Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
97 tokens/sec
GPT-4o
53 tokens/sec
Gemini 2.5 Pro Pro
44 tokens/sec
o3 Pro
5 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Provenance Threat Modeling (1703.03835v1)

Published 10 Mar 2017 in cs.CR

Abstract: Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set. Provenance systems are also used for debugging, process improvement, understanding data proof of ownership, certification of validity, etc. The provenance of data includes information about the processes and source data that leads to the current representation. In this paper we study the security risks provenance systems might be exposed to and recommend security solutions to better protect the provenance information.

User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (6)
  1. Oluwakemi Hambolu (2 papers)
  2. Lu Yu (87 papers)
  3. Jon Oakley (5 papers)
  4. Richard R. Brooks (6 papers)
  5. Ujan Mukhopadhyay (1 paper)
  6. Anthony Skjellum (19 papers)
Citations (7)

Summary

We haven't generated a summary for this paper yet.