Articles with "provenance scheme" as a keyword



Photo from archive.org

A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks

Sign Up to like & get
recommendations!
Published in 2018 at "International Journal of Parallel Programming"

DOI: 10.1007/s10766-018-0601-y

Abstract: Data provenance is becoming extremely important these days for distributed environment, due to the ease in sharing and modifying data stored (e.g. cloud storage systems). However, the protection of provenance chain has been greatly understudied… read more here.

Keywords: secure provenance; scheme detecting; provenance scheme; detecting consecutive ... See more keywords
Photo from wikipedia

Stepwise Refinement Provenance Scheme for Wireless Sensor Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3127496

Abstract: In wireless sensor networks (WSNs), provenance is critical for assessing the trustworthiness of the data acquired and forwarded by sensor nodes. Due to the energy and bandwidth limitations of WSNs, it is crucial that data… read more here.

Keywords: wireless sensor; sensor networks; provenance scheme; scheme ... See more keywords