Energy-efficient provenance transmission in large-scale wireless sensor networks, IEEE Int'l Symposium on a World of Wireless, Mobile and Multimedia Networks, 2011. ,
Trust management for encounter-based touting in delay tolerant networks, IEEE Global Telecommunications Conf, pp.1-6, 2010. ,
DOI : 10.1109/glocom.2010.5683235
A Survey on Trust Management for Mobile Ad Hoc Networks, IEEE Communications Surveys & Tutorials, vol.13, issue.4, pp.562-583, 2011. ,
DOI : 10.1109/SURV.2011.092110.00088
An Approach to Evaluate Data Trustworthiness Based on Data Provenance, Proc. 5 th VLDB Workshop on Secure Data Management, pp.82-98, 2008. ,
DOI : 10.1007/978-3-540-85259-9_6
Provenance for Computational Tasks: A Survey, Computing in Science & Engineering, vol.10, issue.3, pp.11-21, 2008. ,
DOI : 10.1109/MCSE.2008.79
Combining Provenance with Trust in Social Networks for Semantic Web Content Filtering, Provenance and Annotation of Data, pp.101-108, 2006. ,
DOI : 10.1007/11890850_12
Provenance-based trustworthiness assessment in sensor networks, Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, DMSN '10, 2010. ,
DOI : 10.1145/1858158.1858162
A provenance-aware virtual sensor system using the Open Provenance Model, 2010 International Symposium on Collaborative Technologies and Systems, pp.330-339, 2010. ,
DOI : 10.1109/CTS.2010.5478496
Data Provenance and Security, IEEE Security & Privacy Magazine, vol.9, issue.2, pp.83-85, 2011. ,
DOI : 10.1109/MSP.2011.27
The open provenance model: an overview, " Int'l Provenance and Annotation Workshop, LNCS, vol.5272, pp.323-326, 2008. ,
DOI : 10.1007/978-3-540-89965-5_31
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.148.7394
Evaluating Provenance-based Trust for Scientific Workflows, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06), pp.365-372, 2006. ,
DOI : 10.1109/CCGRID.2006.43
Routing for disruption tolerant networks: taxonomy and design, Wireless Networks, vol.7, issue.4, pp.2349-2370, 2010. ,
DOI : 10.1007/s11276-010-0276-9
URL : http://escholarship.org/uc/item/7ws78441.pdf
Provenance-driven data dissemination in disruption tolerant networks, Proc. 14 th Int'l Conf. on Information Fusion, 2011. ,
A Provenance Based Mechanism to Identify Malicious Packet Dropping Adversaries in Sensor Networks, 2011 31st International Conference on Distributed Computing Systems Workshops, pp.332-338, 2011. ,
DOI : 10.1109/ICDCSW.2011.54
Collusion-resilient quality of information evaluation based on information provenance, th Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks, pp.395-403, 2011. ,
A Demspter-Shafer approach to provenance-aware trust assessment, Int'l Symposium on Collaborative Technologies and Systems, pp.383-390, 2008. ,