Runtime Analysis of Whole-System Provenance

Runtime Analysis of Whole-System Provenance

Association for Computing Machinery (ACM) via YouTube Direct link

Intro

1 of 16

1 of 16

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Runtime Analysis of Whole-System Provenance

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Provenance in science
  3. 3 Provenance-based security - Forensic
  4. 4 Objectives
  5. 5 Provenance graph
  6. 6 Whole-system provenance
  7. 7 Overcoming limitation for runtime analysis
  8. 8 Change to provenance architecture
  9. 9 Programming framework
  10. 10 Graph structure guarantees
  11. 11 Need for ordering guarantees
  12. 12 Workloads (in-kernel)
  13. 13 Micro-benchmark (kernel-query)
  14. 14 Macro-benchmark (in kernel)
  15. 15 Workloads (userspace)
  16. 16 Take away

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.