Securing Data Provenance in Internet of Things (IoT) Systems
暂无分享,去创建一个
Samir Tata | Heiko Ludwig | Luis Angel D. Bathen | Nathalie Baracaldo | Robert Engel | Roqeeb O. Ozugha | R. Engel | Nathalie Baracaldo | Heiko Ludwig | S. Tata | L. A. Bathen
[1] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[2] Marta Mattoso,et al. Kairos: An Architecture for Securing Authorship and Temporal Information of Provenance Data in Grid-Enabled Workflow Management Systems , 2008, 2008 IEEE Fourth International Conference on eScience.
[3] Rodrigo Rodrigues,et al. High Availability in DHTs: Erasure Coding vs. Replication , 2005, IPTPS.
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] Marianne Winslett,et al. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.
[6] Sanjeev Khanna,et al. Why and Where: A Characterization of Data Provenance , 2001, ICDT.
[7] Prasant Mohapatra,et al. Chaining for securing data provenance in distributed information networks , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[8] Margo I. Seltzer,et al. Provenance as first class cloud data , 2010, OPSR.
[9] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[10] Ahto Buldas,et al. Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees , 2013, NordSec.
[11] Rainer Gerhards,et al. Efficient Record-Level Keyless Signatures for Audit Logs , 2014, NordSec.