Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information

16Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

Data collaborations allow users to draw upon diverse resources to solve complex problems. While collaborations enable a greater ability to manipulate data and services, they also create new security vulnerabilities. Collaboration participants need methods to detect suspicious behaviors (potentially caused by malicious insiders) and assess trust in information when it passes through many hands. In this work, we describe these challenges and introduce provenance as a way to solve them. We describe a provenance system, PLUS, and show how it can be used to assist in assessing trust and detecting suspicious behaviors. A preliminary study shows this to be a promising direction for future research. © 2011 ICST.

Cite

CITATION STYLE

APA

Allen, M. D., Chapman, A., Seligman, L., & Blaustein, B. (2011). Provenance for collaboration: Detecting suspicious behaviors and assessing trust in information. In ColiaborateCom 2011 - Proceedings of the 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (pp. 342–351). https://doi.org/10.4108/icst.collaboratecom.2011.247131

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free