PRONET: Network trust assessment based on incomplete provenance
暂无分享,去创建一个
Prasant Mohapatra | Gerald M. Powell | Gulustan Dogan | Tarek F. Abdelzaher | Kai Zeng | Xinlei Wang | Mohammad Maifi Hasan Khan | Kannan Govindan | Ted Brown | T. Abdelzaher | P. Mohapatra | K. Govindan | T. Brown | K. Zeng | Gulustan Dogan | Xinlei Wang | G. Powell
[1] Shouhuai Xu,et al. TIUPAM: A Framework for Trustworthiness-Centric Information Sharing , 2009, IFIPTM.
[2] Boon Thau Loo,et al. Provenance-aware secure networks , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.
[3] Margo I. Seltzer,et al. Issues in Automatic Provenance Collection , 2006, IPAW.
[4] M. Migliore,et al. An algorithm to find all paths between two nodes in a graph , 1990 .
[5] Elisa Bertino,et al. An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.
[6] Prasant Mohapatra,et al. Provenance-Based Information Trustworthiness Evaluation in Multi-Hop Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[7] Bin Yu,et al. Managing the pedigree and quality of information in dynamic information sharing environments , 2007, AAMAS '07.
[8] Prasant Mohapatra,et al. Collusion-resilient quality of information evaluation based on information provenance , 2011, 2011 8th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[9] Rakesh Agarwal,et al. Fast Algorithms for Mining Association Rules , 1994, VLDB 1994.
[10] Elisa Bertino,et al. Assessing the trustworthiness of location data based on provenance , 2009, GIS.
[11] Jiawei Han,et al. Dustminer: troubleshooting interactive complexity bugs in sensor networks , 2008, SenSys '08.