In the past 25 years, the World Wide Web has disrupted the way news are disseminated and consumed. However, the euphoria for the democratization of news publishing was soon followed by scepticism, as a new phenomenon emerged: fake news. With no gatekeepers to vouch for it, the veracity of the information served over the World Wide Web became a major public concern. The Reuters Digital News Report 2020 cites that in at least half of the EU member countries, 50% or more of the population is concerned about online fake news. To help address the problem of trust on information communi- cated over the World Wide Web, it has been proposed to also make available the provenance metadata of the information. Similar to artwork provenance, this would ...
Provenance network analytics is a novel data analytics approach that helps infer properties of data,...
Abstract. Database provenance chronicles the history of updates and modifica-tions to data, and has ...
Part 3: System SecurityInternational audienceThe advantage of collecting data provenance information...
Information produced by Internet applications is inherently a result of processes that are executed ...
Knowing the provenance of a data item helps in ascertaining its trustworthiness. Various approaches ...
As increasing amounts of valuable information are pro-duced and persist digitally, the ability to de...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
Advanced Persistent Threats (APT) are a class of security threats in which a well-resourced attacker...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
Many applications now involve the collection of large amounts of data from multiple users, and then ...
Given the significant increase of on-line services that require personal information from users, the...
Data provenance tools seek to facilitate reproducible data science and auditable data analyses by ca...
Provenance network analytics is a novel data analytics approach that helps infer properties of data,...
Derived from the field of art curation, digital provenance is an unforgeable record of a digital obj...
Provenance network analytics is a novel data analytics approach that helps infer properties of data,...
Abstract. Database provenance chronicles the history of updates and modifica-tions to data, and has ...
Part 3: System SecurityInternational audienceThe advantage of collecting data provenance information...
Information produced by Internet applications is inherently a result of processes that are executed ...
Knowing the provenance of a data item helps in ascertaining its trustworthiness. Various approaches ...
As increasing amounts of valuable information are pro-duced and persist digitally, the ability to de...
NSF CNS-0716532, CNS- 0803280, CNS-0716608, CNS-0627554, CNS-0708025, IIS-0803197.published or submi...
Advanced Persistent Threats (APT) are a class of security threats in which a well-resourced attacker...
Research on trusted computing focuses mainly on the security and integrity of the execution environm...
Data Provenance describes what has happened to a users data within a ma- chine as a form of digital ...
Many applications now involve the collection of large amounts of data from multiple users, and then ...
Given the significant increase of on-line services that require personal information from users, the...
Data provenance tools seek to facilitate reproducible data science and auditable data analyses by ca...
Provenance network analytics is a novel data analytics approach that helps infer properties of data,...
Derived from the field of art curation, digital provenance is an unforgeable record of a digital obj...
Provenance network analytics is a novel data analytics approach that helps infer properties of data,...
Abstract. Database provenance chronicles the history of updates and modifica-tions to data, and has ...
Part 3: System SecurityInternational audienceThe advantage of collecting data provenance information...