Trusted Computing and Provenance: Better Together

@inproceedings{Lyle2010TrustedCA,
  title={Trusted Computing and Provenance: Better Together},
  author={John Lyle and Andrew P. Martin},
  booktitle={TaPP},
  year={2010}
}
It is widely realised that provenance systems can benefit from greater awareness of security principles and the use of security technology. In this paper, we argue that Trusted Computing, a hardware-based method for establishing platform integrity, is not only useful, but immediately applicable. We demonstrate how existing Trusted Computing mechanisms can be used for provenance, and identify the remarkable similarity and overlap between the two research areas. This is accomplished through… CONTINUE READING
Highly Cited
This paper has 57 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 40 extracted citations

58 Citations

01020'11'13'15'17
Citations per Year
Semantic Scholar estimates that this publication has 58 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 47 references

TCG Infrastructure Working Group Architecture Part II - Integrity Management

  • TRUSTED COMPUTING GROUP
  • http: //www.trustedcomputinggroup.org/resources…
  • 2006
Highly Influential
4 Excerpts

Provenance in Databases : Why , How , and Where . Found

  • J. C HENEY, L. C HITICARIU, W.-C. AND T AN
  • Trends databases
  • 2009
Highly Influential
3 Excerpts

A Methodology for Developing ProvenanceAware Applications

  • L. AND V ARGA
  • ACM Transactions on Software Engineering and…
  • 2009

Similar Papers

Loading similar papers…