Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Application Research of Computers》 2013-10
Add to Favorite Get Latest Update

Security provenance model based on OPM

LIU Tong;WANG Feng-ying;School of Computer Science & Technology,Shandong University of Technology;  
Given the significant increase of using provenance,this paper presented a novel security provenance model based on open provenance model to ensure the integrity and confidentiality of provenance.In the study of confidentiality,it used an improved Diffie-Hellman key agreement to negotiate the session key to encrypt the sensitive information.In the study of integrity,it described the derived relations as a set of triples.It expanded the concept of signature-based checksum to make it available to the application of provenance graph.Finally it described the algorithm of integrity verification in the form of Pseudo-code.
【Fund】: 山东省科技发展计划资助项目(2013GGX10116);; 山东省自然科学基金资助项目(ZR2011FL013);; 山东省优秀中青年科学家科研奖励基金资助项目(J13LN274)
【CateGory Index】: TP309
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 3 Hits
1 DAI Chao-fan,WANG Tao,ZHANG Peng-cheng ( Key Laboratory of Science & Technology for National Defense of C4ISR Technology,College of Information System & Management,National University of Defense & Technology,Changsha 410073,China);Survey of data provenance technique[J];Application Research of Computers;2010-09
2 LI Xiu-mei,WANG Feng-ying(School of Computer Science and Technology,Shandong University of Technology,Zibo 255049,China);Research on data provenance′s security model[J];Journal of Shandong University of Technology(Natural Science Edition);2010-04
3 Li Yazi(National Science Library,Chinese Academy of Sciences,Beijing 100080,China)(Graduate University of Chinese Academy of Sciences,Beijing 100049,China);Data Provenance's Annotation Schema and Description Model[J];New Technology of Library and Information Service;2007-07
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 YUE Peng1,PENG Fei-fei1,2,GONG Jian-ya1(1.State Key Laboratory of Information Engineering in Surveying,Mapping & Remote Sensing,Wuhan University,Wuhan 430079;2.Institute of Survey and Mapping of Tianjin,Tianjin 300381,China);Research on SOA-Based Geospatial Data Provenance[J];Geography and Geo-Information Science;2010-03
2 Gong Li1,2,Wang Yongli1,and Zhang Lei1 1(Department of Computer Science and Technology,Nanjing University of Science and Technology,Nanjing 210094) 2(The Chinese people's liberation army 75560 political military troops,Wuzhishan,Hainan 572219);Accurate Updating Materialized Views Based on Labeling Data Lineage[J];Journal of Computer Research and Development;2011-S3
3 DAI Chao-fan,WANG Tao(Science and Technology on Information Systems Engineering Laboratory,College of Information System and Management,National University of Defense Technology,Changsha 410073,China);Data Provenance Tracing System for Extraction-Transform-Load[J];Computer Engineering;2011-17
4 DAI Chao-fan,WANG Tao,ZHANG Peng-cheng ( Key Laboratory of Science & Technology for National Defense of C4ISR Technology,College of Information System & Management,National University of Defense & Technology,Changsha 410073,China);Survey of data provenance technique[J];Application Research of Computers;2010-09
5 XIAO Fei1,2,ZHANG Wei-hua1,WANG Dong-hui1 (1.College of Aerospace & Material Engineering,National University of Defense Technology,Changsha 410073,China;2.Xi'an Communications Institute,Xi'an 710000,China);Overview of workflow technology in scientific process[J];Application Research of Computers;2011-11
6 WANG Yong-li,LIU Jing-chun,YU Zhan-long,FU Chun-yan,DIAO Shu-min(Department of Computer for Public Teaching,Jiamusi University,Jiamusi 154007,China);Multi-Granularity Annotations and Multi-Resolution Compression Algorithm for Sensor Data Provenance[J];Journal of Nantong University(Natural Science Edition);2010-03
7 TANG Yu1,CHEN Hao1,YE Bai-long2(1.School of Information Science and Engineering,Hunan University,Changsha 410082,China;2.School of Civil Engineering and Architecture,Central South University,Changsha 410083,China);Study of Real-time Heterogeneous Data Integration Model Based on Reverse Cleaning[J];Computer Engineering;2012-23
8 YAN Qian-qian,WANG Feng-ying(School of Computer Science and Technology,Shandong University of Technology,Zibo 255091,China);Secure data provenance scheme based on cloud computing[J];Journal of Shandong University of Technology(Natural Science Edition);2011-05
9 LIU Tong,WANG Feng-ying (School of Computer Science and Technology,Shandong University of Technology,Zibo 255091,China);Research on the integrity of data provenance based on Merkle tree[J];Journal of Shandong University of Technology(Natural Science Edition);2012-03
10 Chen Ying1,21(National Science Library,Chinese Academy of Sciences,Beijing 100190,China)2(Graduate University of Chinese Academy of Sciences,Beijing 100049,China);A Data Provenance Model Based on the Double-helical Structure of DNA[J];New Technology of Library and Information Service;2008-10
【Secondary Citations】
Chinese Journal Full-text Database 6 Hits
1 Xu Fei Gao Ji (College of Computer,Zhejiang University,Hangzhou 310027);Implemention of An Common Data Tracing System[J];Computer Engineering and Applications;2003-34
2 WU Bei,WANG Jin-lin,NI Hong,CHEN Jun(Research Center of Digital Signal Processing,Institute of Acoustics,Chinese Academy of Sciences,Beijing 100080);Broadcast Encryption Tree’s Regrowth Method[J];Computer Engineering;2007-22
3 WANG Li-Wei1)HUANG Ze-Qian2)LUO Min2)PENG Zhi-Yong2),3)1)(International School of Software,Wuhan University,Wuhan 430072)2)(State Key Laboratory of Software Engineering,Wuhan University,Wuhan 430072)3)(Computer School,Wuhan University,Wuhan 430072);Data Provenance in a Scientific Workflow Service Framework Integrated with Object Deputy Database[J];Chinese Journal of Computers;2008-05
4 Liu Xiping Wan Changxuan(School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013);Research on Data Provenance An Overview[J];Science Mosaic;2005-01
5 Li Yazi(National Science Library,Chinese Academy of Sciences,Beijing 100080,China)(Graduate University of Chinese Academy of Sciences,Beijing 100049,China);Data Provenance's Annotation Schema and Description Model[J];New Technology of Library and Information Service;2007-07
6 Chen Ying1,21(National Science Library,Chinese Academy of Sciences,Beijing 100190,China)2(Graduate University of Chinese Academy of Sciences,Beijing 100049,China);A Data Provenance Model Based on the Double-helical Structure of DNA[J];New Technology of Library and Information Service;2008-10
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved