":"Bu Sung","family":"Lee","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1109\/SERVICES.2011.91"},{"year":"2010","journal-title":"HyTrust Appliance","key":"17"},{"year":"2010","journal-title":"Fedora 13 Security-enhanced Linux User Guide","key":"35"},{"key":"18","first-page":"175","article-title":"Tripwire: A case study in integrity monitoring","author":"kim","year":"1998","journal-title":"Internet Besieged Countering Cyberspace Scofflaws"},{"doi-asserted-by":"publisher","key":"36","DOI":"10.1109\/MIC.2006.116"},{"year":"2007","author":"salzman","journal-title":"The Linux Kernel Module Programming Guide-chapter 8 System Calls","key":"33"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/SSDM.2003.1214945"},{"year":"2005","author":"sar","journal-title":"Lineage File System","key":"34"},{"key":"16","first-page":"145","article-title":"Automated system monitoring and notification with swatch","author":"hansen","year":"1993","journal-title":"Proceedings of the Seventh Systems Administration Conference (LISA VII) (USENIX Association Berkeley CA)"},{"doi-asserted-by":"publisher","key":"39","DOI":"10.1109\/CloudCom.2011.66"},{"year":"0","journal-title":"Bonnie","key":"13"},{"year":"2009","journal-title":"File Alteration Monitor (Fam) Overview","key":"14"},{"year":"2011","journal-title":"VMware Performance Monitoring for Cloud Services","key":"37"},{"key":"11","first-page":"316","article-title":"Why and where: A characterization of data provenance","author":"buneman","year":"2001","journal-title":"Database Theory-ICDT 2001 Volume 1973 of Lecture Notes in Computer Science"},{"year":"2005","author":"widom","journal-title":"Proceedings of the 2005 CIDR Conference","article-title":"Trio: A system for integrated management of data, accuracy, and lineage","key":"38"},{"year":"2011","journal-title":"Cloudkick-cloud Monitoring and Management","key":"12"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/DSR.2011.6026885"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/TrustCom.2011.100"},{"doi-asserted-by":"publisher","key":"40","DOI":"10.1109\/TrustCom.2012.175"},{"key":"22","first-page":"1","article-title":"Understanding cloud failures","volume":"42","author":"ko","year":"2013","journal-title":"IEEE Spectrum"},{"year":"2006","author":"lee","journal-title":"Linux 2 6 System Call Tables","key":"23"},{"key":"24","first-page":"8","article-title":"Kernel korner: Intro to inotify","volume":"2005","author":"love","year":"2005","journal-title":"Linux Journal"},{"year":"2011","author":"macko","journal-title":"TaPP' 11 3rd USENIX Workshop on the Theory and Practice of Provenance","article-title":"Collecting provenance via the xen hypervisor","key":"25"},{"key":"26","first-page":"129","article-title":"Layering in provenance systems","author":"muniswamy-reddy","year":"2009","journal-title":"Proceedings of the 2009 Conference on USENIX Annual Technical Conference USENIX"},{"key":"27","first-page":"43","article-title":"Provenance-aware storage systems","author":"muniswamy-reddy","year":"2006","journal-title":"Proceedings of the Annual Conference on USENIX '06 Annual Technical Conference"},{"year":"2009","author":"muniswamy-reddy","journal-title":"TaPP' 09 1rd Workshop on the Theory and Practice of Provenance","article-title":"Making a cloud provenance-aware","key":"28"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1145\/1713254.1713258"},{"year":"0","key":"3"},{"year":"0","journal-title":"Provenance aware service oriented architecture","key":"2"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s00778-005-0156-6","article-title":"An annotation management system for relational databases","volume":"14","author":"bhagwat","year":"2005","journal-title":"The VLDB Journal"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1145\/1713254.1713258"},{"year":"2011","journal-title":"Get System Call Address in System Call Table from \/Proc\/kcore","key":"7"},{"year":"2010","journal-title":"Syscall Hijacking Kernel 2 6 * Systems Dec","key":"6"},{"key":"32","first-page":"107","article-title":"Document provenance in the cloud: Constraints and challenges","author":"sakka","year":"2010","journal-title":"Networked Services and Applications-Engineering Control and Management Volume 6164 of Lecture Notes in Computer Science"},{"year":"2010","journal-title":"Linux Kernel System Call Hooking Example","key":"5"},{"key":"31","first-page":"229","article-title":"Snort: Lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of the 13th Conference on Systems Administration (LISA-99)"},{"year":"2008","journal-title":"Apparmor Nov","key":"4"},{"year":"2011","journal-title":"Syscall Hijacking Dynamically Obtain Syscall Table Address (Kernel 2 6 x)","key":"9"},{"year":"2011","journal-title":"Hooking Interrupt Descriptor Table","key":"8"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680891.pdf?arnumber=6680891","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T00:26:44Z","timestamp":1498091204000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680891\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.73","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}