By maintaining a tamper-proof history of provenance and permissions, trust networks can be automatically audited to ensure that data-usage agreements are being honored.
A.
browsing behavior
B.
real name authentication
C.
a record of ownership
D.
place of origin or beginning of something's existence