Data provenance in the internet of things

M Elkhodr, B Alsinglawi… - 2018 32nd international …, 2018 - ieeexplore.ieee.org
There is a need to create a trusted and secure IoT environment to share information, create
knowledge and perform digital transactions. Trustworthy data collection, mining and fusion is …

Data provenance and trust establishment in the Internet of Things

M Elkhodr, B Alsinglawi - Security and Privacy, 2020 - Wiley Online Library
Abstract The Internet of Things (IoT) is a network of heterogeneous networks encompassing
various forms of communications form the current traditional communication models to …

Evaluation of Information Security Software Using Quality and Reliability Criteria

M Karpinski, R Ziubina, A Azatov… - 2020 IEEE 5th …, 2020 - ieeexplore.ieee.org
It is determined that the stable operation of critical infrastructure depends on the reliability
and continuity of software for the protection of information resources. Failure to operate a …

Towards semantic comparison of multi-granularity process traces

Q Liu, X Zhao, K Taylor, X Lin, G Squire… - Knowledge-Based …, 2013 - Elsevier
A process trace describes the steps taken in a workflow to generate a particular result.
Understanding a process trace is critical to be able to verify data, enable its re-use and to …

Shared services in information technology and supply chain management

MNA Loges - 2013 - essay.utwente.nl
After the emergence of shared service centers shared services became most common in the
fields of Human Resource Management and Finance. On the contrary, fields such as …

An architecture for justified assessments of service provider reputation

N Griffiths, S Miles - … IEEE 10th International Conference on e …, 2013 - ieeexplore.ieee.org
In a service-oriented system, an accurate assessment of reputation is essential for selecting
between alternative providers. In many cases, providers have differing characteristics that …

Provenance-based trust estimation for service composition

J Jiang, Q Bai - AI 2013: Advances in Artificial Intelligence: 26th …, 2013 - Springer
Provenance information can greatly enhance transparency and accountability of shared
services. In this paper, we introduce a trust estimation approach which can derive trust …

[PDF][PDF] Trust mining and analysis in complex systems

J Jiang - 2014 - openrepository.aut.ac.nz
A complex system, as a collection of loosely coupled interacting components, can group and
create functioning units together. Complex systems have become a powerful framework for …