From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity
暂无分享,去创建一个
[1] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[2] Paul T. Groth,et al. An Architecture for Provenance Systems , 2006 .
[3] Joseph Y. Halpern,et al. A Guide to Completeness and Complexity for Modal Logics of Knowledge and Belief , 1992, Artif. Intell..
[4] Calton Pu,et al. Resilient trust management for Web service integration , 2005, IEEE International Conference on Web Services (ICWS'05).
[5] Matthias Steup,et al. The Analysis of Knowledge , 2001 .
[6] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[7] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[8] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[9] John McCarthy,et al. Notes on Formalizing Context , 1993, IJCAI.
[10] James A. Hendler,et al. A Framework for Web Science , 2006, Found. Trends Web Sci..
[11] Matthew Richardson,et al. Trust Management for the Semantic Web , 2003, SEMWEB.
[12] L. Mui,et al. A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[13] Athman Bouguettaya,et al. Reputation Bootstrapping for Trust Establishment among Web Services , 2009, IEEE Internet Computing.
[14] E. Michael Maximilien,et al. Toward autonomic web services trust and selection , 2004, ICSOC '04.
[15] Csr Young,et al. How to Do Things With Words , 2009 .
[16] Munindar P. Singh,et al. Evidence-based trust: A mathematical model geared for multiagent systems , 2010, TAAS.
[17] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[18] Sanjeev Khanna,et al. Data Provenance: Some Basic Issues , 2000, FSTTCS.
[19] Jennifer E. Rowley,et al. The wisdom hierarchy: representations of the DIKW hierarchy , 2007, J. Inf. Sci..
[20] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[21] Robert Demolombe. To trust information sources: a proposal for a modal logical framework , 2001 .
[22] David M. Nicol,et al. A Formal-Semantics-Based Calculus of Trust , 2010, IEEE Internet Computing.
[23] Ravishankar K. Iyer,et al. Analysis of security data from a large computing organization , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN).
[24] Georg Lausen,et al. Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.
[25] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[26] Jingwei Huang,et al. Knowledge Provenance: An Approach to Modeling and Maintaining The Evolution and Validity of Knowledge , 2008 .
[27] Chrysanthos Dellarocas,et al. The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..
[28] Audun Jøsang,et al. Exploring Different Types of Trust Propagation , 2006, iTrust.
[29] R. Ackoff. From Data to Wisdom , 2014 .
[30] Jaroslaw Krygier,et al. A trust-based situation awareness system for military applications of the internet of things , 2015, 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT).
[31] Ueli Maurer,et al. Modelling a Public-Key Infrastructure , 1996, ESORICS.
[32] Prasanna Balaprakash,et al. Machine Learning and Understanding for Intelligent Extreme Scale Scientifc Computing and Discovery , 2015 .
[33] Yogesh L. Simmhan,et al. A survey of data provenance in e-science , 2005, SGMD.
[34] Anthony Mills,et al. Data, Information, Knowledge, and Wisdom , 2011 .
[35] Yolanda Gil,et al. A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..
[36] Thomas E. Potok,et al. ASCR Cybersecurity for Scientific Computing Integrity - Research Pathways and Ideas Workshop , 2015 .
[37] Virgil D. Gligor,et al. Towards a Theory of Trust in Networks of Humans and Computers , 2011, Security Protocols Workshop.
[38] M. S. Fox *,et al. Knowledge provenance in enterprise information , 2005 .
[39] Paul Resnick,et al. Reputation systems , 2000, CACM.
[40] V. Vianu,et al. Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .
[41] P. Cochat,et al. Et al , 2008, Archives de pediatrie : organe officiel de la Societe francaise de pediatrie.
[42] David M. Nicol,et al. Trust mechanisms for cloud computing , 2013, Journal of Cloud Computing: Advances, Systems and Applications.
[43] Juliana Freire,et al. Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.
[44] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[45] Sean Piesert,et al. ASCR Cybersecurity for Scientific Computing Integrity , 2015 .
[46] Geoff Brumfiel. Physicists declare victory in Higgs hunt , 2012, Nature.
[47] James F. Allen. Time and time again: The many ways to represent time , 1991, Int. J. Intell. Syst..
[48] R. Reiter,et al. Temporal reasoning in the situation calculus , 1994 .
[49] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..
[50] Lavanya Ramakrishnan,et al. The future of scientific workflows , 2018, Int. J. High Perform. Comput. Appl..
[51] David M. Nicol,et al. A calculus of trust and its application to PKI and identity management , 2009, IDtrust '09.
[52] James A. Hendler,et al. Trust Networks on the Semantic Web , 2003, WWW.
[53] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[54] Yogesh L. Simmhan,et al. The Open Provenance Model core specification (v1.1) , 2011, Future Gener. Comput. Syst..
[55] Munindar P. Singh,et al. A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.
[56] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[57] Ronald Fagin,et al. Reasoning about knowledge , 1995 .
[58] David M. Nicol,et al. Evidence-based trust reasoning , 2014, HotSoS '14.
[59] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[60] W. van der Hoek,et al. Epistemic logic for AI and computer science , 1995, Cambridge tracts in theoretical computer science.
[61] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[62] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[63] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[64] J. M. Larrazabal,et al. Reasoning about change , 1991 .
[65] Mark S. Fox,et al. Uncertainty in Knowledge Provenance , 2004, ESWS.
[66] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[67] Michael Gruninger,et al. Methodology for the Design and Evaluation of Ontologies , 1995, IJCAI 1995.
[68] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.