{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:45:49Z","timestamp":1725666349487},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/pst.2016.7906960","type":"proceedings-article","created":{"date-parts":[[2017,4,24]],"date-time":"2017-04-24T17:12:50Z","timestamp":1493053970000},"page":"384-387","source":"Crossref","is-referenced-by-count":2,"title":["Provenance threat modeling"],"prefix":"10.1109","author":[{"given":"Oluwakemi","family":"Hambolu","sequence":"first","affiliation":[]},{"given":"Lu","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Jon","family":"Oakley","sequence":"additional","affiliation":[]},{"given":"R.R.","family":"Brooks","sequence":"additional","affiliation":[]},{"given":"Ujan","family":"Mukhopadhyay","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Skjellum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/374308.375358"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-002-0083-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecurity.2012.17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2015.65"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2011.26"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2012.6297930"},{"key":"ref16","article-title":"Protecting the past and present of data, with applications in provenance and regulatory-compliant databases","author":"hasan","year":"0","journal-title":"Proceedings of the Third SIGMOD PhD Workshop on Innovative Database Research(IDAR 2009)"},{"journal-title":"Network and Internetwork Security Principles and Practice Upper Saddle River","year":"1995","author":"stallings","key":"ref17"},{"article-title":"A common language for computer security incidents","year":"1998","author":"howard","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1201\/9781420038880"},{"article-title":"Karma provenance collection tool","year":"2012","author":"simmhan","key":"ref4"},{"key":"ref3","article-title":"Prov model primer","author":"gil","year":"2012","journal-title":"Tech Rep"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057978"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5334\/jors.bq"},{"key":"ref8","article-title":"A survey of data provenance techniques","author":"simmhan","year":"0","journal-title":"Computer Science Department&#x2019; Indiana University Tech Rep 612 2005 extended version of SIGMOD Record 2005"},{"key":"ref7","first-page":"227","article-title":"Data Provenance: A Categorization of Existing Approaches","author":"glavic","year":"2007","journal-title":"Proceedings of the 12th GI Conference on Datenbanksysteme in Business Technologie und Web (BTW)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.07.005"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"ref20","article-title":"Application threat modeling","author":"caso","year":"2006","journal-title":"11\/493 214"},{"year":"2016","key":"ref22","article-title":"Cryptography digital signatures"},{"key":"ref21","article-title":"Unauthorized access - threats, risk, and control","author":"hau","year":"2003","journal-title":"GSEC Practical Assignment Version 1 4b Option 1"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system","year":"0","author":"nakamoto","key":"ref24"},{"article-title":"Implementing security access control (sac)","year":"2016","author":"ambler","key":"ref23"}],"event":{"name":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2016,12,12]]},"location":"Auckland, New Zealand","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 14th Annual Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7899233\/7906913\/07906960.pdf?arnumber=7906960","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,15]],"date-time":"2017-05-15T16:06:25Z","timestamp":1494864385000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7906960\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/pst.2016.7906960","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}