{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T23:54:54Z","timestamp":1772063694652,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-0812270CNS-0845552CNS-1040672CNS-1054229CNS-1064986CNS-1065130"],"award-info":[{"award-number":["IIS-0812270CNS-0845552CNS-1040672CNS-1054229CNS-1064986CNS-1065130"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-11-C-4020"],"award-info":[{"award-number":["N66001-11-C-4020"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["IIS-0812270CNS-0845552CNS-1040672CNS-1054229CNS-1064986CNS-1065130"],"award-info":[{"award-number":["IIS-0812270CNS-0845552CNS-1040672CNS-1054229CNS-1064986CNS-1065130"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","award":["FA9550-08-1-0352"],"award-info":[{"award-number":["FA9550-08-1-0352"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043584","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"295-310","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":93,"title":["Secure network provenance"],"prefix":"10.1145","author":[{"given":"Wenchao","family":"Zhou","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Qiong","family":"Fei","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Arjun","family":"Narayan","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Andreas","family":"Haeberlen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Boon Thau","family":"Loo","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Micah","family":"Sherr","sequence":"additional","affiliation":[{"name":"Georgetown University"}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. USENIX Symposium on Operating System Design and Implementation (OSDI)","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using Magpie for request extraction and workload modelling . In Proc. USENIX Symposium on Operating System Design and Implementation (OSDI) , Dec. 2004 . P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using Magpie for request extraction and workload modelling. In Proc. USENIX Symposium on Operating System Design and Implementation (OSDI), Dec. 2004."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142574"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945459"},{"key":"e_1_3_2_1_9_1","volume-title":"Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI)","author":"Geels D.","year":"2007","unstructured":"D. Geels , G. Altekar , P. Maniatis , T. Roscoe , and I. Stoica . Friday: Global comprehension for distributed replay . In Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI) , Apr. 2007 . D. Geels, G. Altekar, P. Maniatis, T. Roscoe, and I. Stoica. Friday: Global comprehension for distributed replay. In Proc. USENIX Symp. on Networked Systems Design and Implementation (NSDI), Apr. 2007."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. International Conference on Very Large Data Bases (VLDB)","author":"Green T. J.","year":"2007","unstructured":"T. J. Green , G. Karvounarakis , Z. G. Ives , and V. Tannen . Update exchange with mappings and provenance . In Proc. International Conference on Very Large Data Bases (VLDB) , Sept. 2007 . T. J. Green, G. Karvounarakis, Z. G. Ives, and V. Tannen. Update exchange with mappings and provenance. In Proc. International Conference on Very Large Data Bases (VLDB), Sept. 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"key":"e_1_3_2_1_12_1","unstructured":"Hadoop. http:\/\/hadoop.apache.org\/.  Hadoop. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_13_1","volume-title":"Proc. USENIX Symposium on Operating System Design and Implementation (OSDI)","author":"Haeberlen A.","year":"2010","unstructured":"A. Haeberlen , P. Aditya , R. Rodrigues , and P. Druschel . Accountable virtual machines . In Proc. USENIX Symposium on Operating System Design and Implementation (OSDI) , Oct. 2010 . A. Haeberlen, P. Aditya, R. Rodrigues, and P. Druschel. Accountable virtual machines. In Proc. USENIX Symposium on Operating System Design and Implementation (OSDI), Oct. 2010."},{"key":"e_1_3_2_1_14_1","volume-title":"Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Haeberlen A.","year":"2009","unstructured":"A. Haeberlen , I. Avramopoulos , J. Rexford , and P. Druschel . NetReview: Detecting when interdomain routing goes wrong . In Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI) , Apr. 2009 . A. Haeberlen, I. Avramopoulos, J. Rexford, and P. Druschel. NetReview: Detecting when interdomain routing goes wrong. In Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2009."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10877-8_10"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. Workshop on Hot Topics in System Dependability (HotDep)","author":"Haeberlen A.","year":"2006","unstructured":"A. Haeberlen , P. Kuznetsov , and P. Druschel . The case for Byzantine fault detection . In Proc. Workshop on Hot Topics in System Dependability (HotDep) , Nov. 2006 . A. Haeberlen, P. Kuznetsov, and P. Druschel. The case for Byzantine fault detection. In Proc. Workshop on Hot Topics in System Dependability (HotDep), Nov. 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629080.1629082"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. Conference on Innovative Data Systems Research (CIDR)","author":"Ikeda R.","year":"2011","unstructured":"R. Ikeda , H. Park , and J. Widom . Provenance for generalized map and reduce workflows . In Proc. Conference on Innovative Data Systems Research (CIDR) , Jan. 2011 . R. Ikeda, H. Park, and J. Widom. Provenance for generalized map and reduce workflows. In Proc. Conference on Innovative Data Systems Research (CIDR), Jan. 2011."},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. 16th USENIX Security Symposium","author":"Kauer B.","year":"2007","unstructured":"B. Kauer . OSLO : Improving the security of Trusted Computing . In Proc. 16th USENIX Security Symposium , Aug 2007 . B. Kauer. OSLO: Improving the security of Trusted Computing. In Proc. 16th USENIX Security Symposium, Aug 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047915.1047918"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. Annual Network and Distributed Systems Security Symposium (NDSS)","author":"King S. T.","year":"2005","unstructured":"S. T. King , Z. M. Mao , D. Lucchetti , and P. Chen . Enriching intrusion alerts through multi-host causality . In Proc. Annual Network and Distributed Systems Security Symposium (NDSS) , Feb. 2005 . S. T. King, Z. M. Mao, D. Lucchetti, and P. Chen. Enriching intrusion alerts through multi-host causality. In Proc. Annual Network and Distributed Systems Security Symposium (NDSS), Feb. 2005."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658357.1658358"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Liu X.","year":"2008","unstructured":"X. Liu , Z. Guo , X. Wang , F. Chen , X. Lian , J. Tang , M. Wu , M. F. Kaashoek , and Z. Zhang . D3S: debugging deployed distributed systems . In Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI) , Apr. 2008 . X. Liu, Z. Guo, X. Wang, F. Chen, X. Lian, J. Tang, M. Wu, M. F. Kaashoek, and Z. Zhang. D3S: debugging deployed distributed systems. In Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), Apr. 2008."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592785"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP)","author":"McDaniel P.","year":"2010","unstructured":"P. McDaniel , K. Butler , S. McLaughlin , R. Sion , E. Zadok , and M. Winslett . Towards a Secure and Efficient System for End-to-End Provenance . In Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP) , Feb. 2010 . P. McDaniel, K. Butler, S. McLaughlin, R. Sion, E. Zadok, and M. Winslett. Towards a Secure and Efficient System for End-to-End Provenance. In Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP), Feb. 2010."},{"key":"e_1_3_2_1_28_1","volume-title":"Proc. International Conference on Very Large Data Bases (VLDB)","author":"Meliou A.","year":"2011","unstructured":"A. Meliou , W. Gatterbauer , K. M. Moore , and D. Suciu . The complexity of causality and responsibility for query answers and non-answers . In Proc. International Conference on Very Large Data Bases (VLDB) , Aug. 2011 . A. Meliou, W. Gatterbauer, K. M. Moore, and D. Suciu. The complexity of causality and responsibility for query answers and non-answers. In Proc. International Conference on Very Large Data Bases (VLDB), Aug. 2011."},{"key":"e_1_3_2_1_29_1","volume-title":"Proc. USENIX Annual Technical Conference","author":"Muniswamy-Reddy K.-K.","year":"2006","unstructured":"K.-K. Muniswamy-Reddy , D. A. Holland , U. Braun , and M. Seltzer . Provenance-aware storage systems . In Proc. USENIX Annual Technical Conference , 2006 . K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. Seltzer. Provenance-aware storage systems. In Proc. USENIX Annual Technical Conference, 2006."},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. Annual Network and Distributed Systems Security Symposium (NDSS)","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software . In Proc. Annual Network and Distributed Systems Security Symposium (NDSS) , Feb. 2005 . J. Newsome and D. Song. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In Proc. Annual Network and Distributed Systems Security Symposium (NDSS), Feb. 2005."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_14"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997152"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810085.1810114"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330332.1330337"},{"key":"e_1_3_2_1_35_1","unstructured":"Quagga Routing Suite. http:\/\/www.quagga.net\/.  Quagga Routing Suite. http:\/\/www.quagga.net\/."},{"key":"e_1_3_2_1_37_1","unstructured":"RapidNet. http:\/\/netdb.cis.upenn.edu\/rapidnet\/.  RapidNet. http:\/\/netdb.cis.upenn.edu\/rapidnet\/."},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Reynolds P.","year":"2006","unstructured":"P. Reynolds , C. Killian , J. L. Wiener , J. C. Mogul , M. A. Shah , and A. Vahdat . Pip: Detecting the unexpected in distributed systems . In Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI) , May 2006 . P. Reynolds, C. Killian, J. L. Wiener, J. C. Mogul, M. A. Shah, and A. Vahdat. Pip: Detecting the unexpected in distributed systems. In Proc. USENIX Symposium on Networked Systems Design and Implementation (NSDI), May 2006."},{"key":"e_1_3_2_1_39_1","unstructured":"RouteViews project. http:\/\/www.routeviews.org\/.  RouteViews project. http:\/\/www.routeviews.org\/."},{"key":"e_1_3_2_1_40_1","unstructured":"Secure BGP. http:\/\/www.ir.bbn.com\/sbgp\/.  Secure BGP. http:\/\/www.ir.bbn.com\/sbgp\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45215-7_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133572.1133613"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217973"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016687.1016704"},{"key":"e_1_3_2_1_45_1","unstructured":"Vistrails. http:\/\/www.vistrails.org\/.  Vistrails. http:\/\/www.vistrails.org\/."},{"key":"e_1_3_2_1_46_1","unstructured":"The Stanford WebBase Project. http:\/\/diglib.stanford.edu\/~testbed\/doc2\/WebBase\/.  The Stanford WebBase Project. http:\/\/diglib.stanford.edu\/~testbed\/doc2\/WebBase\/."},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. Conference on Innovative Data Systems Research (CIDR)","author":"Widom J.","year":"2005","unstructured":"J. Widom . Trio : A system for integrated management of data, accuracy, and lineage . In Proc. Conference on Innovative Data Systems Research (CIDR) , Jan. 2005 . J. Widom. Trio: A system for integrated management of data, accuracy, and lineage. In Proc. Conference on Innovative Data Systems Research (CIDR), Jan. 2005."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2006.320197"},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP)","author":"Zhou W.","year":"2011","unstructured":"W. Zhou , L. Ding , A. Haeberlen , Z. Ives , and B. T. Loo . TAP: Time-aware provenance for distributed systems . In Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP) , June 2011 . W. Zhou, L. Ding, A. Haeberlen, Z. Ives, and B. T. Loo. TAP: Time-aware provenance for distributed systems. In Proc. USENIX Workshop on the Theory and Practice of Provenance (TaPP), June 2011."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807234"}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","location":"Cascais Portugal","acronym":"SOSP '11","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043584","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043584"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":48,"alternative-id":["10.1145\/2043556.2043584","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043584","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}