Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Shandong University of Technology(Natural Science Edition)》 2012-03
Add to Favorite Get Latest Update

Research on the integrity of data provenance based on Merkle tree

LIU Tong,WANG Feng-ying (School of Computer Science and Technology,Shandong University of Technology,Zibo 255091,China)  
Provenance can locate the mistakes in the process of data derived,it also can verify the credibility of the current data object.Both the needed integrity requirements and potential integrity threats of data provenance are analyzed.The integrity scheme is formulated mainly through the electronic signature and hash graph to ensure the integrity of provenance.Finally,we expound the safety of the scheme and put forward next study of securing provenance.
【Fund】: 山东省自然科学基金资助项目(ZRZ101FL003)
【CateGory Index】: TP393.0
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 2 Hits
1 DAI Chao-fan,WANG Tao,ZHANG Peng-cheng ( Key Laboratory of Science & Technology for National Defense of C4ISR Technology,College of Information System & Management,National University of Defense & Technology,Changsha 410073,China);Survey of data provenance technique[J];Application Research of Computers;2010-09
2 Li Yazi(National Science Library,Chinese Academy of Sciences,Beijing 100080,China)(Graduate University of Chinese Academy of Sciences,Beijing 100049,China);Data Provenance's Annotation Schema and Description Model[J];New Technology of Library and Information Service;2007-07
【Co-citations】
Chinese Journal Full-text Database 5 Hits
1 YUE Peng1,PENG Fei-fei1,2,GONG Jian-ya1(1.State Key Laboratory of Information Engineering in Surveying,Mapping & Remote Sensing,Wuhan University,Wuhan 430079;2.Institute of Survey and Mapping of Tianjin,Tianjin 300381,China);Research on SOA-Based Geospatial Data Provenance[J];Geography and Geo-Information Science;2010-03
2 TANG Yu1,CHEN Hao1,YE Bai-long2(1.School of Information Science and Engineering,Hunan University,Changsha 410082,China;2.School of Civil Engineering and Architecture,Central South University,Changsha 410083,China);Study of Real-time Heterogeneous Data Integration Model Based on Reverse Cleaning[J];Computer Engineering;2012-23
3 LIU Tong;WANG Feng-ying;School of Computer Science & Technology,Shandong University of Technology;;Security provenance model based on OPM[J];Application Research of Computers;2013-10
4 YAN Qian-qian,WANG Feng-ying(School of Computer Science and Technology,Shandong University of Technology,Zibo 255091,China);Secure data provenance scheme based on cloud computing[J];Journal of Shandong University of Technology(Natural Science Edition);2011-05
5 MING Hua1,ZHANG Yong1,2,3,FU Xiao-hui4 1(Department of Computer Science and Technology,Tsinghua University,Beijing 100084,China) 2(Research Institute of Information Technology,Tsinghua University,Beijing 100084,China) 3(Tsinghua National Laboratory for Information Science and Technology,Beijing 100084,China) 4(Beijing Yanqing 91290 Army,Beijing 102100,China);Survey of Data Provenance[J];Journal of Chinese Computer Systems;2012-09
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved