SlideShare a Scribd company logo
1 of 9
Download to read offline
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partnerspartners
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
Provenance as a Key Factor for
Privacy-proof Trust
Davide Ceolin
Slide titel - PT Sans - 28pt
Maecenas faucibus mollis interdum.
Cum sociis natoque penatibus et magnis dis parturient montes,
nascetur ridiculus mus.
Aenean eu leo quam.
Pellentesque ornare sem lacinia quam
venenatis vestibulum.
Morbi leo risus, porta ac consectetur ac,
vestibulum at eros.
This is the presentation title www.amsterdamdatascience.nl
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust
• Cold-start Problem.
We need observations to build user reputations.
• Privacy Intrusion.
Knowledge about individuals reduces uncertainty.
• Inaccurate Point-wise Prediction.
Reputations are asymptotically correct.
Open Issues
Slide titel - PT Sans - 28pt
Maecenas faucibus mollis interdum.
Cum sociis natoque penatibus et magnis dis parturient montes,
nascetur ridiculus mus.
Aenean eu leo quam.
Pellentesque ornare sem lacinia quam
venenatis vestibulum.
Morbi leo risus, porta ac consectetur ac,
vestibulum at eros.
This is the presentation title www.amsterdamdatascience.nl
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust
• Reputation systems are (mostly) user-centric.
• Besides the who we can use also the when, where and how
provenance.
Provenance for Trust Estimation
waisda.nl
Slide titel - PT Sans - 28pt
Maecenas faucibus mollis interdum.
Cum sociis natoque penatibus et magnis dis parturient montes,
nascetur ridiculus mus.
Aenean eu leo quam.
Pellentesque ornare sem lacinia quam
venenatis vestibulum.
Morbi leo risus, porta ac consectetur ac,
vestibulum at eros.
This is the presentation title www.amsterdamdatascience.nl
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust
• Provenance traces are fine-grained representations of how data came
to be.
• To derive trust estimations we need to identify links and regularities.
• We proposed to use provenance stereotypes:
• Clusters of provenance traces representing user behaviours 

(e.g., early-morning weekend contributors).
Provenance for Trust Estimation
Slide titel - PT Sans - 28pt
Maecenas faucibus mollis interdum.
Cum sociis natoque penatibus et magnis dis parturient montes,
nascetur ridiculus mus.
Aenean eu leo quam.
Pellentesque ornare sem lacinia quam
venenatis vestibulum.
Morbi leo risus, porta ac consectetur ac,
vestibulum at eros.
This is the presentation title www.amsterdamdatascience.nl
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust
• By aggregating traces, we can increase the availability of reputations:
• Users might be unknown, but their behaviour could be well-known.
• This helps mitigating uncertainty.
Provenance vs. cold-start
Slide titel - PT Sans - 28pt
Maecenas faucibus mollis interdum.
Cum sociis natoque penatibus et magnis dis parturient montes,
nascetur ridiculus mus.
Aenean eu leo quam.
Pellentesque ornare sem lacinia quam
venenatis vestibulum.
Morbi leo risus, porta ac consectetur ac,
vestibulum at eros.
This is the presentation title www.amsterdamdatascience.nl
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust
• Users tend to adopt uniform behaviours.
• We can focus on the provenance stereotype (and hence on the cluster
of users) rather than on individuals.
• This adds an obfuscation layer.
Provenance vs. privacy intrusion
Slide titel - PT Sans - 28pt
Maecenas faucibus mollis interdum.
Cum sociis natoque penatibus et magnis dis parturient montes,
nascetur ridiculus mus.
Aenean eu leo quam.
Pellentesque ornare sem lacinia quam
venenatis vestibulum.
Morbi leo risus, porta ac consectetur ac,
vestibulum at eros.
This is the presentation title www.amsterdamdatascience.nl
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust
• Probabilistic reputations are asymptotically accurate.
• Combining individual reputations with stereotypes:
• improves accuracy;
• allows discriminating among user contributions.
Provenance for point-wise predictions
Slide titel - PT Sans - 28pt
Maecenas faucibus mollis interdum.
Cum sociis natoque penatibus et magnis dis parturient montes,
nascetur ridiculus mus.
Aenean eu leo quam.
Pellentesque ornare sem lacinia quam
venenatis vestibulum.
Morbi leo risus, porta ac consectetur ac,
vestibulum at eros.
This is the presentation title www.amsterdamdatascience.nl
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust
• We adopted provenance stereotypes in a few Cultural Heritage case
studies.
• The creation of stereotypes needs to be standardised in order to
balance:
• performance (accuracy and efficiency);
• evidence availability;
• privacy.
Conclusion
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partnerspartners
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
This is the presentation title
this subline can be used for authors
partners
Thanks
d.ceolin@vu.nl

More Related Content

Viewers also liked

Portfolio
PortfolioPortfolio
Portfoliot4toast
 
問題定義測驗結果說明 道德發展階段
問題定義測驗結果說明 道德發展階段問題定義測驗結果說明 道德發展階段
問題定義測驗結果說明 道德發展階段andreahc
 
Joel of Software 中文版 1~6章導讀
Joel of Software 中文版 1~6章導讀Joel of Software 中文版 1~6章導讀
Joel of Software 中文版 1~6章導讀孟秋 李
 
Embedded linux in_timeandspace_weinberg_2
Embedded linux in_timeandspace_weinberg_2Embedded linux in_timeandspace_weinberg_2
Embedded linux in_timeandspace_weinberg_2hamed sheykhlu
 
Presentation2[1]
Presentation2[1]Presentation2[1]
Presentation2[1]o.m.garcia
 
Hur räknar du egentligen?
Hur räknar du egentligen?Hur räknar du egentligen?
Hur räknar du egentligen?Klimatkommunerna
 
Codename Astm1
Codename Astm1Codename Astm1
Codename Astm1ASTM1
 
Slideshow My Prato
Slideshow My PratoSlideshow My Prato
Slideshow My Pratoguest8bf0c5c
 
Prioritizing For Profit at Agile 08
Prioritizing For Profit at Agile 08Prioritizing For Profit at Agile 08
Prioritizing For Profit at Agile 08Enthiosys Inc
 
Örjan Lönngren - Energianvändning kopplat till tillagning
Örjan Lönngren - Energianvändning kopplat till tillagningÖrjan Lönngren - Energianvändning kopplat till tillagning
Örjan Lönngren - Energianvändning kopplat till tillagningKlimatkommunerna
 
What's New in NovaView 6 Deck
What's New in NovaView 6 DeckWhat's New in NovaView 6 Deck
What's New in NovaView 6 Deckwww.panorama.com
 
David Williams Photography
David Williams PhotographyDavid Williams Photography
David Williams Photographyfotoman100
 
Nevada leadership presentation
Nevada leadership presentationNevada leadership presentation
Nevada leadership presentationmegormi
 
Affiliate marketing: the bleeding edge
Affiliate marketing: the bleeding edgeAffiliate marketing: the bleeding edge
Affiliate marketing: the bleeding edgeDigi Joe
 
La Narracion
La NarracionLa Narracion
La Narracionmgartal
 

Viewers also liked (20)

Aim Presentation
Aim PresentationAim Presentation
Aim Presentation
 
Portfolio
PortfolioPortfolio
Portfolio
 
問題定義測驗結果說明 道德發展階段
問題定義測驗結果說明 道德發展階段問題定義測驗結果說明 道德發展階段
問題定義測驗結果說明 道德發展階段
 
Joel of Software 中文版 1~6章導讀
Joel of Software 中文版 1~6章導讀Joel of Software 中文版 1~6章導讀
Joel of Software 中文版 1~6章導讀
 
Mlc Rup Value
Mlc Rup ValueMlc Rup Value
Mlc Rup Value
 
Embedded linux in_timeandspace_weinberg_2
Embedded linux in_timeandspace_weinberg_2Embedded linux in_timeandspace_weinberg_2
Embedded linux in_timeandspace_weinberg_2
 
Presentation2[1]
Presentation2[1]Presentation2[1]
Presentation2[1]
 
Hur räknar du egentligen?
Hur räknar du egentligen?Hur räknar du egentligen?
Hur räknar du egentligen?
 
Codename Astm1
Codename Astm1Codename Astm1
Codename Astm1
 
Slideshow My Prato
Slideshow My PratoSlideshow My Prato
Slideshow My Prato
 
Prioritizing For Profit at Agile 08
Prioritizing For Profit at Agile 08Prioritizing For Profit at Agile 08
Prioritizing For Profit at Agile 08
 
Örjan Lönngren - Energianvändning kopplat till tillagning
Örjan Lönngren - Energianvändning kopplat till tillagningÖrjan Lönngren - Energianvändning kopplat till tillagning
Örjan Lönngren - Energianvändning kopplat till tillagning
 
What's New in NovaView 6 Deck
What's New in NovaView 6 DeckWhat's New in NovaView 6 Deck
What's New in NovaView 6 Deck
 
David Williams Photography
David Williams PhotographyDavid Williams Photography
David Williams Photography
 
Nevada leadership presentation
Nevada leadership presentationNevada leadership presentation
Nevada leadership presentation
 
Mlc The BO Explained
Mlc The BO ExplainedMlc The BO Explained
Mlc The BO Explained
 
Affiliate marketing: the bleeding edge
Affiliate marketing: the bleeding edgeAffiliate marketing: the bleeding edge
Affiliate marketing: the bleeding edge
 
Unenclosable
UnenclosableUnenclosable
Unenclosable
 
La Narracion
La NarracionLa Narracion
La Narracion
 
Unenclosable
UnenclosableUnenclosable
Unenclosable
 

Similar to Provenance as a Key Factor for Privacy-proof Trust

Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issuesElasticsearch
 
Points Don't Mean Prizes
Points Don't Mean PrizesPoints Don't Mean Prizes
Points Don't Mean PrizesAdrian Howard
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issuesElasticsearch
 
Data Migration Plan PowerPoint Presentation Slides
Data Migration Plan PowerPoint Presentation SlidesData Migration Plan PowerPoint Presentation Slides
Data Migration Plan PowerPoint Presentation SlidesSlideTeam
 
Innovation Framework Organisation Management Business Resources Corporate Funnel
Innovation Framework Organisation Management Business Resources Corporate FunnelInnovation Framework Organisation Management Business Resources Corporate Funnel
Innovation Framework Organisation Management Business Resources Corporate FunnelSlideTeam
 
Building on the Shoulders of Giants: the Story of Bitbucket Pipelines
Building on the Shoulders of Giants: the Story of Bitbucket PipelinesBuilding on the Shoulders of Giants: the Story of Bitbucket Pipelines
Building on the Shoulders of Giants: the Story of Bitbucket PipelinesAtlassian
 
Smart Data Webinar (SLIDES): Agile Enterprise Ontology
Smart Data Webinar (SLIDES): Agile Enterprise OntologySmart Data Webinar (SLIDES): Agile Enterprise Ontology
Smart Data Webinar (SLIDES): Agile Enterprise OntologyDATAVERSITY
 
Final ppt.pptx
Final ppt.pptxFinal ppt.pptx
Final ppt.pptxAsegid5
 
Product development at NerdWallet: Why user research is pivotal
Product development at NerdWallet: Why user research is pivotalProduct development at NerdWallet: Why user research is pivotal
Product development at NerdWallet: Why user research is pivotalUserTesting
 
Use Amazon Comprehend and Amazon SageMaker to Gain Insight from Text
Use Amazon Comprehend and Amazon SageMaker to Gain Insight from TextUse Amazon Comprehend and Amazon SageMaker to Gain Insight from Text
Use Amazon Comprehend and Amazon SageMaker to Gain Insight from TextAmazon Web Services
 
Research Framework Proposal Methodology Experience Consumer Marketing Communi...
Research Framework Proposal Methodology Experience Consumer Marketing Communi...Research Framework Proposal Methodology Experience Consumer Marketing Communi...
Research Framework Proposal Methodology Experience Consumer Marketing Communi...SlideTeam
 
Duplicate Slide (Delete-Verify Version)
Duplicate Slide (Delete-Verify Version)Duplicate Slide (Delete-Verify Version)
Duplicate Slide (Delete-Verify Version)LavaCon
 
Oren - Building a Digital Experience that Supports Your Customer's Journey
Oren - Building a Digital Experience that Supports Your Customer's Journey Oren - Building a Digital Experience that Supports Your Customer's Journey
Oren - Building a Digital Experience that Supports Your Customer's Journey LavaCon
 
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean CampbellSourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean CampbellReynolds Center for Business Journalism
 
Sales Methods And Techniques PowerPoint Presentation Slides
Sales Methods And Techniques PowerPoint Presentation SlidesSales Methods And Techniques PowerPoint Presentation Slides
Sales Methods And Techniques PowerPoint Presentation SlidesSlideTeam
 
Building Text Analytics Solutions with AWS ML Services
Building Text Analytics Solutions with AWS ML ServicesBuilding Text Analytics Solutions with AWS ML Services
Building Text Analytics Solutions with AWS ML ServicesAmazon Web Services
 
Operationalizing Data Science St. Louis Big Data IDEA
Operationalizing Data Science St. Louis Big Data IDEAOperationalizing Data Science St. Louis Big Data IDEA
Operationalizing Data Science St. Louis Big Data IDEAAdam Doyle
 
Sales Methods And Techniques Powerpoint Presentation Slides
Sales Methods And Techniques Powerpoint Presentation SlidesSales Methods And Techniques Powerpoint Presentation Slides
Sales Methods And Techniques Powerpoint Presentation SlidesSlideTeam
 
NEW LAUNCH! Natural Language Processing for Data Analytics - MCL343 - re:Inve...
NEW LAUNCH! Natural Language Processing for Data Analytics - MCL343 - re:Inve...NEW LAUNCH! Natural Language Processing for Data Analytics - MCL343 - re:Inve...
NEW LAUNCH! Natural Language Processing for Data Analytics - MCL343 - re:Inve...Amazon Web Services
 
Business Dissertation Proposal PowerPoint Presentation Slides
Business Dissertation Proposal PowerPoint Presentation SlidesBusiness Dissertation Proposal PowerPoint Presentation Slides
Business Dissertation Proposal PowerPoint Presentation SlidesSlideTeam
 

Similar to Provenance as a Key Factor for Privacy-proof Trust (20)

Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Points Don't Mean Prizes
Points Don't Mean PrizesPoints Don't Mean Prizes
Points Don't Mean Prizes
 
Get full visibility and find hidden security issues
Get full visibility and find hidden security issuesGet full visibility and find hidden security issues
Get full visibility and find hidden security issues
 
Data Migration Plan PowerPoint Presentation Slides
Data Migration Plan PowerPoint Presentation SlidesData Migration Plan PowerPoint Presentation Slides
Data Migration Plan PowerPoint Presentation Slides
 
Innovation Framework Organisation Management Business Resources Corporate Funnel
Innovation Framework Organisation Management Business Resources Corporate FunnelInnovation Framework Organisation Management Business Resources Corporate Funnel
Innovation Framework Organisation Management Business Resources Corporate Funnel
 
Building on the Shoulders of Giants: the Story of Bitbucket Pipelines
Building on the Shoulders of Giants: the Story of Bitbucket PipelinesBuilding on the Shoulders of Giants: the Story of Bitbucket Pipelines
Building on the Shoulders of Giants: the Story of Bitbucket Pipelines
 
Smart Data Webinar (SLIDES): Agile Enterprise Ontology
Smart Data Webinar (SLIDES): Agile Enterprise OntologySmart Data Webinar (SLIDES): Agile Enterprise Ontology
Smart Data Webinar (SLIDES): Agile Enterprise Ontology
 
Final ppt.pptx
Final ppt.pptxFinal ppt.pptx
Final ppt.pptx
 
Product development at NerdWallet: Why user research is pivotal
Product development at NerdWallet: Why user research is pivotalProduct development at NerdWallet: Why user research is pivotal
Product development at NerdWallet: Why user research is pivotal
 
Use Amazon Comprehend and Amazon SageMaker to Gain Insight from Text
Use Amazon Comprehend and Amazon SageMaker to Gain Insight from TextUse Amazon Comprehend and Amazon SageMaker to Gain Insight from Text
Use Amazon Comprehend and Amazon SageMaker to Gain Insight from Text
 
Research Framework Proposal Methodology Experience Consumer Marketing Communi...
Research Framework Proposal Methodology Experience Consumer Marketing Communi...Research Framework Proposal Methodology Experience Consumer Marketing Communi...
Research Framework Proposal Methodology Experience Consumer Marketing Communi...
 
Duplicate Slide (Delete-Verify Version)
Duplicate Slide (Delete-Verify Version)Duplicate Slide (Delete-Verify Version)
Duplicate Slide (Delete-Verify Version)
 
Oren - Building a Digital Experience that Supports Your Customer's Journey
Oren - Building a Digital Experience that Supports Your Customer's Journey Oren - Building a Digital Experience that Supports Your Customer's Journey
Oren - Building a Digital Experience that Supports Your Customer's Journey
 
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean CampbellSourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
Sourcing with Social Media: Tips from a Corporate Sleuth by Sean Campbell
 
Sales Methods And Techniques PowerPoint Presentation Slides
Sales Methods And Techniques PowerPoint Presentation SlidesSales Methods And Techniques PowerPoint Presentation Slides
Sales Methods And Techniques PowerPoint Presentation Slides
 
Building Text Analytics Solutions with AWS ML Services
Building Text Analytics Solutions with AWS ML ServicesBuilding Text Analytics Solutions with AWS ML Services
Building Text Analytics Solutions with AWS ML Services
 
Operationalizing Data Science St. Louis Big Data IDEA
Operationalizing Data Science St. Louis Big Data IDEAOperationalizing Data Science St. Louis Big Data IDEA
Operationalizing Data Science St. Louis Big Data IDEA
 
Sales Methods And Techniques Powerpoint Presentation Slides
Sales Methods And Techniques Powerpoint Presentation SlidesSales Methods And Techniques Powerpoint Presentation Slides
Sales Methods And Techniques Powerpoint Presentation Slides
 
NEW LAUNCH! Natural Language Processing for Data Analytics - MCL343 - re:Inve...
NEW LAUNCH! Natural Language Processing for Data Analytics - MCL343 - re:Inve...NEW LAUNCH! Natural Language Processing for Data Analytics - MCL343 - re:Inve...
NEW LAUNCH! Natural Language Processing for Data Analytics - MCL343 - re:Inve...
 
Business Dissertation Proposal PowerPoint Presentation Slides
Business Dissertation Proposal PowerPoint Presentation SlidesBusiness Dissertation Proposal PowerPoint Presentation Slides
Business Dissertation Proposal PowerPoint Presentation Slides
 

More from Davide Ceolin

Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Davide Ceolin
 
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 Davide Ceolin
 
Semi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessSemi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessDavide Ceolin
 
Subjective Logic Extensions for the Web and the Semantic Web
Subjective Logic Extensions for the Web and the Semantic WebSubjective Logic Extensions for the Web and the Semantic Web
Subjective Logic Extensions for the Web and the Semantic WebDavide Ceolin
 
Trust Evaluation through User Reputation and Provenance Analysis
Trust Evaluation through User Reputation and Provenance AnalysisTrust Evaluation through User Reputation and Provenance Analysis
Trust Evaluation through User Reputation and Provenance AnalysisDavide Ceolin
 

More from Davide Ceolin (11)

Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
 
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
 
VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6
 
VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5
 
VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4
 
VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3
 
VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2
 
VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1
 
Semi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessSemi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation Trustworthiness
 
Subjective Logic Extensions for the Web and the Semantic Web
Subjective Logic Extensions for the Web and the Semantic WebSubjective Logic Extensions for the Web and the Semantic Web
Subjective Logic Extensions for the Web and the Semantic Web
 
Trust Evaluation through User Reputation and Provenance Analysis
Trust Evaluation through User Reputation and Provenance AnalysisTrust Evaluation through User Reputation and Provenance Analysis
Trust Evaluation through User Reputation and Provenance Analysis
 

Recently uploaded

Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Sapana Sha
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024thyngster
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...dajasot375
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Jack DiGiovanna
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Colleen Farrelly
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfJohn Sterrett
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdfHuman37
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 

Recently uploaded (20)

Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
Saket, (-DELHI )+91-9654467111-(=)CHEAP Call Girls in Escorts Service Saket C...
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
Consent & Privacy Signals on Google *Pixels* - MeasureCamp Amsterdam 2024
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
 
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
Indian Call Girls in Abu Dhabi O5286O24O8 Call Girls in Abu Dhabi By Independ...
 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Call Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort ServiceCall Girls in Saket 99530🔝 56974 Escort Service
Call Girls in Saket 99530🔝 56974 Escort Service
 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
Building on a FAIRly Strong Foundation to Connect Academic Research to Transl...
 
Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024Generative AI for Social Good at Open Data Science East 2024
Generative AI for Social Good at Open Data Science East 2024
 
DBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdfDBA Basics: Getting Started with Performance Tuning.pdf
DBA Basics: Getting Started with Performance Tuning.pdf
 
20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf20240419 - Measurecamp Amsterdam - SAM.pdf
20240419 - Measurecamp Amsterdam - SAM.pdf
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 

Provenance as a Key Factor for Privacy-proof Trust

  • 1. This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partnerspartners This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners Provenance as a Key Factor for Privacy-proof Trust Davide Ceolin
  • 2. Slide titel - PT Sans - 28pt Maecenas faucibus mollis interdum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. This is the presentation title www.amsterdamdatascience.nl This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust • Cold-start Problem. We need observations to build user reputations. • Privacy Intrusion. Knowledge about individuals reduces uncertainty. • Inaccurate Point-wise Prediction. Reputations are asymptotically correct. Open Issues
  • 3. Slide titel - PT Sans - 28pt Maecenas faucibus mollis interdum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. This is the presentation title www.amsterdamdatascience.nl This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust • Reputation systems are (mostly) user-centric. • Besides the who we can use also the when, where and how provenance. Provenance for Trust Estimation waisda.nl
  • 4. Slide titel - PT Sans - 28pt Maecenas faucibus mollis interdum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. This is the presentation title www.amsterdamdatascience.nl This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust • Provenance traces are fine-grained representations of how data came to be. • To derive trust estimations we need to identify links and regularities. • We proposed to use provenance stereotypes: • Clusters of provenance traces representing user behaviours 
 (e.g., early-morning weekend contributors). Provenance for Trust Estimation
  • 5. Slide titel - PT Sans - 28pt Maecenas faucibus mollis interdum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. This is the presentation title www.amsterdamdatascience.nl This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust • By aggregating traces, we can increase the availability of reputations: • Users might be unknown, but their behaviour could be well-known. • This helps mitigating uncertainty. Provenance vs. cold-start
  • 6. Slide titel - PT Sans - 28pt Maecenas faucibus mollis interdum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. This is the presentation title www.amsterdamdatascience.nl This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust • Users tend to adopt uniform behaviours. • We can focus on the provenance stereotype (and hence on the cluster of users) rather than on individuals. • This adds an obfuscation layer. Provenance vs. privacy intrusion
  • 7. Slide titel - PT Sans - 28pt Maecenas faucibus mollis interdum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. This is the presentation title www.amsterdamdatascience.nl This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust • Probabilistic reputations are asymptotically accurate. • Combining individual reputations with stereotypes: • improves accuracy; • allows discriminating among user contributions. Provenance for point-wise predictions
  • 8. Slide titel - PT Sans - 28pt Maecenas faucibus mollis interdum. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Aenean eu leo quam. Pellentesque ornare sem lacinia quam venenatis vestibulum. Morbi leo risus, porta ac consectetur ac, vestibulum at eros. This is the presentation title www.amsterdamdatascience.nl This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners www.amsterdamdatascience.nlProvenance as a Key Factor for Privacy-proof Trust • We adopted provenance stereotypes in a few Cultural Heritage case studies. • The creation of stereotypes needs to be standardised in order to balance: • performance (accuracy and efficiency); • evidence availability; • privacy. Conclusion
  • 9. This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partnerspartners This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners This is the presentation title this subline can be used for authors partners Thanks d.ceolin@vu.nl