{"title":"基于传感器的数据密集型应用的网络溯源基础设施","authors":"E. Bertino, Murat Kantarcioglu","doi":"10.1109/IRI.2017.91","DOIUrl":null,"url":null,"abstract":"This paper focuses on cyber infrastructures composed on sensor networks and conventional host-based systems and applications. In such an infrastructure, assuring data trustworthiness is critical and requires the acquisition and recording of provenance information. This paper discusses research directions to be addressed towards the development of effective provenance management systems. Directions that are discussed include: services for provenance queries, provenance compression and encryption in sensor-based networks, and provenance interoperability and security in host-based systems.","PeriodicalId":254330,"journal":{"name":"2017 IEEE International Conference on Information Reuse and Integration (IRI)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications\",\"authors\":\"E. Bertino, Murat Kantarcioglu\",\"doi\":\"10.1109/IRI.2017.91\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper focuses on cyber infrastructures composed on sensor networks and conventional host-based systems and applications. In such an infrastructure, assuring data trustworthiness is critical and requires the acquisition and recording of provenance information. This paper discusses research directions to be addressed towards the development of effective provenance management systems. Directions that are discussed include: services for provenance queries, provenance compression and encryption in sensor-based networks, and provenance interoperability and security in host-based systems.\",\"PeriodicalId\":254330,\"journal\":{\"name\":\"2017 IEEE International Conference on Information Reuse and Integration (IRI)\",\"volume\":\"114 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 IEEE International Conference on Information Reuse and Integration (IRI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IRI.2017.91\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on Information Reuse and Integration (IRI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IRI.2017.91","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Cyber-Provenance Infrastructure for Sensor-Based Data-Intensive Applications
This paper focuses on cyber infrastructures composed on sensor networks and conventional host-based systems and applications. In such an infrastructure, assuring data trustworthiness is critical and requires the acquisition and recording of provenance information. This paper discusses research directions to be addressed towards the development of effective provenance management systems. Directions that are discussed include: services for provenance queries, provenance compression and encryption in sensor-based networks, and provenance interoperability and security in host-based systems.