Skip to content

Publications

Ashish Gehani edited this page Dec 16, 2018 · 11 revisions
  • Raza Ahmad, Melanie Bru, and Ashish Gehani, Streaming Provenance Compression, Provenance and Annotation of Data and Processes, Lecture Notes in Computer Science, Vol. 11017, Springer, 2018. [PDF]

  • Sheung Chi Chan, Ashish Gehani, James Cheney, Ripduman Sohan, and Hassaan Irshad, Expressiveness Benchmarking for System-Level Provenance, 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2017. [PDF]

  • Ashish Gehani, Hasanat Kazmi, and Hassaan Irshad, Scaling SPADE to "Big Provenance", 8th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2016. [PDF]

  • Manolis Stamatogiannakis, Hasanat Kazmi, Hashim Sharif, Remco Vermeulen, Ashish Gehani, Herbert Bos, and Paul Groth, Tradeoffs in Automatic Provenance Capture, 6th International Provenance and Annotation Workshop (IPAW), 2016. [PDF]

  • Chao Yang, Guangliang Yang, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, and Guofei Gu, Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps, 11th International Conference on Security and Privacy in Communication Networks (SecureComm), 2015. [PDF]

  • Ashish Gehani and Dawood Tariq, Provenance-Only Integration, 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP), 2014. [PDF]

  • Scott Moore, Ashish Gehani, and Natarajan Shankar, Declaratively Processing Provenance Metadata, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]

  • Nathaniel Husted, Sharjeel Qureshi, Dawood Tariq, and Ashish Gehani, Android Provenance: Diagnosing Device Disorders, 5th USENIX Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2013. [PDF]

  • Ashish Gehani and Dawood Tariq, Cross-Platform Provenance, 1st Provenance Benchmark Challenge (ProvBench) affiliated with the 16th International Conference on Extending Database Technology (EDBT) and 16th International Conference on Database Theory (ICDT), 2013. [PDF]

  • Hasnain Lakhani, Rashid Tahir, Azeem Aqil, Fareed Zaffar, Dawood Tariq, and Ashish Gehani, Optimized Rollback and Re-computation, 46th IEEE Hawaii International Conference on Systems Science (HICSS), IEEE Computer Society, 2013. [PDF]

  • Tanu Malik, Ashish Gehani, Dawood Tariq, and Fareed Zaffar, Sketching Distributed Data Provenance, Data Provenance and Data Management for eScience, Studies in Computational Intelligence, Vol. 426, Springer, 2013. [PDF]

  • Ashish Gehani and Dawood Tariq, SPADE: Support for Provenance Auditing in Distributed Environments, 13th ACM/IFIP/USENIX International Conference on Middleware, 2012. [PDF]

  • Dawood Tariq, Maisem Ali, and Ashish Gehani, Towards Automated Collection of Application-Level Data Provenance, 4th USENIX Workshop on the Theory and Practice of Provenance (TaPP), affiliated with the 23rd USENIX Annual Technical Conference (ATC), 2012. [PDF]

  • Ashish Gehani, Dawood Tariq, Basim Baig, and Tanu Malik, Policy-Based Integration of Provenance Metadata, 12th IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), 2011. [PDF]


Note: The papers above use SPADEv2, while those below use SPADEv1 or its predecessors.


  • Dawood Tariq, Basim Baig, Ashish Gehani, Salman Mahmood, Rashid Tahir, Azeem Aqil, and Fareed Zaffar, Identifying the Provenance of Correlated Anomalies, 26th ACM Symposium on Applied Computing (SAC), 2011. [PDF]

  • Tanu Malik, Ligia Nistor, and Ashish Gehani, Tracking and Sketching Distributed Data Provenance, 6th IEEE International Conference on e-Science, 2010. [PDF]

  • Ashish Gehani, Basim Baig, Salman Mahmood, Dawood Tariq, and Fareed Zaffar, Fine-Grained Tracking of Grid Infections, 11th ACM/IEEE International Conference on Grid Computing (GRID), 2010. [PDF]

  • Ashish Gehani and Minyoung Kim, Mendel: Efficiently Verifying the Lineage of Data Modified in Multiple Trust Domains, 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]

  • Ashish Gehani, Minyoung Kim, and Tanu Malik, Efficient Querying of Distributed Provenance Stores, 8th Workshop on the Challenges of Large Applications in Distributed Environments (CLADE) affiliated with the 19th ACM International Symposium on High Performance Distributed Computing (HPDC), 2010. [PDF]

  • Ashish Gehani, Minyoung Kim, and Jian Zhang, Steps Toward Managing Lineage Metadata in Grid Clusters, 1st Workshop on the Theory and Practice of Provenance (TaPP) affiliated with the 7th USENIX Conference on File and Storage Technologies (FAST), 2009. [PDF]

  • Ashish Gehani, Florent Kirchner, and Natarajan Shankar, System Support for Forensic Inference, Advances in Digital Forensics V, Springer, Vol. 306, 2009. [PDF]

  • Ashish Gehani and Ulf Lindqvist, Bonsai: Balanced Lineage Authentication, 23rd Annual Computer Security Applications Conference (ACSAC), IEEE Computer Society, 2007. [PDF]

  • Ashish Gehani and Ulf Lindqvist, VEIL: A System for Certifying Video Provenance, 9th IEEE International Symposium on Multimedia (ISM), 2007. [PDF]

Clone this wiki locally
You can’t perform that action at this time.
You signed in with another tab or window. Reload to refresh your session. You signed out in another tab or window. Reload to refresh your session.