Skip to content

Publications

Hasanat Kazmi edited this page Jun 8, 2015 · 18 revisions
  • Ashish Gehani and Dawood Tariq, Provenance-Only Integration, 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2014. [PDF]

  • Scott Moore, Ashish Gehani, and Natarajan Shankar, Declaratively Processing Provenance Metadata, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]

  • Nathaniel Husted, Sharjeel Qureshi, Dawood Tariq, and Ashish Gehani, Android Provenance: Diagnosing Device Disorders, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]

  • Hasnain Lakhani, Rashid Tahir, Azeem Aqil, Fareed Zaffar, Dawood Tariq, and Ashish Gehani, Optimized Rollback and Re-computation, 46th IEEE Hawaii International Conference on Systems Science (HICSS), IEEE Computer Society, 2013. [PDF]

  • Tanu Malik, Ashish Gehani, Dawood Tariq, and Fareed Zaffar, Sketching Distributed Data Provenance, Data Provenance and Data Management for eScience, Studies in Computational Intelligence, Vol. 426, 2013. [PDF]

  • Ashish Gehani and Dawood Tariq, SPADE: Support for Provenance Auditing in Distributed Environments, 13th ACM/IFIP/USENIX International Conference on Middleware, 2012. [PDF]

  • Dawood Tariq, Maisem Ali, and Ashish Gehani, Towards Automated Collection of Application-Level Data Provenance, 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 23rd USENIX Annual Technical Conference (ATC), 2012. [PDF]

  • Ashish Gehani, Dawood Tariq, Basim Baig, and Tanu Malik, Policy-Based Integration of Provenance Metadata, 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011. [PDF]

  • Dawood Tariq, Basim Baig, Ashish Gehani, Salman Mahmood, Rashid Tahir, Azeem Aqil, and Fareed Zaffar, Identifying the Provenance of Correlated Anomalies, 26th ACM Symposium on Applied Computing (SAC), 2011. [PDF]

  • Tanu Malik, Ligia Nistor, and Ashish Gehani, Tracking and Sketching Distributed Data Provenance, 6th IEEE International Conference on e-Science, 2010. [PDF]
  • Ashish Gehani, Basim Baig, Salman Mahmood, Dawood Tariq, and Fareed Zaffar, Fine-Grained Tracking of Grid Infections, 11th ACM/IEEE International Conference on Grid Computing (GRID), 2010. [PDF]

  • Ashish Gehani and Minyoung Kim, Mendel: Efficiently Verifying the Lineage of Data Modified in Multiple Trust Domains, 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]

  • Ashish Gehani, Minyoung Kim, and Tanu Malik, Efficient Querying of Distributed Provenance Stores, 8th Workshop on the Challenges of Large Applications in Distributed Environments (CLADE) affiliated with the 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]

  • Ashish Gehani, Minyoung Kim, and Jian Zhang, Steps Toward Managing Lineage Metadata in Grid Clusters, 1st Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 7th USENIX Conference on File and Storage Technologies (FAST), 2009. [PDF]

  • Ashish Gehani, Florent Kirchner, and Natarajan Shankar, System Support for Forensic Inference, Advances in Digital Forensics V, Springer, Vol. 306, 2009. [PDF]

  • Ashish Gehani and Ulf Lindqvist, Bonsai: Balanced Lineage Authentication, 23rd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2007. [PDF]

  • Ashish Gehani and Ulf Lindqvist, VEIL: A System for Certifying Video Provenance, 9th IEEE International Symposium on Multimedia (ISM), 2007. [http://www.csl.sri.com/users/gehani/papers/ISM-2007.VEIL.pdf [PDF]]


This material is based upon work supported by the National Science Foundation under Grants OCI-07220681 and IIS-11164142. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.

1 NSF Grant 0722068: Scalable Authentication of Grid Data Provenance, PI: Ashish Gehani

2 NSF Grant 1116414: Scalable Integration and Analysis of the Provenance of Diverse Scientific Data, PI: Ashish Gehani

Clone this wiki locally