2008 IEEE Fourth International Conference on eScience 2008
DOI: 10.1109/escience.2008.161
|View full text |Cite
|
Sign up to set email alerts
|

Kairos: An Architecture for Securing Authorship and Temporal Information of Provenance Data in Grid-Enabled Workflow Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 17 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…We identify the assurance of correct attribution of scientific results as an important security requirement for these systems. For this purpose, we proposed Kairos [5], a security architecture for provenance that uses cryptographic timestamps [6] and digital signatures. We are working with the Swift [13] parallel scripting system to extend its provenance system [4] with appropriate security controls.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…We identify the assurance of correct attribution of scientific results as an important security requirement for these systems. For this purpose, we proposed Kairos [5], a security architecture for provenance that uses cryptographic timestamps [6] and digital signatures. We are working with the Swift [13] parallel scripting system to extend its provenance system [4] with appropriate security controls.…”
Section: Discussionmentioning
confidence: 99%
“…These controls must allow the verification of not only who executed an experiment but also when it was executed. A combination of digital signatures and cryptographic timestamps [6] were used in the Kairos [5] security architecture for provenance systems to provide these properties. Another desirable security property is fine-grained access control, where scientists can delegate to their collaborators access to provenance data, so it can be read or modified.…”
Section: Security Requirements For Provenance Systemsmentioning
confidence: 99%
“…For the confidentiality mechanism, Hasan et al use a broadcast and threshold encryption, and they do not propose a specific access control model. Gadelha et al implement a simple time-stamp mechanism for protecting the provenance [25] in a grid system. In their scheme, the provenance is signed by the data owner and hash of the signature is sent to a Time-Stamp Authority (TSA) that appends a timestamp to the hash.…”
Section: Related Workmentioning
confidence: 99%
“…Gadelha [166] considers some security properties of provenance -integrity, confidentiality and availability -in the context of intellectual property conflict claim resolution and of the reliable chronological reconstitution of scientific experiments. To address these, they secure data authorship and temporal information of provenance records.…”
Section: Provenance Integritymentioning
confidence: 99%