This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Truth in Crowdsourcing
September/October 2011 (vol. 9 no. 5)
pp. 74-76
Landon P. Cox, Duke University
Security researchers and practitioners must strive to develop better techniques and tools to help verify the authenticity of the data on which we increasingly rely.

1. V. Lenders et al., "Location-Based Trust for Mobile User-Generated Content: Applications, Challenges and Implementations," Proc. 9th Workshop Mobile Computing Systems and Applications (HotMobile 08), ACM Press, 2008, pp. 60–64.
2. S. Saroiu and A. Wolman, "Enabling New Mobile Applications with Location Proofs," Proc. 10th Workshop Mobile Computing Systems and Applications (HotMobile 09), ACM Press, 2009; http://research.microsoft.com/en-us/um/people/ alecwhotmobile-2009.pdf.
3. A. Dua et al., "Towards Trustworthy Participatory Sensing," Proc. 4th Workshop Hot Topics in Security (HotSec 09), Usenix Assoc., 2009; www.usenix.org/event/hotsec09/tech/full_papers dua.pdf.
4. S. Saroiu and A. Wolman, "I Am a Sensor, and I Approve This Message," Proc. 11th Workshop Mobile Computing Systems and Applications (HotMobile 10), ACM Press, 2010, pp. 37–42.
5. P. Gilbert et al., "YouProve: Authenticity and Fidelity in Mobile Sensing," to be published in Proc. 9th ACM Conf. Embedded Networked Sensor Systems (SenSys 11), ACM Press, 2011.
6. D. Wang et al., "On Bayesian Interpretation of Fact-Finding in Information Networks," Proc. 14th Int'l Conf. Information Fusion, IEEE Press, 2009; www.cs.illinois.edu/homes/gupta58fusion2011.pdf .

Index Terms:
Wikipedia, crowdsourcing, data authentication
Citation:
Landon P. Cox, "Truth in Crowdsourcing," IEEE Security & Privacy, vol. 9, no. 5, pp. 74-76, Sept.-Oct. 2011, doi:10.1109/MSP.2011.145
Usage of this product signifies your acceptance of the Terms of Use.