Time, clocks, and the ordering of events in a distributed system
Communications of the ACM
A lattice model of secure information flow
Communications of the ACM
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Maximizing the spread of influence through a social network
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Principles of dataspace systems
Proceedings of the twenty-fifth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the 14th ACM conference on Computer and communications security
The structure of information pathways in a social communication network
Proceedings of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining
An Approach to Evaluate Data Trustworthiness Based on Data Provenance
SDM '08 Proceedings of the 5th VLDB workshop on Secure Data Management
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
A framework for fine-grained data integration and curation, with provenance, in a dataspace
TAPP'09 First workshop on on Theory and practice of provenance
Story book: an efficient extensible provenance framework
TAPP'09 First workshop on on Theory and practice of provenance
Making a cloud provenance-aware
TAPP'09 First workshop on on Theory and practice of provenance
Transparently gathering provenance with provenance aware condor
TAPP'09 First workshop on on Theory and practice of provenance
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Aggregate and verifiably encrypted signatures from bilinear maps
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Sequential aggregate signatures and multisignatures without random oracles
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
Unrestricted aggregate signatures
ICALP'07 Proceedings of the 34th international conference on Automata, Languages and Programming
Non-interactive editable signatures for assured data provenance
Proceedings of the first ACM conference on Data and application security and privacy
Hi-index | 0.00 |
We used to treating information received (from recognized sources) as trustworthy, which is unfortunately not true because of attacks. The situation can get worse with the emerging shift of information sharing paradigm from "need to know" to "need to share." In order to help information consumers make the "best" decision possible, it is imperative to formulate concepts, models, frameworks, architectures, and mechanisms to facilitate information trustworthiness management in distributed and decentralized environment. In this paper we initiate a study in this direction by proposing an abstraction called information networks as well as two supporting mechanisms called provenance digital signatures and optimal security hardening of information network.