Given the significant increase of on-line services that require personal information from users, the risk that such information is misused has become an important concern. In such a context, information accountability is desirable since it allows users (and society in general) to decide, by means of audits, whether information is used appropriately. To ensure information accountability, information flow should be made transparent. It has been argued that data provenance can be used as the mechanism to underpin such a transparency. Under these conditions, an audit's quality depends on the quality of the captured provenance information. Thereby, the integrity of provenance information emerges as a decisive issue in the quality of a provenance...
###EgeUn###Provenance determines the origin of the data by tracing and recording the actions that ar...
Data (or information) provenance has many important applications. However, prior work on data proven...
Data (or information) provenance has many important applications. However, prior work on data proven...
In recent years, an increasing number of personalised services that require users to disclose person...
In recent years, an increasing number of personalised services that require users to disclose person...
Across the world, organizations are required to comply with regulatory frameworks dictating how to m...
Given the significant amount of personal information available on the Web, verifying its correct use...
Security is likely to be a critical factor in the future adoption of provenance technology, because ...
Security is likely to be a critical factor in the future adoption of provenance technology, because ...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. H...
As increasing amounts of valuable information are pro-duced and persist digitally, the ability to de...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
Data provenance refers to records of the inputs, entities, systems, and processes that influence dat...
Empirical thesis.Bibliography: pages 185-201.1. Introduction -- 2. Literature review -- 3. PACLP : a...
###EgeUn###Provenance determines the origin of the data by tracing and recording the actions that ar...
Data (or information) provenance has many important applications. However, prior work on data proven...
Data (or information) provenance has many important applications. However, prior work on data proven...
In recent years, an increasing number of personalised services that require users to disclose person...
In recent years, an increasing number of personalised services that require users to disclose person...
Across the world, organizations are required to comply with regulatory frameworks dictating how to m...
Given the significant amount of personal information available on the Web, verifying its correct use...
Security is likely to be a critical factor in the future adoption of provenance technology, because ...
Security is likely to be a critical factor in the future adoption of provenance technology, because ...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. H...
As increasing amounts of valuable information are pro-duced and persist digitally, the ability to de...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
Data provenance refers to records of the inputs, entities, systems, and processes that influence dat...
Empirical thesis.Bibliography: pages 185-201.1. Introduction -- 2. Literature review -- 3. PACLP : a...
###EgeUn###Provenance determines the origin of the data by tracing and recording the actions that ar...
Data (or information) provenance has many important applications. However, prior work on data proven...
Data (or information) provenance has many important applications. However, prior work on data proven...