A Secure Incentive Mechanism for Competitive Organization Data Sharing: A Contract Theoretic Approach
暂无分享,去创建一个
[1] Krzysztof J. Gorgolewski,et al. Making big data open: data sharing in neuroimaging , 2014, Nature Neuroscience.
[2] Florian Skopik,et al. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing , 2016, Comput. Secur..
[3] Peter Groves,et al. The 'big data' revolution in healthcare: Accelerating value and innovation , 2016 .
[4] Randy H. Katz,et al. A Berkeley View of Systems Challenges for AI , 2017, ArXiv.
[5] Athanasios V. Vasilakos,et al. SeDaSC: Secure Data Sharing in Clouds , 2017, IEEE Systems Journal.
[6] Jie Tian,et al. An Incentive Mechanism for Cross-Organization Data Sharing Based on Data Competitiveness , 2018, IEEE Access.
[7] Úlfar Erlingsson,et al. RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response , 2014, CCS.
[8] Tian Zhang,et al. Data Offloading in Mobile Edge Computing: A Coalition and Pricing Based Approach , 2018, IEEE Access.
[9] Md Zahidul Islam,et al. Ieee Transactions on Knowledge and Data Engineering 1 Differentially Private Random Decision Forests Using Smooth Sensitivity , 2022 .
[10] Kunal Talwar,et al. Mechanism Design via Differential Privacy , 2007, 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07).
[11] Jiafu Wan,et al. A multimedia healthcare data sharing approach through cloud-based body area network , 2017, Future Gener. Comput. Syst..
[12] Lin Gao,et al. A contract-based incentive mechanism for crowdsourced wireless community networks , 2016, 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt).
[13] Victor C. M. Leung,et al. Energy-Efficient Topology Control With Selective Diversity in Cooperative Wireless Ad Hoc Networks: A Game-Theoretic Approach , 2014, IEEE Transactions on Wireless Communications.
[14] Jun Tang,et al. Privacy Loss in Apple's Implementation of Differential Privacy on MacOS 10.12 , 2017, ArXiv.
[15] V. Balu,et al. Effective Incentive Compatible Model for Privacy Preservation of Information in Secure Data Sharing and Publishing , 2014 .
[16] Shaojie Tang,et al. A Budget Feasible Incentive Mechanism for Weighted Coverage Maximization in Mobile Crowdsensing , 2017, IEEE Transactions on Mobile Computing.
[17] J. Laffont,et al. The Theory of Incentives: The Principal-Agent Model , 2001 .
[18] Baik Hoh,et al. Sell your experiences: a market mechanism based incentive for participatory sensing , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[19] Liviu Iftode,et al. Seeing Is Believing: Sharing Real-Time Visual Traffic Information via Vehicular Clouds , 2016, IEEE Access.
[20] K. J. Ray Liu,et al. Privacy or Utility in Data Collection? A Contract Theoretic Approach , 2015, IEEE Journal of Selected Topics in Signal Processing.
[21] Wei Song,et al. Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing , 2016, IEEE Transactions on Services Computing.
[22] Kaiying Feng,et al. Improving availability and confidentiality of shared data under the multi-cloud environment , 2017, 2017 IEEE 2nd International Conference on Cloud Computing and Big Data Analysis (ICCCBDA).
[23] Stephen R. Rannels,et al. A Distributed Publisher-Driven Secure Data Sharing Scheme for Information-Centric IoT , 2018 .
[24] Jie Tian,et al. QoS-Constrained Medium Access Probability Optimization in Wireless Interference-Limited Networks , 2018, IEEE Transactions on Communications.
[25] Kin K. Leung,et al. A Survey of Incentive Mechanisms for Participatory Sensing , 2015, IEEE Communications Surveys & Tutorials.
[26] Xiaodong Lin,et al. A Privacy-Preserving Data-Sharing Framework for Smart Grid , 2017, IEEE Internet of Things Journal.
[27] Jie Tian,et al. A Competitiveness-driven and Secure Incentive Mechanism for Competitive Organizations Data Sharing: A Contract Theoretic Approach , 2018, 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).
[28] H. Bauchner,et al. A picture is worth a thousand words , 2002, BMJ : British Medical Journal.
[29] William S. Levine,et al. Optimal control theory: An introduction , 1972 .
[30] V. N. Venu Gopal,et al. Cost-Effective Authentic and Anonymous Data Sharing With Forward Security , 2016 .
[31] Benjamin Fabian,et al. Collaborative and secure sharing of healthcare data in multi-clouds , 2015, Inf. Syst..
[32] Ryan K. L. Ko,et al. Anonymous Data Sharing Between Organisations with Elliptic Curve Cryptography , 2017, 2017 IEEE Trustcom/BigDataSE/ICESS.
[33] Cynthia Dwork,et al. Calibrating Noise to Sensitivity in Private Data Analysis , 2006, TCC.
[34] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[35] Jean C. Walrand,et al. Motivating Smartphone Collaboration in Data Acquisition and Distributed Computing , 2014, IEEE Transactions on Mobile Computing.