Log in
Language:

MERAL Myanmar Education Research and Learning Portal

  • Top
  • Universities
  • Ranking
To
lat lon distance
To

Field does not validate



Index Link

Index Tree

Please input email address.

WEKO

One fine body…

WEKO

One fine body…

Item

{"_buckets": {"deposit": "24e4d61b-0069-4b8e-869c-601a7bed92fa"}, "_deposit": {"id": "4791", "owners": [], "pid": {"revision_id": 0, "type": "recid", "value": "4791"}, "status": "published"}, "_oai": {"id": "oai:meral.edu.mm:recid/4791", "sets": ["user-ucsy"]}, "communities": ["ucsy"], "item_1583103067471": {"attribute_name": "Title", "attribute_value_mlt": [{"subitem_1551255647225": "Time-stamp Oriented Efficient Secure Provenance Scheme", "subitem_1551255648112": "en"}]}, "item_1583103085720": {"attribute_name": "Description", "attribute_value_mlt": [{"interim": "The amount of valuable information, which is stored and shared digitally on online and cloud computing, is dynamically increasing. So, the storage and sharing service providers must have the ability to identify the ownership and access history of each object for trustworthiness. The provenance is the most promising technology for this ability. Although the small numbers of researches have been done for secure provenance, they are weak in overhead and supporting integrity. So, this paper proposes the new secure provenance scheme to solve these weak points. In the proposed scheme, H (Dout) is created for data integrity and C and IToken are constructed for chain integrity. For chain integrity constructions, this scheme takes only the essential materials of previous and next provenance records instead of all other provenance records to reduce overhead. This scheme also provides the privacy (confidentiality) for user’s sensitive data using broadcast encryption with divisive clustering algorithm."}]}, "item_1583103108160": {"attribute_name": "Keywords", "attribute_value": []}, "item_1583103120197": {"attribute_name": "Files", "attribute_type": "file", "attribute_value": []}, "item_1583103131163": {"attribute_name": "Journal articles", "attribute_value_mlt": [{"subitem_issue": "", "subitem_journal_title": "Eleventh International Conference On Computer Applications (ICCA 2013)", "subitem_pages": "", "subitem_volume": ""}]}, "item_1583103147082": {"attribute_name": "Conference papers", "attribute_value_mlt": [{"subitem_acronym": "", "subitem_c_date": "", "subitem_conference_title": "", "subitem_part": "", "subitem_place": "", "subitem_session": "", "subitem_website": ""}]}, "item_1583103211336": {"attribute_name": "Books/reports/chapters", "attribute_value_mlt": [{"subitem_book_title": "", "subitem_isbn": "", "subitem_pages": "", "subitem_place": "", "subitem_publisher": ""}]}, "item_1583103233624": {"attribute_name": "Thesis/dissertations", "attribute_value_mlt": [{"subitem_awarding_university": "", "subitem_supervisor(s)": [{"subitem_supervisor": ""}]}]}, "item_1583105942107": {"attribute_name": "Authors", "attribute_value_mlt": [{"subitem_authors": [{"subitem_authors_fullname": "Aye, Myat Mon"}, {"subitem_authors_fullname": "Soe, Than Naing"}]}]}, "item_1583108359239": {"attribute_name": "Upload type", "attribute_value_mlt": [{"interim": "Publication"}]}, "item_1583108428133": {"attribute_name": "Publication type", "attribute_value_mlt": [{"interim": "Article"}]}, "item_1583159729339": {"attribute_name": "Publication date", "attribute_value": "2013-02-26"}, "item_1583159847033": {"attribute_name": "Identifier", "attribute_value": "http://onlineresource.ucsy.edu.mm/handle/123456789/684"}, "item_title": "Time-stamp Oriented Efficient Secure Provenance Scheme", "item_type_id": "21", "owner": "1", "path": ["1597824273898"], "permalink_uri": "http://hdl.handle.net/20.500.12678/0000004791", "pubdate": {"attribute_name": "Deposited date", "attribute_value": "2019-07-11"}, "publish_date": "2019-07-11", "publish_status": "0", "recid": "4791", "relation": {}, "relation_version_is_last": true, "title": ["Time-stamp Oriented Efficient Secure Provenance Scheme"], "weko_shared_id": -1}
  1. University of Computer Studies, Yangon
  2. Conferences

Time-stamp Oriented Efficient Secure Provenance Scheme

http://hdl.handle.net/20.500.12678/0000004791
http://hdl.handle.net/20.500.12678/0000004791
6b7312b5-5d7a-473c-b4a4-fdf714e01cea
24e4d61b-0069-4b8e-869c-601a7bed92fa
Back
0
0
views
downloads
See details
Views Downloads

Versions

Ver.1 2020-09-01 15:21:33.193103
Show All versions

Share

Mendeley Twitter Facebook Print Addthis

Export

OAI-PMH
  • OAI-PMH DublinCore
Other Formats
  • JSON

Confirm


Back to MERAL


Back to MERAL