A Framework for the Assessment of the Trustworthiness of Digital Records over Time
暂无分享,去创建一个
Habtamu Abie | Jianqiang Ma | Mads Nygård | Torbjørn Skramstad | H. Abie | M. Nygård | T. Skramstad | Jianqiang Ma
[1] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[2] Diego Gambetta. Can We Trust Trust , 2000 .
[3] K.J.R. Liu,et al. Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.
[4] Bandar Alhaqbani,et al. A Time-Variant Medical Data Trustworthiness assessment model , 2009, 2009 11th International Conference on e-Health Networking, Applications and Services (Healthcom).
[5] Habtamu Abie,et al. Assessment of the Trustworthiness of Digital Records , 2011, IFIPTM.
[6] Ethan L. Miller,et al. POTSHARDS—a secure, recoverable, long-term archival storage system , 2009, TOS.
[7] Filip Boudrez,et al. Digital signatures and electronic records , 2007 .
[8] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[9] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[10] W. R. Buckland,et al. Outliers in Statistical Data , 1979 .
[11] Raymond T. Ng,et al. Finding Intensional Knowledge of Distance-Based Outliers , 1999, VLDB.
[12] Martin Pilgram,et al. Consultative Committee For Space Data Systems , 2009 .
[13] Arthur P. Dempster,et al. Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.
[14] Ccsds Secretariat,et al. Reference Model for an Open Archival Information System (OAIS) , 1999 .
[15] D. Collard,et al. Trust : making and breaking cooperative relations , 1989 .
[16] Glenn Shafer,et al. A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.
[17] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[18] A. Jøsang. Artificial Reasoning with Subjective Logic , 2008 .
[19] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[20] Ethan L. Miller,et al. Long-term threats to secure archives , 2006, StorageSS '06.
[21] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.
[22] Liuba Shrira,et al. Providing high availability using lazy replication , 1992, TOCS.
[23] Henry M. Gladney,et al. Trustworthy 100-year digital objects: Evidence after every witness is dead , 2004, TOIS.
[24] Habtamu Abie,et al. Development and Validation of Requirements for Evidential Value for Assessing Trustworthiness of Digital Records over Time , 2010 .