A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks.
Idrees AhmedAbid KhanAdeel AnjumMansoor AhmedMuhammad Asif HabibPublished in: Int. J. Parallel Program. (2020)
Keyphrases
- rights management
- computer networks
- distributed systems
- authentication scheme
- multiple users
- peer to peer networks
- fault tolerant
- user interface
- lightweight
- heterogeneous networks
- key distribution
- group communication
- user interaction
- provenance information
- secret sharing
- network resources
- distributed environment
- end users
- network nodes
- key management scheme
- using semantic web technologies
- public key encryption
- key management
- multi party
- metadata
- network structure
- collaborative filtering
- viral marketing
- user privacy
- remote server
- recommender systems
- social networks
- databases