Secure Provenance: Protecting the Genealogy of Bits