Back to Results
First PageMeta Content
Connectivity / Combinatorics / Reachability / Graph / Tree / Theoretical computer science / Search algorithms / Graph theory / Mathematics / Graph connectivity


Secure Network Provenance Wenchao Zhou Qiong Fei Arjun Narayan
Add to Reading List

Document Date: 2011-10-08 18:41:08


Open Document

File Size: 1,49 MB

Share Result on Facebook

Company

ComputerCommunication Networks / Amazon / Akamai / /

Event

Reorganization / Product Issues / /

Facility

Secure Network Provenance Wenchao Zhou Qiong Fei Arjun Narayan University of Pennsylvania University of Pennsylvania University of Pennsylvania Andreas Haeberlen Boon Thau Loo Micah Sherr University of Pennsylvania University of Pennsylvania / University ABSTRACT On / /

Holiday

Assumption / /

IndustryTerm

corporate networks / database systems / forensic systems / evidence-based distributed query processing / managed systems / blackbox applications / commitment protocol / provenance systems / corporate network / query processor / secure routing protocols / even trusted hardware / tamper-evident query processing / graph construction algorithm / local processing / distributed systems / target applications / /

Organization

University of Pennsylvania University / Georgetown University / Computer Systems Organization / /

Person

Alice Figure / Ai / /

Position

human investigator / Reliability General / Colonel / administrator / forensic investigator / /

Product

SNooPy / a system / Elastic MapReduce service / SNooPy / Elastic MapReduce / nodes / node / vertices / /

ProgrammingLanguage

Datalog / Java / /

ProvinceOrState

California / /

Technology

third router / SNP system / virtual machine / routing protocol / certain router / graph construction algorithm / Java / API / commitment protocol / query processor / system Provenance system Alice The query processor / secure routing protocols / private key / SNP / Operating Systems / five routers / Query processor Query processor / /

SocialTag