{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:51:05Z","timestamp":1742982665046,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319170152"},{"type":"electronic","value":"9783319170169"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-17016-9_2","type":"book-chapter","created":{"date-parts":[[2015,3,29]],"date-time":"2015-03-29T00:52:41Z","timestamp":1427590361000},"page":"17-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Data Trustworthiness\u2014Approaches and Research Challenges"],"prefix":"10.1007","author":[{"given":"Elisa","family":"Bertino","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,28]]},"reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Bertino, E.: Protection from Insider Threats. Morgan&Claypool, San Rafael (2012)","DOI":"10.1007\/978-3-031-01890-9"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Lim, H.S., Moon, Y.-S., Bertino, E.: Provenance-based trustworthiness assessment in sensor networks. In: Proceedings of the 7th International Workshop on Data Management for Sensor Network (DMSN\u201910). Singapore (2010)","DOI":"10.1145\/1858158.1858162"},{"key":"2_CR3","unstructured":"Biba, K.J.: Integrity Considerations for Secure Computer Systems. Technical Report TR-3153, Mitre (1977)"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Twelfth International World Wide Web Conference, pp. 640\u2013651. ACM (2003)","DOI":"10.1145\/775152.775242"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Clark, D.D., Wilson, D.R.: A comparison of commercial and military computer security policies. In: Proceedings of IEEE Symposium on Security and Privacy Symposium, Oakland (CA) (1987)","DOI":"10.1109\/SP.1987.10001"},{"key":"2_CR6","volume-title":"Juran on Leadership for Quality\u2014an Executive Handbook","author":"JM Juran","year":"1989","unstructured":"Juran, J.M.: Juran on Leadership for Quality\u2014an Executive Handbook. Free Press, New York (1989)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Kahn, B., Strong, D., Wang, R.: Information Quality Benchmarks: Product and Service Performance. Communications of the ACM, vol. 45, pp. 184\u2013192. ACM (2002)","DOI":"10.1145\/505248.506007"},{"key":"2_CR8","unstructured":"Price, R., Shanks, G.: A semiotic information quality framework. In: IFIP International Conference on Decision Support Systems: Decision Support in an Uncertain and Complex World. Prato (Italy) (2004)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Wand, Y., Wang, R.Y.: Anchoring Data Quality Dimensions in Ontological Foundations. Communications of the ACM, vol. 39, pp. 86\u201395. ACM (1996)","DOI":"10.1145\/240455.240479"},{"key":"2_CR10","unstructured":"Batini, C., Scannapieco, M.: Data Quality: Concepts, Methodologies and Techniques. Springer (2006)"},{"key":"2_CR11","unstructured":"Levien, R:. Attack resistant trust metrics. PhD thesis, University of California\u2014Berkeley, CA, USA (2002)"},{"key":"2_CR12","unstructured":"Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: Secure data aggregation for wireless sensor networks. IEEE transactions on dependable and secure computing. In press (2014)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Lim, H.S., Ghinita, G., Bertino, E., Kantarcioglu, M.: A game-theoretic approach for high-assurance of data trustworthiness in sensor networks. In Proceedings of IEEE 28th International Conference on Data Engineering (ICDE\u201912), Washington (DC) (2012)","DOI":"10.1109\/ICDE.2012.78"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Rezvani, M., Ignjatovic, A., Bertino, E., Jha, S.: A robust iterative filtering technique for wireless sensor networks in the presence of malicious attacks. poster abstract. In: Proceedings of ACM Sensys\u201913 Conference. Rome (Italy) (2013)","DOI":"10.1145\/2517351.2517394"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1145\/1187441.1187443","volume":"9","author":"G Mella","year":"2006","unstructured":"Mella, G., Ferrari, E., Bertino, E., Koglin, Y.: Controlled and cooperative updates of XML documents in byzantine and failure-prone distributed Systems. ACM Trans. Inf. Syst. Secur. 9, 421\u2013460 (2006)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"2_CR16","unstructured":"Wang, C., Hussein, S.R., Bertino, E.: Dictionary based secure provenance compression for wireless sensor networks. IEEE transactions on parallel and distributed systems, in press (2014)"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Hussein, S.R., Wang, C., Sultana, S., Bertino, E.: Secure data provenance compression using arithmetic coding in wireless sensor networks. In: Proceedings of 33rd IEEE International Performance Computing and Communications Conference (IPCCC 2014), Phoenix (AZ) in press (2014)","DOI":"10.1109\/PCCC.2014.7017068"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Scannapieco, M., Figotin, I., Bertino, E., Elmagarmid, A.: Privacy preserving schema and data matching. In: ACM SIGMOD International Conference on Management of Data, pp. 653\u2013664 (2007)","DOI":"10.1145\/1247480.1247553"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Inan, A., Kantarcioglu, M., Bertino, E., Scannapieco, M.: A hybrid approach to private record linkage. In: 24th IEEE International Conference on Data Engineering, pp. 496\u2013505 (2008)","DOI":"10.1109\/ICDE.2008.4497458"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Cao, J., Rao, F.-Y., Bertino, E., Kantarcioglu, M.: A hybrid private record linkage scheme: separating differentially private synopses from matching records. In: Proceedings of IEEE 31st International Conference on Data Engineering (ICDE\u201915), Seoul Korea in press (2015)","DOI":"10.1109\/ICDE.2015.7113352"},{"key":"2_CR21","doi-asserted-by":"crossref","DOI":"10.1515\/9781400833993","volume-title":"Social and Economics Networks","author":"MO Jackson","year":"2008","unstructured":"Jackson, M.O.: Social and Economics Networks. Princeton University Press, Princeton (2008)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-17016-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T00:26:01Z","timestamp":1676939161000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-17016-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319170152","9783319170169"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-17016-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}