Data Trustworthiness - Approaches and Research Challenges
暂无分享,去创建一个
[1] Y WangRichard,et al. Anchoring data quality dimensions in ontological foundations , 1996 .
[2] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[3] K. J. Bma. Integrity considerations for secure computer systems , 1977 .
[4] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[5] Raph Levien,et al. Attack-Resistant Trust Metrics , 2009, Computing with Social Trust.
[6] Elisa Bertino,et al. Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed systems , 2006, TSEC.
[7] Elisa Bertino,et al. A hybrid private record linkage scheme: Separating differentially private synopses from matching records , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[8] Diane M. Strong,et al. Information quality benchmarks: product and service performance , 2002, CACM.
[9] Joseph Moses Juran. Juran on leadership for quality : an executive handbook , 1989 .
[10] Elisa Bertino,et al. Secure data provenance compression using arithmetic coding in wireless sensor networks , 2014, 2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC).
[11] Graeme Shanks,et al. A Semiotic Information Quality Framework , 2004 .
[12] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[13] Elisa Bertino,et al. A Hybrid Approach to Private Record Linkage , 2008, 2008 IEEE 24th International Conference on Data Engineering.
[14] Elisa Bertino,et al. Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.
[15] Elisa Bertino,et al. Privacy preserving schema and data matching , 2007, SIGMOD '07.
[16] Elisa Bertino,et al. Dictionary Based Secure Provenance Compression for Wireless Sensor Networks , 2016, IEEE Transactions on Parallel and Distributed Systems.
[17] Elisa Bertino,et al. A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks , 2013, SenSys '13.
[18] Elisa Bertino,et al. A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[19] Richard Y. Wang,et al. Anchoring data quality dimensions in ontological foundations , 1996, CACM.
[20] Carlo Batini,et al. Data Quality: Concepts, Methodologies and Techniques , 2006, Data-Centric Systems and Applications.
[21] Sushil Jajodia,et al. Secure Data Aggregation in Wireless Sensor Networks , 2008 .