عنوان فارسی مقاله: | ایمنی و پاسخگویی داده ها در سیستم های توزیعی: بررسی مقوله منشا |
عنوان انگلیسی مقاله: | Security and Data Accountability in Distributed Systems: A Provenance Survey |
چکیده
1. مقدمه
2. تحقیقات مرتبط
3. مقوله منشأ در سیستمهای توزیع یافته
الف. لایه سیستم
ب. لایه شبکه
ج. لایه کاربردی
4. ملزومات یک چارچوب منشأ
الف. ملزومات سیستمهای منشأ
ردیابی در میزبان
دکاپلینگ
چند گرانولاریته
مکانیسمهای ایمنی
رابطی برای آنالیز
ب. ایمنسازی منشأ
محرمانه بودن
اطمینان از دست نخوردن محتوا/انسجام
صحت
مجموعه موثق
5. چالشهای پیشرو
ردیابی منشأ خارج از سیستم
محرمانه بودن و آنالیز
6. نتیجهگیری
کلمات کلیدی :
Towards an Analysis of Data Accountability and Auditing for Secure ... www.sciencedirect.com/science/article/pii/S187705091500602X by J Prassanna - 2015 - Related articles May 8, 2015 - In the design of such secure cloud system it may incorporate formulated ... To build the trust on a cloud the distributed data accountability ... Security and Privacy | Computer Science Research at Max Planck ... https://www.cis.mpg.de/security-and-privacy/ Topics of study include formal analysis of security properties; anonymity ... and Web advertising; and accountability in distributed systems, to name just a few. ... to enforce data protection policies across multiple system infrastructure layers, ... A survey of accountability in computer networks and distributed systems dl.acm.org/citation.cfm?id=2906135 by Z Xiao - 2016 - Cited by 13 - Related articles Mar 10, 2016 - A survey of accountability in computer networks and distributed systems ... Security in computer systems has been a major concern since the very ..... International Conference on Management of Data, 2006; pp.27-29. 75. Accountability in distributed systems | NETS - Networked & Social ... www.nets.upenn.edu/warren-research-center/accountability-distributed-systems The goal is to combine compositional, database-style declarative computation with constraints on timing, security, distribution, and actuation in a seamless way. Accountability for Distributed Systems peerreview.mpi-sws.org/ Imagine a large-scale distributed system, like the Internet's routing ... Secure logging: We must make sure that we have enough information to detect the fault, ... 1 2 3 4 5 6 7 8 9 10 Next