To trust or not to trust? Developing trusted digital spacesthrough timely reliable and personalized provenance
暂无分享,去创建一个
Nick Taylor | Jim Austin | John McAvoy | Colin C. Venters | Karim Djemame | Vania Dimitrova | Martyn Fletcher | Stephen Hobson | Paul Townend | Lydia Lau | Sarah Fores | Jie Xiu | David E. Webster | Alison Marshall | Charlie E. Dibsdale | Viduto Valentina
[1] Yolanda Gil,et al. PROV Model Primer , 2012 .
[2] Raymond A. Paul,et al. Data provenance in SOA: security, reliability, and integrity , 2007, Service Oriented Computing and Applications.
[3] Yutaka Yamamoto,et al. A Morality Based on Trust: Some Reflections on Japanese Morality , 1990 .
[4] Jim Austin,et al. Trust and Risk Relationship Analysis on a Workflow Basis: A Use Case , 2014 .
[5] Deborah L. McGuinness,et al. PROV-O: The PROV Ontology , 2013 .
[6] Paul T. Groth,et al. The provenance of electronic data , 2008, CACM.
[7] Nick Taylor,et al. Personalised Provenance Reasoning Models and Risk Assessment in Business Systems: A Case Study , 2013, 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering.
[8] A. Jameson. Adaptive interfaces and agents , 2002 .