• Computer Science
  • Published 2009

Protecting the Past and Present of Data, with Applications in Provenance and Regulatory-Compliant Databases

@inproceedings{Hasan2009ProtectingTP,
  title={Protecting the Past and Present of Data, with Applications in Provenance and Regulatory-Compliant Databases},
  author={Ragib Hasan},
  year={2009}
}
While the digital nature of modern information has brought enormous benefits, it has also created new vulnerabilities. Unlike physical documents, digitally stored information can be rapidly copied, erased, or tampered. Digital data may be stored in or transmitted via untrusted systems. Even insiders can have financial or strategic motives to tamper data or violate privacy and confidentiality. Access control alone often cannot provide the necessary protection to data, when insiders with… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-3 OF 3 CITATIONS

Provenance threat modeling

VIEW 6 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

Secure digital provenance: Challenges and a new design

VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 38 REFERENCES

Ambokar. An architecture for regulatory compliant databases

  • S. Mitra, M. Winslett, R. T. Snodgrass, S. Yaduvanshi
  • In ICDE,
  • 2009
VIEW 5 EXCERPTS
HIGHLY INFLUENTIAL

, and M . Winslett . Remembrance : The unbearable sentience of being digital

  • R. Sion Hasan
  • 2009

Securing Provenance

VIEW 1 EXCERPT

Shinnar , and M . Seltzer . Securing provenance

  • A. Chapman Buneman, J. Cheney
  • USENIX HotSec
  • 2008