Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenance
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 84, Pages 1–11https://doi.org/10.1145/3664476.3670933In the rapidly evolving digital world, network security is a critical concern. Traditional security measures often fail to detect unknown attacks, making anomaly-based Network Intrusion Detection Systems (NIDS) using Machine Learning (ML) vital. However, ...
- research-articleMay 2024Best Paper
An Ecore Metamodel for the W3C PROV Provenance Data Model
SBSI '24: Proceedings of the 20th Brazilian Symposium on Information SystemsArticle No.: 3, Pages 1–10https://doi.org/10.1145/3658271.3658274Context: In contemporary Information Systems development, effective management of data provenance has become pivotal for ensuring transparency, accountability, and reproducibility, particularly in the context of data-intensive applications.
Problem: ...
- short-paperOctober 2023
Dashboards to support rehabilitation in orientation and mobility for people who are blind
- José M. L. Moraes,
- Phyllipe Do Carmo F.,
- Maria da C. Carneiro Araújo,
- Bernardo Costa,
- Myrna Amorim,
- Agebson Rocha Façanha,
- Joel dos Santos,
- Windson Viana
WebMedia '23: Proceedings of the 29th Brazilian Symposium on Multimedia and the WebPages 6–10https://doi.org/10.1145/3617023.3617027In Brazil, there are over 7 million individuals with visual disabilities (PDVs), including at least 500,000 blind individuals, according to IBGE 2019 data. Orientation and Mobility (OM) training is crucial for PDVs to navigate, identify objects, ...
- demonstrationApril 2023
ProSA: A provenance system for reproducing query results
WWW '23 Companion: Companion Proceedings of the ACM Web Conference 2023Pages 1555–1558https://doi.org/10.1145/3543873.3587563Good scientific work requires comprehensible, transparent and reproducible research. One way to ensure this is to include all data relevant to a study or evaluation when publishing an article. This data should be at least aggregated or anonymized, at ...
- research-articleJanuary 2021
Provenance Framework for Twitter Data using Zero-Information Loss Graph Database
CODS-COMAD '21: Proceedings of the 3rd ACM India Joint International Conference on Data Science & Management of Data (8th ACM IKDD CODS & 26th COMAD)Pages 74–82https://doi.org/10.1145/3430984.3431014Social media is an ever-evolving web based platform for sharing thoughts, opinions, ideas and other contents. Among all social media networks, Twitter has become one of the most popular social networking/micro-blogging sites, allowing users to share ...
-
- research-articleFebruary 2021
LineageChain: a fine-grained, secure and efficient data provenance system for blockchains
The VLDB Journal — The International Journal on Very Large Data Bases (VLDB), Volume 30, Issue 1Pages 3–24https://doi.org/10.1007/s00778-020-00646-1AbstractThe success of Bitcoin and other cryptocurrencies is drawing significant interest to blockchains. A blockchain system implements a tamper-evident ledger for recording transactions that modify some global states. The system captures the entire ...
- research-articleDecember 2020
On the Forensic Validity of Approximated Audit Logs
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 189–202https://doi.org/10.1145/3427228.3427272Auditing is an increasingly essential tool for the defense of computing systems, but the unwieldy nature of log data imposes significant burdens on administrators and analysts. To address this issue, a variety of techniques have been proposed for ...
- research-articleDecember 2020
This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
- Wajih Ul Hassan,
- Ding Li,
- Kangkook Jee,
- Xiao Yu,
- Kexuan Zou,
- Dawei Wang,
- Zhengzhang Chen,
- Zhichun Li,
- Junghwan Rhee,
- Jiaping Gui,
- Adam Bates
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 165–178https://doi.org/10.1145/3427228.3427255Recent advances in the causal analysis can accelerate incident response time, but only after a causal graph of the attack has been constructed. Unfortunately, existing causal graph generation techniques are mainly offline and may take hours or days to ...
- short-paperJuly 2020
Research Workflows - Towards reproducible science via detailed provenance tracking in Open Science Chain
PEARC '20: Practice and Experience in Advanced Research Computing 2020: Catch the WavePages 484–486https://doi.org/10.1145/3311790.3399619Scientific research has always struggled with problems related to reproducibility caused in part by low data sharing rates and lack of provenance. Credibility of the research hypothesis comes into question when results cannot be replicated. While the ...
- posterDecember 2019
HyperProv: Decentralized Resilient Data Provenance at the Edge with Blockchains
Middleware '19: Proceedings of the 20th International Middleware Conference Demos and PostersPages 3–4https://doi.org/10.1145/3366627.3368105Data provenance and lineage are critical for ensuring integrity and reproducibility of information in research and application. This is particularly challenging for distributed scenarios, where data may be originating from decentralized sources without ...
- short-paperAugust 2019
Enhancing credibility of digital evidence through provenance-based incident response handling
ARES '19: Proceedings of the 14th International Conference on Availability, Reliability and SecurityArticle No.: 26, Pages 1–6https://doi.org/10.1145/3339252.3339275Digital forensics are becoming increasingly important for the investigation of computer-related crimes, white-collar crimes and massive hacker attacks. After an incident has been detected an appropriate incident response is usually initiated with the ...
- research-articleJuly 2019
Introducing the Open Science Chain: Protecting Integrity and Provenance of Research Data
PEARC '19: Practice and Experience in Advanced Research Computing 2019: Rise of the Machines (learning)Article No.: 18, Pages 1–5https://doi.org/10.1145/3332186.3332203Data sharing is an integral component of research and academic publications, allowing for independent verification of results. Researchers have the ability to extend and build upon prior research when they are able to efficiently access, validate, and ...
- ArticleMay 2019
Transparent Cloud Privacy: Data Provenance Expression in Blockchain
CLOSER 2019: Proceedings of the 9th International Conference on Cloud Computing and Services SciencePages 430–436https://doi.org/10.5220/0007733404300436The development of Cloud processing and Big Data have raised many concerns over the use to which data is being put. These concerns have created new demands for methodologies, and capabilities which can provide transparency and trust in data provenance ...
- research-articleJanuary 2019
Can I Trust the Data I See?: A Physician's Concern on Medical Data in IoT Health Architectures
ACSW '19: Proceedings of the Australasian Computer Science Week MulticonferenceArticle No.: 27, Pages 1–10https://doi.org/10.1145/3290688.3290731With the increasing advancement of Internet of Things (IoT) enabled systems, smart medical devices open numerous opportunities for the healthcare sector. The success of using such devices in the healthcare industry depends strongly on secured and ...
- articleOctober 2018
CoPS-Cooperative Provenance System with ZKP using Ethereum Blockchain Smart Contracts
International Journal of Distributed Systems and Technologies (IJDST-IGI), Volume 9, Issue 4Pages 40–53https://doi.org/10.4018/IJDST.2018100103The redesign of cloud storage with the amalgamation of cooperative cloud and an immutable and unhackable distributed database blockchain thrives towards a strong CIA triad and secured data provenance. The conspiracy ideology associated with the ...
- research-articleDecember 2017
Secure Data Provenance in Home Energy Monitoring Networks
ICSS 2017: Proceedings of the 3rd Annual Industrial Control System Security WorkshopPages 7–14https://doi.org/10.1145/3174776.3174778Smart grid empowers home owners to efficiently manage their smart home appliances within a Home Area Network (HAN), by real time monitoring and fine-grained control. However, it offers the possibility for a malicious user to intrude into the HAN and ...
- research-articleSeptember 2017
Regression Tests Provenance Data in the Continuous Software Engineering Context
- Heleno de S. Campos Junior,
- Camila Acácio de Paiva,
- Regina Braga,
- Marco Antônio P. Araújo,
- José Maria N. David,
- Fernanda Campos
SAST '17: Proceedings of the 2nd Brazilian Symposium on Systematic and Automated Software TestingArticle No.: 10, Pages 1–6https://doi.org/10.1145/3128473.3128483Regression tests are executed after every change in software. In a software development environment that adopts Continuous Software Engineering practices such as Continuous Integration, Continuous Delivery and Continuous Deployment, software is changed, ...
- research-articleAugust 2017
LAMP: data provenance for graph based machine learning algorithms through derivative computation
ESEC/FSE 2017: Proceedings of the 2017 11th Joint Meeting on Foundations of Software EngineeringPages 786–797https://doi.org/10.1145/3106237.3106291Data provenance tracking determines the set of inputs related to a given output. It enables quality control and problem diagnosis in data engineering. Most existing techniques work by tracking program dependencies. They cannot quantitatively assess the ...
- articleJuly 2017
An Approach to Configuration Management of Scientific Workflows
- Tassio Ferenzini Martins Sirqueira,
- Regina Braga,
- Marco Antônio P. Araújo,
- José Maria N. David,
- Fernanda Campos,
- Victor Ströele
International Journal of Web Portals (IJWP-IGI), Volume 9, Issue 2Pages 20–46https://doi.org/10.4018/IJWP.2017070102A scientific software ecosystem aims to integrate all stages of an experiment and its related workflows, in order to solve complex problems. In this vein, in order to assure the experiment proper execution, any modification that occurs must be ...
- articleJanuary 2017
Improving the Domain Independence of Data Provenance Ontologies: A Demonstration Using Conceptual Graphs and the W7 Model
Journal of Database Management (JDBM), Volume 28, Issue 1Pages 43–62https://doi.org/10.4018/JDM.2017010104Provenance is becoming increasingly important as more and more people are using data that they themselves did not generate. In the last decade, significant efforts have been directed toward developing generic, shared data provenance ontologies that ...