The String-to-String Correction Problem
Journal of the ACM (JACM)
Data mining: concepts and techniques
Data mining: concepts and techniques
Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Privacy preserving schema and data matching
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Truth discovery with multiple conflicting information providers on the web
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Databases with uncertainty and lineage
The VLDB Journal — The International Journal on Very Large Data Bases
Efficient k-anonymization using clustering techniques
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
The Challenge of Assuring Data Trustworthiness
DASFAA '09 Proceedings of the 14th International Conference on Database Systems for Advanced Applications
Query Processing Techniques for Compliance with Data Confidence Policies
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Provenance-based trustworthiness assessment in sensor networks
Proceedings of the Seventh International Workshop on Data Management for Sensor Networks
Trustworthy information: concepts and mechanisms
WAIM'10 Proceedings of the 11th international conference on Web-age information management
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
Heterogeneous network-based trust analysis: a survey
ACM SIGKDD Explorations Newsletter
Rule-based trust assessment on the semantic web
RuleML'2011 Proceedings of the 5th international conference on Rule-based reasoning, programming, and applications
Privacy-preserving assessment of location data trustworthiness
Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems
Accepting information with a pinch of salt: handling untrusted information sources
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Quality-driven extraction, fusion and matchmaking of semantic web API descriptions
Journal of Web Engineering
A provenance-based approach to evaluate data quality in eScience
International Journal of Metadata, Semantics and Ontologies
Hi-index | 0.00 |
Today, with the advances of information technology, individual people and organizations can obtain and process data from different sources. It is critical to ensure data integrity so that effective decisions can be made based on these data. An important component of any solution for assessing data integrity is represented by techniques and tools to evaluate the trustworthiness of data provenance. However, few efforts have been devoted to investigate approaches for assessing how trusted the data are, based in turn on an assessment of the data sources and intermediaries. To bridge this gap, we propose a data provenance trust model which takes into account various factors that may affect the trustworthiness and, based on these factors, assigns trust scores to both data and data providers. Such trust scores represent key information based on which data users may decide whether to use the data and for what purposes.