Filters








123,637 Hits in 4.0 sec

Facilitating Trust on Data through Provenance [chapter]

Manolis Stamatogiannakis, Paul Groth, Herbert Bos
2014 Lecture Notes in Computer Science  
In our work, we explore how to use state-ofthe-art systems techniques to capture and reconstruct provenance, thus enabling us to build trust on both newly generated and existing data.  ...  Provenance of data plays a pivotal role in ascertaining trustworthiness of data.  ...  Thus, knowing the provenance of data can play a central role in the trust we put on them.  ... 
doi:10.1007/978-3-319-08593-7_21 fatcat:z7gnvim3grdcjfocpzdmomangm

Fifty Shades of Grey

Lauren Thornton, Bran Knowles, Gordon Blair
2021 Proceedings of the 2021 ACM Conference on Fairness, Accountability, and Transparency  
applicable to promoting trust in and through Virtual Labs.  ...  Trust is needed for facilitating collaboration between scientists who may share datasets and algorithms, and for crafting appropriate science-based policies.  ...  and prepublication data and methods is one of trust" [10, p. 609 ].  ... 
doi:10.1145/3442188.3445871 fatcat:jis333mgu5bm7cuw4e6k4tdbxm

A multi-functional architecture addressing workflow and service challenges using provenance data

Mahsa Naseri, Simone A. Ludwig
2010 Proceedings of the 3rd workshop on Ph.D. students in information and knowledge management - PIKM '10  
Current exploitation and application of this information, which is referred to as provenance data, is very limited as provenance systems started being developed for specific applications.  ...  In service-oriented environments, keeping track of the composition process along with the data transformations and services provides a rich amount of information for later reasoning.  ...  The requirements mentioned can be satisfied through provenance data.  ... 
doi:10.1145/1871902.1871920 dblp:conf/cikm/NaseriL10 fatcat:ohepfv6fujbaxipha3oapfnxam

Towards believing answers from cyber-infrastructure-based applications

Gilbert Ornelas, Paulo Pinheiro da Silva
2006 Proceedings of the 2006 International Conference on Privacy, Security and Trust Bridge the Gap Between PST Technologies and Business Services - PST '06  
In this paper, we discuss the combined use of provenance information, i.e., information describing how and where the results were derived, and trust relation networks between CI agents to compute belief  ...  Acknowledgements This work is funded in part by the National Science Foundation (NSF) through grant NSF EAR-0225670. References  ...  Further, PML is represented in XML format which, given that services communicate through XMLbased documents, would facilitate its integration with service results.  ... 
doi:10.1145/1501434.1501516 dblp:conf/pst/OrnelasS06 fatcat:phxewxwqejc5xmrp5xxeibo5mu

IoT Big Data provenance scheme using blockchain on Hadoop ecosystem

Houshyar Honar Pajooh, Mohammed A. Rashid, Fakhrul Alam, Serge Demidenko
2021 Journal of Big Data  
The HLF blockchain facilitates storing the lightweight verification tags on the blockchain ledger.  ...  The obtained results have indicated the feasibility of the proposed solution to retrieve and store the provenance of large-scale IoT data within the Big Data ecosystem using the HLF blockchain.  ...  When a data entity from the big data system is required, the blockchain accesses the specific data entity through a trusted environment.  ... 
doi:10.1186/s40537-021-00505-y fatcat:ztfwuhwrxfgujmucbyi6xoqowu

Towards Usable and Interoperable Workflow Provenance: Empirical Case Studies using PML

James Michaelis, Li Ding, Zhenning Shangguan, Stephan Zednik, Rui Huang, Paulo Pinheiro da Silva, Nicholas Del Rio, Deborah L. McGuinness
2009 International Semantic Web Conference  
In this paper, we describe how a semantic webbased provenance Interlingua called the Proof Markup Language (PML) has been used to encode workflow provenance in a variety of diverse application areas.  ...  ) among data products, represented by justification-based concepts (pmlj:NodeSet); and the Trust module(namespace: pmlt), which supports annotating complex trust relations on provenance and justification  ...  PML facilitates generation and sharing of provenance metadata for data derivation within and across intelligent systems, and acts as an enabler of trust by supporting explanations of information sources  ... 
dblp:conf/semweb/MichaelisDSZHSRM08 fatcat:55767jewgbenbeb6mvife3smk4

Making trusted attribute assertions online with the publish trust framework

Jennifer Golbeck, Hal Warren, Eva Winer
2012 2012 Tenth Annual International Conference on Privacy, Security and Trust  
This leverages Semantic Web technologies to add provenance to the attributes a person wants to assert about themselves.  ...  In many spaces, it is valuable to both the users and information consumers that those statements can be validated and trusted. In this paper, we present the Publish Trust Framework.  ...  On the statement level, [3] presents a model for both representing provenance of data and access to that data.  ... 
doi:10.1109/pst.2012.6297933 dblp:conf/pst/GolbeckWW12 fatcat:w52c6jpdnrfzvgfe3isz7ykvue

JSON and its use in Semantic Web

Mrinal Pandey, Rajiv Pandey
2017 International Journal of Computer Applications  
However in addition to embedding provenance data there is also a need to facilitate its easy availability for the client side for the purpose of manipulation and transportation accross.  ...  Intelligent information retrieval and the credibility of data is managed in semantic web by the use of Provenance.  ...  A bundle is a data structure that allows a provenance definition created for one entity to be specified for another entity.  ... 
doi:10.5120/ijca2017913722 fatcat:wve36wih6rdzzenacztcocszfm

TAPESTRY: A Blockchain based Service for Trusted Interaction Online [article]

Yifan Yang, Daniel Cooper, John Collomosse, Constantin C. Drăgan, Mark Manulis, Jamie Steane, Arthi Manohar, Jo Briggs, Helen Jones, Wendy Moncur
2019 arXiv   pre-print
This is enabled through a novel secure infrastructure combining hybrid on- and off-chain storage combined with deep learning for DP analytics and visualization.  ...  Our service harnesses the digital personhood (DP); the longitudinal and multi-modal signals created through users' lifelong digital interactions, as a basis for evidencing the provenance of identity.  ...  Storing the personally identifiable information off-chain, within one or more independent data lakes (DLs), provides a method of data capture that facilitates recovering data for verification purposes,  ... 
arXiv:1905.06186v1 fatcat:mahhi4rxzbgk7kf62cx57musx4

Citizen-Centric Linked Data Apps for Smart Cities [chapter]

Diego López-de-Ipiña, Sacha Vanhecke, Oscar Peña, Tom De Nies, Erik Mannens
2013 Lecture Notes in Computer Science  
This paper describes IES CITIES, a platform designed to facilitate the development of urban apps that exploit public data offered by councils and enriched by citizens.  ...  Open Government Data combined with dynamic data collected from either citywide sensor networks or apps running in citizens' smartphones offer ample potential for innovative urban services (apps) that realize  ...  This work fosters the generation of provenance-based trusted citizen contributed Linked Data.  ... 
doi:10.1007/978-3-319-03176-7_10 fatcat:xnkskslr6fgsbmvfaz3x7y6eue

Embedding data provenance into the Learning Health System to facilitate reproducible research

Vasa Curcin
2016 Learning Health Systems  
, and decision support, constructed on top of specific routes that the data is taking through the system.  ...  Data provenance technologies can automatically capture the trace of the research task and resulting data, thereby facilitating reproducible research.  ...  , and decision support, constructed on top of specific routes that the data are taking through the LHS.  ... 
doi:10.1002/lrh2.10019 pmid:31245557 pmcid:PMC6516719 fatcat:ym2kisnjdfgzpfzon6s4256o44

Assessing Quality in the Web of Linked Sensor Data

Chris Baillie, Peter Edwards, Edoardo Pignotti
2011 PROCEEDINGS OF THE THIRTIETH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE AND THE TWENTY-EIGHTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE  
Assessing the quality of sensor data available on the Web is essential in order to identify reliable information for decision-making.  ...  This paper discusses how provenance of sensor observations and previous quality ratings can influence quality assessment decisions.  ...  Miles et al (2006) have identified the documentation of data provenance as an essential step to support users to better understand, trust, reproduce and validate the data available on the Web.  ... 
doi:10.1609/aaai.v25i1.8044 fatcat:pun5ujmmtvegnmqitva4dtld4m

Blockchain for Healthcare: Securing Patient Data and Enabling Trusted Artificial Intelligence

H. S. Jennath, V S Anoop, S Asharaf
2020 International Journal of Interactive Multimedia and Artificial Intelligence  
It also helps the user to understand the revenue models that could be built on top of this framework for commercial data sharing to build trusted AI models.  ...  Provenance of the consent of individuals and traceability of data sources used for building and training the AI model is captured in an immutable distributed data store.  ...  patient through the patient on-boarding procedure.  ... 
doi:10.9781/ijimai.2020.07.002 fatcat:4pendnhr6rd3jd2dz7ns5ke4qa

Expressing FactDAG Provenance with PROV-O

Lars Christoph Gleim, Liam Tirpitz, Jan Pennekamp, Stefan Josef Decker
2020 CEUR Workshop Proceedings  
Data through simplified provenance management.  ...  To foster data sharing and reuse across organizational boundaries, provenance tracking is of vital importance for the establishment of trust and accountability, especially in industrial applications, but  ...  The critical importance of provenance information for data reuse [3] and trust and accountability for derived works has recently been highlighted by the retraction of a prominent study on COVID-19 treatments  ... 
doi:10.18154/rwth-conv-242783 fatcat:c6xkfrdzhng6fmy7h56gm7uir4

Evaluating Workflow Trust Using Hidden Markov Modeling and Provenance Data [chapter]

Mahsa Naseri, Simone A. Ludwig
2013 Studies in Computational Intelligence  
Current exploitation and application of provenance data is limited as provenance systems have been developed mainly for specific applications.  ...  We provide a new approach for evaluating workflow trust based on the Hidden Markov Model (HMM).  ...  The three requirements mentioned can be satisfied through provenance data. In [5] , the authors argue that a robust provenance trace provides multiple layered presentation of provenance.  ... 
doi:10.1007/978-3-642-29931-5_2 fatcat:jvqtpvoqh5h7jfp6uqwhzvwura
« Previous Showing results 1 — 15 out of 123,637 results