Provenance of exposure: Identifying sources of leaked documents

Christian S Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Shulman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We design a provenance system for documents on clouds. The system allows writing documents by several collaborating individuals. Provenance allows recovery of information about the sequence of significant events relevant to the documents. Existing provenance systems focus on editing events, such as creation or removal of document parts. In this work, we introduce provenance of exposure events, allowing identification of one, or more, individuals which are possible sources of the exposure to external source of a particular version of documents. Our design provides a practical solution for provenance of documents via not-fully-trusted cloud systems, with support for provenance of both exposure and editing events.

Original languageEnglish (US)
Title of host publication2013 IEEE Conference on Communications and Network Security, CNS 2013
PublisherIEEE Computer Society
Pages367-368
Number of pages2
ISBN (Print)9781479908950
DOIs
StatePublished - 2013
Event1st IEEE International Conference on Communications and Network Security, CNS 2013 - Washington, DC, United States
Duration: Oct 14 2013Oct 16 2013

Other

Other1st IEEE International Conference on Communications and Network Security, CNS 2013
CountryUnited States
CityWashington, DC
Period10/14/1310/16/13

Fingerprint

Recovery

ASJC Scopus subject areas

  • Computer Networks and Communications

Cite this

Collberg, C. S., Gibson, A., Martin, S., Shinde, N., Herzberg, A., & Shulman, H. (2013). Provenance of exposure: Identifying sources of leaked documents. In 2013 IEEE Conference on Communications and Network Security, CNS 2013 (pp. 367-368). [6682731] IEEE Computer Society. https://doi.org/10.1109/CNS.2013.6682731

Provenance of exposure : Identifying sources of leaked documents. / Collberg, Christian S; Gibson, Aaron; Martin, Sam; Shinde, Nitin; Herzberg, Amir; Shulman, Haya.

2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, 2013. p. 367-368 6682731.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Collberg, CS, Gibson, A, Martin, S, Shinde, N, Herzberg, A & Shulman, H 2013, Provenance of exposure: Identifying sources of leaked documents. in 2013 IEEE Conference on Communications and Network Security, CNS 2013., 6682731, IEEE Computer Society, pp. 367-368, 1st IEEE International Conference on Communications and Network Security, CNS 2013, Washington, DC, United States, 10/14/13. https://doi.org/10.1109/CNS.2013.6682731
Collberg CS, Gibson A, Martin S, Shinde N, Herzberg A, Shulman H. Provenance of exposure: Identifying sources of leaked documents. In 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society. 2013. p. 367-368. 6682731 https://doi.org/10.1109/CNS.2013.6682731
Collberg, Christian S ; Gibson, Aaron ; Martin, Sam ; Shinde, Nitin ; Herzberg, Amir ; Shulman, Haya. / Provenance of exposure : Identifying sources of leaked documents. 2013 IEEE Conference on Communications and Network Security, CNS 2013. IEEE Computer Society, 2013. pp. 367-368
@inproceedings{f97a5e7f01364ddab4c7f93019a749a3,
title = "Provenance of exposure: Identifying sources of leaked documents",
abstract = "We design a provenance system for documents on clouds. The system allows writing documents by several collaborating individuals. Provenance allows recovery of information about the sequence of significant events relevant to the documents. Existing provenance systems focus on editing events, such as creation or removal of document parts. In this work, we introduce provenance of exposure events, allowing identification of one, or more, individuals which are possible sources of the exposure to external source of a particular version of documents. Our design provides a practical solution for provenance of documents via not-fully-trusted cloud systems, with support for provenance of both exposure and editing events.",
author = "Collberg, {Christian S} and Aaron Gibson and Sam Martin and Nitin Shinde and Amir Herzberg and Haya Shulman",
year = "2013",
doi = "10.1109/CNS.2013.6682731",
language = "English (US)",
isbn = "9781479908950",
pages = "367--368",
booktitle = "2013 IEEE Conference on Communications and Network Security, CNS 2013",
publisher = "IEEE Computer Society",

}

TY - GEN

T1 - Provenance of exposure

T2 - Identifying sources of leaked documents

AU - Collberg, Christian S

AU - Gibson, Aaron

AU - Martin, Sam

AU - Shinde, Nitin

AU - Herzberg, Amir

AU - Shulman, Haya

PY - 2013

Y1 - 2013

N2 - We design a provenance system for documents on clouds. The system allows writing documents by several collaborating individuals. Provenance allows recovery of information about the sequence of significant events relevant to the documents. Existing provenance systems focus on editing events, such as creation or removal of document parts. In this work, we introduce provenance of exposure events, allowing identification of one, or more, individuals which are possible sources of the exposure to external source of a particular version of documents. Our design provides a practical solution for provenance of documents via not-fully-trusted cloud systems, with support for provenance of both exposure and editing events.

AB - We design a provenance system for documents on clouds. The system allows writing documents by several collaborating individuals. Provenance allows recovery of information about the sequence of significant events relevant to the documents. Existing provenance systems focus on editing events, such as creation or removal of document parts. In this work, we introduce provenance of exposure events, allowing identification of one, or more, individuals which are possible sources of the exposure to external source of a particular version of documents. Our design provides a practical solution for provenance of documents via not-fully-trusted cloud systems, with support for provenance of both exposure and editing events.

UR - http://www.scopus.com/inward/record.url?scp=84893602413&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84893602413&partnerID=8YFLogxK

U2 - 10.1109/CNS.2013.6682731

DO - 10.1109/CNS.2013.6682731

M3 - Conference contribution

AN - SCOPUS:84893602413

SN - 9781479908950

SP - 367

EP - 368

BT - 2013 IEEE Conference on Communications and Network Security, CNS 2013

PB - IEEE Computer Society

ER -