[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022‏ - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

The relationship between trust in AI and trustworthy machine learning technologies

E Toreini, M Aitken, K Coopamootoo, K Elliott… - Proceedings of the …, 2020‏ - dl.acm.org
To design and develop AI-based systems that users and the larger public can justifiably
trust, one needs to understand how machine learning technologies impact trust. To guide …

A systematic review of provenance systems

B Pérez, J Rubio, C Sáenz-Adán - Knowledge and Information Systems, 2018‏ - Springer
Provenance refers to the entire amount of information, comprising all the elements and their
relationships, that contribute to the existence of a piece of data. The knowledge of …

[HTML][HTML] Dataset search: a survey

A Chapman, E Simperl, L Koesten, G Konstantinidis… - The VLDB Journal, 2020‏ - Springer
Generating value from data requires the ability to find, access and make sense of datasets.
There are many efforts underway to encourage data sharing and reuse, from scientific …

Fine-grained, secure and efficient data provenance on blockchain systems

P Ruan, G Chen, TTA Dinh, Q Lin, BC Ooi… - Proceedings of the …, 2019‏ - dl.acm.org
The success of Bitcoin and other cryptocurrencies bring enormous interest to blockchains. A
blockchain system implements a tamper-evident ledger for recording transactions that …

Provenance in databases: Why, how, and where

J Cheney, L Chiticariu, WC Tan - Foundations and Trends® …, 2009‏ - nowpublishers.com
Different notions of provenance for database queries have been proposed and studied in
the past few years. In this article, we detail three main notions of database provenance …

Overview and framework for data and information quality research

SE Madnick, RY Wang, YW Lee, H Zhu - Journal of data and information …, 2009‏ - dl.acm.org
Awareness of data and information quality issues has grown rapidly in light of the critical role
played by the quality of information in our data-intensive, knowledge-based economy …

Preventing history forgery with secure provenance

R Hasan, R Sion, M Winslett - ACM Transactions on Storage (TOS), 2009‏ - dl.acm.org
As increasing amounts of valuable information are produced and persist digitally, the ability
to determine the origin of data becomes important. In science, medicine, commerce, and …

Privacy-aware role-based access control

Q Ni, E Bertino, J Lobo, C Brodie, CM Karat… - ACM Transactions on …, 2010‏ - dl.acm.org
In this article, we introduce a comprehensive framework supporting a privacy-aware access
control mechanism, that is, a mechanism tailored to enforce access control to data …

The foundations for provenance on the web

L Moreau - Foundations and Trends® in Web Science, 2010‏ - nowpublishers.com
Provenance, ie, the origin or source of something, is becoming an important concern, since it
offers the means to verify data products, to infer their quality, to analyse the processes that …