Results 251 to 260 of about 362,062 (288)
Some of the next articles are maybe not open access.
Data Provenance in Agriculture
2018Soils are probably the most critical natural resource in Agriculture, and soils security represents a critical growing global issue. Soils experiments require vast amounts of high-quality data, are very hard to be reproduced, and there are few studies about data provenance of such tests.
Sérgio Manuel Serra da Cruz +11 more
openaire +1 more source
2013
Assessing the quality of linked data currently published on the Web is a crucial need of various data-intensive applications. Extensive work on similar applications for relational data and queries has shown that data provenance can be used in order to compute trustworthiness, reputation and reliability of query results, based on the source data and ...
Grigoris Karvounarakis +2 more
openaire +1 more source
Assessing the quality of linked data currently published on the Web is a crucial need of various data-intensive applications. Extensive work on similar applications for relational data and queries has shown that data provenance can be used in order to compute trustworthiness, reputation and reliability of query results, based on the source data and ...
Grigoris Karvounarakis +2 more
openaire +1 more source
Data Provenance Standards and Recommendations for FAIR Data
2020This article reviews the main characteristics of five widely used data provenance models and recommendations. We suggest a set of six provenance properties that should be satisfied by any provenance model as a basis for further implementation of provenance mechanisms, supporting the findable, accessible, interoperable and reusable (FAIR) principles for
Malte-Levin, Jauer, Thomas M, Deserno
openaire +2 more sources
2017
One of the barriers of cloud adoption is the security of data stored in the cloud. In this chapter, we introduce data provenance and briefly show how it is applicable for data security in the cloud. Building on this, we discuss the underlying question of how data provenance, required for empowering data security in the cloud, can be acquired.
Yu Shyang Tan, Alan +4 more
openaire +2 more sources
One of the barriers of cloud adoption is the security of data stored in the cloud. In this chapter, we introduce data provenance and briefly show how it is applicable for data security in the cloud. Building on this, we discuss the underlying question of how data provenance, required for empowering data security in the cloud, can be acquired.
Yu Shyang Tan, Alan +4 more
openaire +2 more sources
IEEE Security & Privacy Magazine, 2011
An unanticipated consequence of the Internet age is a pervasive loss of context. Users and organizations receive information in incredible volumes from both internal processes and far-flung, untrusted, and sometimes unknown sources.
openaire +1 more source
An unanticipated consequence of the Internet age is a pervasive loss of context. Users and organizations receive information in incredible volumes from both internal processes and far-flung, untrusted, and sometimes unknown sources.
openaire +1 more source
SECURING BIG DATA PROVENANCE FOR AUDITORS: THE BIG DATA PROVENANCE BLACK BOX
Proceedings of the 12th CONTECSI International Conference on Information Systems and Technology Management, 2015Companies are experiencing a literal deluge of data, from many different sources and in a wide variety of forms that is being generated very quickly. In the area of data provenance, or lineage and veracity of the data set, Big Data exposes the limitations of current technology in providing adequate assurance for auditing purposes. The provenance of the
openaire +1 more source
Constructing Provenance Cubes Based on Semantic Neuroimaging Data Provenances
2014The systematic Brain Informatics (BI) study is a data-driven process and all decision-making and suppositions depend on the deep understanding of brain data. Aiming at unstructured brain data, semantic neuroimaging data provenances, called BI provenances, have been constructed to support the quick and comprehensive understanding about data origins and ...
Chen, J., Feng, J, Zhong, N., Huang, Z.
openaire +2 more sources
Provenance-based Intrusion Detection Systems: A Survey
ACM Computing Surveys, 2023Michael Zipperle +2 more
exaly

