… Data provenance has shown tremendous value in numerous security and privacy applications—for example, for privacy-preservingnetwork analysis to explore system behavior while …
… of proper privacy-preserving data provenance mechanisms … a novel privacypreserving data provenance solution that … Systems, to sign, in privacy-preserving way, the IoT exchanged data…
… There are two natural approaches to create a structuralprivacypreserving graph G′. The first approach, mentioned earlier, is to simply delete a subset of edges and vertices in G′ so …
… When designing a framework for the secure and privacy-preserving management of provenance it is important to note that security and privacy are not conducive to absolutes. There are …
MN Aman, MH Basheer, B Sikdar - IEEE Internet of Things …, 2019 - ieeexplore.ieee.org
… for data provenance in IoT is not extensive, we compare the performance of the proposed protocols with one of the most recent privacypreserving data provenance protocols for IoT by …
K Alharbi, X Lin - 2012 32nd international conference on …, 2012 - ieeexplore.ieee.org
… provenance and achieve user privacy preservation, we propose a new privacy-preserving data provenance (… servers and execute the secure provenance operations. Detailed security …
… This paper presents P3GNN (privacy-preservingprovenance graph-based graph neural network (GNN) model), a novel model that synergizes Federated Learning (FL) with Graph …
M Maruseac, G Ghinita, R Rughinis - … of the 4th ACM conference on Data …, 2014 - dl.acm.org
… , capturing and analyzing provenance information. Sharing provenance brings numerous benefits, but … In this paper, we study privacy-preserving provenance workflow publication using …
D Li, J Xiao, P Jiang, J Gui, D Song… - … on Dependable and …, 2024 - ieeexplore.ieee.org
… protection mechanisms utilized in network/data provenance [13]. Thirdly, network/data provenance necessitates safeguarding their provenance data through measures such as access …