Title
Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information
Abstract
Data collaborations allow users to draw upon diverse resources to solve complex problems. While collaborations enable a greater ability to manipulate data and services, they also create new security vulnerabilities. Collaboration participants need methods to detect suspicious behaviors (potentially caused by malicious insiders) and assess trust in information when it passes through many hands. In this work, we describe these challenges and introduce provenance as a way to solve them. We describe a provenance system, PLUS, and show how it can be used to assist in assessing trust and detecting suspicious behaviors. A preliminary study shows this to be a promising direction for future research.
Year
DOI
Venue
2011
10.4108/icst.collaboratecom.2011.247131
Collaborative Computing: Networking, Applications and Worksharing
Keywords
Field
DocType
groupware,security of data,trusted computing,PLUS,data collaboration,information security,malicious insiders,security vulnerabilities,suspicious behavior detection,trust assessment,insider threat,lineage,pedigree,provenance,trust
Trusted Computing,Computer science,Computer security,Collaborative software,Insider threat,Vulnerability,Complex problems
Conference
ISSN
ISBN
Citations 
2310-9807
978-1-936968-32-9
7
PageRank 
References 
Authors
0.62
17
4
Name
Order
Citations
PageRank
M. David Allen1807.42
Adriane Chapman238227.65
Seligman, L.3171.33
Barbara T. Blaustein4233212.57