Secure Network Provenance Wenchao Zhou Qiong Fei Arjun Narayan University of Pennsylvania University of Pennsylvania University of Pennsylvania Andreas Haeberlen Boon Thau Loo Micah Sherr University of Pennsylvania University of Pennsylvania / University ABSTRACT On / /
Holiday
Assumption / /
IndustryTerm
corporate networks / database systems / forensic systems / evidence-based distributed query processing / managed systems / blackbox applications / commitment protocol / provenance systems / corporate network / query processor / secure routing protocols / even trusted hardware / tamper-evident query processing / graph construction algorithm / local processing / distributed systems / target applications / /
Organization
University of Pennsylvania University / Georgetown University / Computer Systems Organization / /
Person
Alice Figure / Ai / /
Position
human investigator / Reliability General / Colonel / administrator / forensic investigator / /
Product
SNooPy / a system / Elastic MapReduce service / SNooPy / Elastic MapReduce / nodes / node / vertices / /
ProgrammingLanguage
Datalog / Java / /
ProvinceOrState
California / /
Technology
third router / SNP system / virtual machine / routing protocol / certain router / graph construction algorithm / Java / API / commitment protocol / query processor / system Provenance system Alice The query processor / secure routing protocols / private key / SNP / Operating Systems / five routers / Query processor Query processor / /