{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:32:23Z","timestamp":1725687143077},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_9","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T12:20:29Z","timestamp":1338898829000},"page":"103-114","source":"Crossref","is-referenced-by-count":8,"title":["Towards a Universal Data Provenance Framework Using Dynamic Instrumentation"],"prefix":"10.1007","author":[{"given":"Eleni","family":"Gessiou","sequence":"first","affiliation":[]},{"given":"Vasilis","family":"Pappas","sequence":"additional","affiliation":[]},{"given":"Elias","family":"Athanasopoulos","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]},{"given":"Sotiris","family":"Ioannidis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Sqlite, \n                    \n                      http:\/\/www.sqlite.org\/"},{"key":"9_CR2","unstructured":"Aho, A.V., Kernighan, B.W., Weinberger, P.J.: The AWK Programming Language. Addison-Wesley (1988)"},{"key":"9_CR3","unstructured":"Apple. dtrace(1) Mac OS X Manual Page, \n                    \n                      http:\/\/developer.apple.com\/mac\/library\/documentation\/Darwin\/Reference\/ManPages\/man1\/dtrace.1.html"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1145\/1247480.1247646","volume-title":"Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, SIGMOD 2007","author":"P. Buneman","year":"2007","unstructured":"Buneman, P., Tan, W.-C.: Provenance in databases. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, SIGMOD 2007, pp. 1171\u20131173. ACM, New York (2007)"},{"key":"9_CR5","unstructured":"Cantrill, B.M., Shapiro, M.W., Leventhal, A.H.: Dynamic instrumentation of production systems. In: Proceedings of the USENIX Annual Technical Conference (ATC), pp. 15\u201328 (2004)"},{"issue":"4","key":"9_CR6","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1561\/1900000006","volume":"1","author":"J. Cheney","year":"2007","unstructured":"Cheney, J., Chiticariu, L., Tan, W.-C.: Provenance in Databases: Why, How, and Where. Foundations and Trends in Databases\u00a01(4), 379\u2013474 (2007)","journal-title":"Foundations and Trends in Databases"},{"key":"9_CR7","first-page":"10","volume-title":"Proceedings of the 4th USENIX Conference on Hot Topics in Security, HotSec 2009","author":"B. Demsky","year":"2009","unstructured":"Demsky, B.: Garm: cross application data provenance and policy enforcement. In: Proceedings of the 4th USENIX Conference on Hot Topics in Security, HotSec 2009, p. 10. USENIX Association, Berkeley (2009)"},{"key":"9_CR8","unstructured":"Dietz, M., Shekhar, S., Pisetsky, Y., Shu, A., Wallach, D.S.: Quire: Lightweight provenance for smart phone operating systems. In: Proceedings of the 20th USENIX Security Symposium, San Francisco, CA (August 2011)"},{"key":"9_CR9","unstructured":"FreeBSD. DTrace \u2013 FreeBSD Wiki, \n                    \n                      http:\/\/wiki.freebsd.org\/DTrace"},{"key":"9_CR10","unstructured":"Jones, S., Strong, C., Long, D.D.E., Miller, E.L.: Tracking emigrant data via transient provenance. In: Proceedings of the 3rd USENIX Workshop on the Theory and Practice of Provenance (TaPP 2011), Heraklion, Greece (June 2011)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Kemerlis, V.P., Pappas, V., Portokalidis, G., Keromytis, A.D.: iLeak: A lightweight system for detecting inadvertent information leaks. In: Proceedings of the 6th European Conference on Computer Network Defense (EC2ND), Berlin, Germany, pp. 21\u201328 (October 2010)","DOI":"10.1109\/EC2ND.2010.13"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Kemerlis, V.P., Portokalidis, G., Jee, K., Keromytis, A.D.: libdft: Practical dynamic data flow tracking for commodity systems. In: Proceedings of the 8th ACM SIGPLAN\/SIGOPS International Conference on Virtual Execution Environments (VEE), London, UK (March 2012)","DOI":"10.1145\/2151024.2151042"},{"issue":"1","key":"9_CR13","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MIC.2011.9","volume":"15","author":"G.T. Lakshmanan","year":"2011","unstructured":"Lakshmanan, G.T., Curbera, F., Freire, J., Sheth, A.: Guest editors\u2019 introduction: Provenance in web applications. IEEE Internet Computing\u00a015(1), 17\u201321 (2011)","journal-title":"IEEE Internet Computing"},{"key":"9_CR14","unstructured":"Linux, O.: Trying out dtrace, \n                    \n                      http:\/\/blogs.oracle.com\/wim\/entry\/trying_out_dtrace"},{"key":"9_CR15","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1145\/1065010.1065034","volume-title":"Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005","author":"C.-K. Luk","year":"2005","unstructured":"Luk, C.-K., Cohn, R., Muth, R., Patil, H., Klauser, A., Lowney, G., Wallace, S., Reddi, V.J., Hazelwood, K.: Pin: building customized program analysis tools with dynamic instrumentation. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005, pp. 190\u2013200. ACM, New York (2005)"},{"key":"9_CR16","first-page":"1","volume-title":"Proceedings of the First Workshop on on Theory and Practice of Provenance","author":"D.W. Margo","year":"2009","unstructured":"Margo, D.W., Seltzer, M.: The case for browser provenance. In: Proceedings of the First Workshop on on Theory and Practice of Provenance, pp. 9:1\u20139:5. USENIX Association, Berkeley (2009)"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-642-17819-1_30","volume-title":"Provenance and Annotation of Data and Processes","author":"J.R. Michaelis","year":"2010","unstructured":"Michaelis, J.R., McGuinness, D.L.: Towards Provenance Aware Comment Tracking for Web Applications. In: McGuinness, D.L., Michaelis, J.R., Moreau, L. (eds.) IPAW 2010. LNCS, vol.\u00a06378, pp. 265\u2013273. Springer, Heidelberg (2010)"},{"key":"9_CR18","first-page":"4","volume-title":"Proceedings of the Annual Conference on USENIX 2006 Annual Technical Conference","author":"K.-K. Muniswamy-Reddy","year":"2006","unstructured":"Muniswamy-Reddy, K.-K., Holland, D.A., Braun, U., Seltzer, M.: Provenance-aware storage systems. In: Proceedings of the Annual Conference on USENIX 2006 Annual Technical Conference, p. 4. USENIX Association, Berkeley (2006)"},{"key":"9_CR19","first-page":"14","volume-title":"Proceedings of the 8th USENIX Conference on File and Storage Technologies, FAST 2010","author":"K.-K. Muniswamy-Reddy","year":"2010","unstructured":"Muniswamy-Reddy, K.-K., Macko, P., Seltzer, M.: Provenance for the cloud. In: Proceedings of the 8th USENIX Conference on File and Storage Technologies, FAST 2010, pp. 14\u201315. USENIX Association, Berkeley (2010)"},{"key":"9_CR20","unstructured":"QNX. The community portal for qnx software developers, \n                    \n                      http:\/\/community.qnx.com\/sf\/projects\/dtrace\/"},{"key":"9_CR21","first-page":"1","volume-title":"Proceedings of the First Workshop on Theory and Practice of Provenance","author":"R. Spillane","year":"2009","unstructured":"Spillane, R., Sears, R., Yalamanchili, C., Gaikwad, S., Chinni, M., Zadok, E.: Story book: an efficient extensible provenance framework. In: Proceedings of the First Workshop on Theory and Practice of Provenance, pp. 1\u201310. USENIX Association, Berkeley (2009)"},{"key":"9_CR22","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MIC.2010.127","volume":"15","author":"Y. Theoharis","year":"2011","unstructured":"Theoharis, Y., Fundulaki, I., Karvounarakis, G., Christophides, V.: On provenance of queries on semantic web data. IEEE Internet Computing\u00a015, 31\u201339 (2011)","journal-title":"IEEE Internet Computing"},{"key":"9_CR23","unstructured":"Viega, J., Messier, M., Chandra, P.: Network security with OpenSSL. O\u2019Reilly Media (2002)"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:39:51Z","timestamp":1620113991000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_9","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}