Facilitating Trust on Data through Provenance

Research output: Contribution to JournalArticleAcademicpeer-review

Abstract

Research on trusted computing focuses mainly on the security and integrity of the execution environment, from hardware components to software services. However, this is only one facet of the computation, the other being the data. If our goal is to produce trusted results, a trustworthy execution environment is not enough: we also need trustworthy data. Provenance of data plays a pivotal role in ascertaining trustworthiness of data. In our work, we explore how to use state-of-the-art systems techniques to capture and reconstruct provenance, thus enabling us to build trust on both newly generated and existing data. © 2014 Springer International Publishing.
Original languageEnglish
Pages (from-to)220-221
JournalLecture Notes in Computer Science
Volume8564
DOIs
Publication statusPublished - 2014

Fingerprint

Provenance
Hardware
Trusted Computing
Trustworthiness
Facet
Integrity
Trusted computing
Software

Bibliographical note

Proceedings title: 7th International Conference on Trust & Trustworthy Computing (TRUST'14)
ISBN: 978-3-319-08593-7

Cite this

@article{95ad01ee13b147128fefa47c3d93ae43,
title = "Facilitating Trust on Data through Provenance",
abstract = "Research on trusted computing focuses mainly on the security and integrity of the execution environment, from hardware components to software services. However, this is only one facet of the computation, the other being the data. If our goal is to produce trusted results, a trustworthy execution environment is not enough: we also need trustworthy data. Provenance of data plays a pivotal role in ascertaining trustworthiness of data. In our work, we explore how to use state-of-the-art systems techniques to capture and reconstruct provenance, thus enabling us to build trust on both newly generated and existing data. {\circledC} 2014 Springer International Publishing.",
author = "M. Stamatogiannakis and P.T. Groth and H.J. Bos",
note = "Proceedings title: 7th International Conference on Trust & Trustworthy Computing (TRUST'14) ISBN: 978-3-319-08593-7",
year = "2014",
doi = "10.1007/978-3-319-08593-7_21",
language = "English",
volume = "8564",
pages = "220--221",
journal = "Lecture Notes in Computer Science",
issn = "0302-9743",
publisher = "Springer Verlag",

}

Facilitating Trust on Data through Provenance. / Stamatogiannakis, M.; Groth, P.T.; Bos, H.J.

In: Lecture Notes in Computer Science, Vol. 8564, 2014, p. 220-221.

Research output: Contribution to JournalArticleAcademicpeer-review

TY - JOUR

T1 - Facilitating Trust on Data through Provenance

AU - Stamatogiannakis, M.

AU - Groth, P.T.

AU - Bos, H.J.

N1 - Proceedings title: 7th International Conference on Trust & Trustworthy Computing (TRUST'14) ISBN: 978-3-319-08593-7

PY - 2014

Y1 - 2014

N2 - Research on trusted computing focuses mainly on the security and integrity of the execution environment, from hardware components to software services. However, this is only one facet of the computation, the other being the data. If our goal is to produce trusted results, a trustworthy execution environment is not enough: we also need trustworthy data. Provenance of data plays a pivotal role in ascertaining trustworthiness of data. In our work, we explore how to use state-of-the-art systems techniques to capture and reconstruct provenance, thus enabling us to build trust on both newly generated and existing data. © 2014 Springer International Publishing.

AB - Research on trusted computing focuses mainly on the security and integrity of the execution environment, from hardware components to software services. However, this is only one facet of the computation, the other being the data. If our goal is to produce trusted results, a trustworthy execution environment is not enough: we also need trustworthy data. Provenance of data plays a pivotal role in ascertaining trustworthiness of data. In our work, we explore how to use state-of-the-art systems techniques to capture and reconstruct provenance, thus enabling us to build trust on both newly generated and existing data. © 2014 Springer International Publishing.

U2 - 10.1007/978-3-319-08593-7_21

DO - 10.1007/978-3-319-08593-7_21

M3 - Article

VL - 8564

SP - 220

EP - 221

JO - Lecture Notes in Computer Science

JF - Lecture Notes in Computer Science

SN - 0302-9743

ER -