Secure provenance: The essential of bread and butter of data forensics in cloud computing

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
Pages282-292
Number of pages11
DOIs
StatePublished - 2010
Event5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010 - Beijing, China
Duration: Apr 13 2010Apr 16 2010

Publication series

NameProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010

Conference

Conference5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Country/TerritoryChina
CityBeijing
Period4/13/104/16/10

ASJC Scopus Subject Areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Keywords

  • cloud computing
  • data forensics
  • privacy
  • provable security
  • secure provenance
  • standard model

Fingerprint

Dive into the research topics of 'Secure provenance: The essential of bread and butter of data forensics in cloud computing'. Together they form a unique fingerprint.

Cite this