Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe security threats that organizations face in the digital era. The threat now extends to our personal lives: a plethora of personal information is available to social networks and smartphone providers and is indirectly transferred to untrustworthy third party and fourth party applications. In this work, we present a generic data lineage framework Lime for data flow across multiple entities that take two characteristic, principal roles (i.e., owner and consumer). We define the exact security guarantees required by such a data lineage mechanism toward identification of a guilty entity, and identify the simplifying non-repudiation and honesty assumpti...
A successful application of an Internet of Things (IoT) based network depends on the accurate and su...
Recent ICTs paradigms such as cloud computing, data outsourcing, digital data markets, and the sprea...
Abstract—The rise of the social web has brought a series of privacy concerns and threats. In particu...
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe secu...
A data distributor has given precise data to a set of evidently trusted agents. Some of the data are...
We show a nonspecific information genealogy structure LIME for information stream over numerous elem...
Purposeful or unexpected leakage of private information is no doubt an extraordinary problem amongst...
In this paper cover Data Lineage in Malicious Environment. A data provider has given precise data to...
In this paper cover Data Lineage in Malicious Environment. A data provider has given precise data to...
We propose a novel response for cross-site cold-start thing recommendation, which expects to we demo...
In the virtual and widely distributed network, the process of handover sensitive data from the distr...
Data outsourcing is an Internet-based paradigm that allows organizations to share data cost-effectiv...
We propose a novel answer for cross-site cold-start item suggestion, which intends to we show a nons...
In this work, we address the liability issues that may arise due to unauthorized sharing of personal...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...
A successful application of an Internet of Things (IoT) based network depends on the accurate and su...
Recent ICTs paradigms such as cloud computing, data outsourcing, digital data markets, and the sprea...
Abstract—The rise of the social web has brought a series of privacy concerns and threats. In particu...
Intentional or unintentional leakage of confidential data is undoubtedly one of the most severe secu...
A data distributor has given precise data to a set of evidently trusted agents. Some of the data are...
We show a nonspecific information genealogy structure LIME for information stream over numerous elem...
Purposeful or unexpected leakage of private information is no doubt an extraordinary problem amongst...
In this paper cover Data Lineage in Malicious Environment. A data provider has given precise data to...
In this paper cover Data Lineage in Malicious Environment. A data provider has given precise data to...
We propose a novel response for cross-site cold-start thing recommendation, which expects to we demo...
In the virtual and widely distributed network, the process of handover sensitive data from the distr...
Data outsourcing is an Internet-based paradigm that allows organizations to share data cost-effectiv...
We propose a novel answer for cross-site cold-start item suggestion, which intends to we show a nons...
In this work, we address the liability issues that may arise due to unauthorized sharing of personal...
There are numerous ways to handle a company's data. Everything of the company's data, including its ...
A successful application of an Internet of Things (IoT) based network depends on the accurate and su...
Recent ICTs paradigms such as cloud computing, data outsourcing, digital data markets, and the sprea...
Abstract—The rise of the social web has brought a series of privacy concerns and threats. In particu...