Practical whole-system provenance capture

@article{Pasquier2017PracticalWP,
  title={Practical whole-system provenance capture},
  author={Thomas Pasquier and X. Han and Mark Goldstein and T. Moyer and D. Eyers and Margo I. Seltzer and J. Bacon},
  journal={Proceedings of the 2017 Symposium on Cloud Computing},
  year={2017}
}
Data provenance describes how data came to be in its present form. It includes data sources and the transformations that have been applied to them. Data provenance has many uses, from forensics and security to aiding the reproducibility of scientific experiments. We present CamFlow, a whole-system provenance capture mechanism that integrates easily into a PaaS offering. While there have been several prior whole-system provenance systems that captured a comprehensive, systemic and ubiquitous… Expand
50 Citations
Runtime Analysis of Whole-System Provenance
  • 28
  • PDF
PR EP RI NT Runtime Analysis of Whole-System Provenance
  • PDF
CLARION: Sound and Clear Provenance Tracking for Microservice Deployments
  • Highly Influenced
  • PDF
Improving reproducibility of data science pipelines through transparent provenance capture
  • 2
  • Highly Influenced
  • PDF
ProvMark: A Provenance Expressiveness Benchmarking System
  • 4
  • PDF
Efficient Provenance Management via Clustering and Hybrid Storage in Big Data Environments
  • 2
Data Provenance
  • PDF
Pagoda: A Hybrid Approach to Enable Efficient Real-Time Provenance Based Intrusion Detection in Big Data Environments
  • 5
  • Highly Influenced
  • PDF
Integrity Checking and Abnormality Detection of Provenance Records
  • PDF
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 12 REFERENCES
Hi-Fi: collecting high-fidelity whole-system provenance
  • 109
  • Highly Influential
  • PDF
Design and Implementation of a TCG-based Integrity Measurement Architecture
  • 1,098
  • Highly Influential
  • PDF
PRIMA: policy-reduced integrity measurement architecture
  • 299
  • Highly Influential
  • PDF
Remote attestation to dynamic system properties: Towards providing complete system integrity evidence
  • 127
  • Highly Influential
  • PDF
Optimistic security: a new access control paradigm
  • 169
  • Highly Influential
  • PDF
Correct Audit Logging: Theory and Practice
  • 18
  • Highly Influential
  • PDF
vTPM: Virtualizing the Trusted Platform Module
  • 588
  • Highly Influential
  • PDF
Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces
  • D. Weitzner
  • Business, Computer Science
  • IEEE Internet Computing
  • 2007
  • 22
  • Highly Influential
Computer security in the real world
  • 257
  • Highly Influential
  • PDF
Implementing SELinux as a Linux Security Module
  • 247
  • Highly Influential
  • PDF
...
1
2
...