Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes

F Zafar, A Khan, S Suhail, I Ahmed, K Hameed… - Journal of network and …, 2017 - Elsevier
Data is a valuable asset for the success of business and organizations these days, as it is
effectively utilized for decision making, risk assessment, prioritizing the goals and …

A survey on provenance: What for? What form? What from?

M Herschel, R Diestelkämper, H Ben Lahmar - The VLDB Journal, 2017 - Springer
Provenance refers to any information describing the production process of an end product,
which can be anything from a piece of digital data to a physical object. While this survey …

IoT data provenance implementation challenges

A Alkhalil, RA Ramadan - Procedia Computer Science, 2017 - Elsevier
Internet of Things (IoT) has become an emerging trend in the information and engineering
industries, which is inevitable to impact our lives in various ways. The advancement of IoT as …

ProvNet: Networked bi-directional blockchain for data sharing with verifiable provenance

C Chenli, W Tang, F Gomulka, T Jung - Journal of Parallel and Distributed …, 2022 - Elsevier
Data sharing is increasingly popular especially for scientific research and business fields
where large volume of datasets need to be used, but it involves data security and privacy …

privacyTracker: a privacy-by-design GDPR-compliant framework with verifiable data traceability controls

H Gjermundrød, I Dionysiou, K Costa - … , June 6-9, 2016. Revised Selected …, 2016 - Springer
Breach or lack of online privacy has become almost a commonplace of today's digital age,
mainly due to the inability of either enforcing privacy requirements or imposing strict …

Data provenance in security and privacy

B Pan, N Stakhanova, S Ray - ACM Computing Surveys, 2023 - dl.acm.org
Provenance information corresponds to essential metadata that describes the entities, users,
and processes involved in the history and evolution of a data object. The benefits of tracking …

[HTML][HTML] Big data privacy and anonymization

V Torra, G Navarro-Arribas - Privacy and Identity Management. Facing up …, 2016 - Springer
Data privacy has been studied in the area of statistics (statistical disclosure control) and
computer science (privacy preserving data mining and privacy enhancing technologies) for …

Ontology development for run-time safety management methodology in Smart Work Environments using ambient knowledge

M Teimourikia, M Fugini - Future Generation Computer Systems, 2017 - Elsevier
This paper presents the development of a decision support system for run-time safety
management in Smart Work Environments (SWEs). Our approach consists of four main …

On optimizing the trade-off between privacy and utility in data provenance

D Deutch, A Frankenthal, A Gilad… - Proceedings of the 2021 …, 2021 - dl.acm.org
Organizations that collect and analyze data may wish or be mandated by regulation to justify
and explain their analysis results. At the same time, the logic that they have followed to …

Dpxplain: Privately explaining aggregate query answers

Y Tao, A Gilad, A Machanavajjhala, S Roy - arXiv preprint arXiv …, 2022 - arxiv.org
Differential privacy (DP) is the state-of-the-art and rigorous notion of privacy for answering
aggregate database queries while preserving the privacy of sensitive information in the data …