{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:09:57Z","timestamp":1729624197408,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/milcom.2011.6127466","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T16:34:31Z","timestamp":1330619671000},"page":"1213-1218","source":"Crossref","is-referenced-by-count":4,"title":["PRONET: Network trust assessment based on incomplete provenance"],"prefix":"10.1109","author":[{"given":"Kannan","family":"Govindan","sequence":"first","affiliation":[]},{"given":"Xinlei","family":"Wang","sequence":"additional","affiliation":[]},{"family":"Maifi Khan","sequence":"additional","affiliation":[]},{"given":"Gulustan","family":"Dogan","sequence":"additional","affiliation":[]},{"family":"Kai Zeng","sequence":"additional","affiliation":[]},{"given":"Gerald M","family":"Powell","sequence":"additional","affiliation":[]},{"given":"Ted","family":"Brown","sequence":"additional","affiliation":[]},{"given":"Tarekh","family":"Abdelzaher","sequence":"additional","affiliation":[]},{"given":"Prasant","family":"Mohapatra","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Provenance-aware secure networks","author":"zhou","year":"0","journal-title":"Proceedings of the International Conference on Data Engi- Neering Workshops (ICDE) 2008"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1653771.1653810"},{"key":"10","first-page":"487","article-title":"Fast algorithms for mining association rules","author":"agrawal","year":"1994","journal-title":"Proceedings of Twentieth International Conference on Very Large Data Bases"},{"key":"1","first-page":"164","article-title":"TIUPAM: A Framework for Trustworthiness-centric Assured Information Sharing","author":"xu","year":"2009","journal-title":"The 3rd IFIP International Conference on Trust Management (TM'09)"},{"key":"7","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-540-85259-9_6","article-title":"An approach to evaluate data trustworthiness based on data provenance","author":"dai","year":"2008","journal-title":"Proceedings of the 5th VLDB Workshop on Secure Data Management"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5684158"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1329125.1329376"},{"key":"4","article-title":"Issues in automatic provenance collection","author":"braun","year":"0","journal-title":"Proc of the IPAW 2006"},{"key":"9","first-page":"231","volume":"87","author":"migliore","year":"1990","journal-title":"An Algorithm to Find All Paths between Two Nodes in A Graph"},{"key":"8","article-title":"Collusion-resilient Quality of Information Evaluation Based on Information Provenance","author":"wang","year":"0","journal-title":"IEEE SECON-11 2011"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460423"}],"event":{"name":"MILCOM 2011 - 2011 IEEE Military Communications Conference","start":{"date-parts":[[2011,11,7]]},"location":"Baltimore, MD, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 - MILCOM 2011 Military Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6111660\/6127424\/06127466.pdf?arnumber=6127466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T15:03:38Z","timestamp":1497971018000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6127466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/milcom.2011.6127466","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}