skip to main content
research-article
Free Access

A primer on provenance

Published:01 May 2014Publication History
Skip Abstract Section

Abstract

Better understanding data requires tracking its history and context.

References

  1. Amsterdamer, Y. et al. Putting lipstick on pig: Enabling database-style workflow provenance. In Proceedings of the VLDB Endowment 5, 4 (2011), 346--357. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Biton, O., Cohen-Boulakia, S. and Davidson, S.B. ZOOM*UserViews: Querying relevant provenance in workflow systems. In Proceedings of the 33rd International Conference on Very Large Databases, (2007), 366--1369. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Blum, M. Coin flipping by telephone: a protocol for solving impossible problems. In Advances in Cryptology---A Report on CRYPTO '81, (1982).Google ScholarGoogle Scholar
  4. Borkin, M.A. et al. Evaluation of filesystem provenance visualization tools. IEEE Transactions on Visualization and Computer Graphics 19, 12 (2013), 2476--2485. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Braun, U., Shinnar, A., Seltzer, M. 2008. Securing provenance. In Proceedings of the 3rd Usenix Workshop on Hot Topics in Security, (2008), 1--5. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Braun, U. et al. Issues in automatic provenance collection. In Proceedings of the International Conference on Provenance and Annotation of Data, (2006), 171--183. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Buneman, P., Khanna, S. and Tan, W.C. Why and where: A characterization of data provenance. In Proceedings of the 8th International Conference on Database Theory, (2002), 316--330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Callahan, S.P. et al. Towards process provenance for existing applications. In Proceedings of the 2nd International Provenance and Annotation Workshop, (2008), 120--127.Google ScholarGoogle Scholar
  9. Cui, Y., Widom, J. and Wiener, J.L. Tracing the lineage of view data in a warehousing environment. ACM Transactions on Database Systems 25, 2 (2000), 179--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Freire, J. et al. Managing rapidly evolving scientific workflows. In Proceedings of the International Conference on Provenance and Annotation of Data, (2006), 10--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gates, C. and Bishop, M. One of these records is not like the others. In Proceedings of the 3rd Usenix Workshop on the Theory and Practice of Provenance, (2011).Google ScholarGoogle Scholar
  12. Gehani, A. and Tariq, D. SPADE: Support for provenance auditing in distributed environments. In Proceedings of the 13th International Middleware Conference, (2012), 101--120. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Green, T. J., Karvounarakis, G., Tannen, V. Provenance semirings. In Proceedings of the 26th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, (2007), 31--40. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Guo, P.J., and Seltzer, M. Burrito: Wrapping your lab notebook in computational infrastructure. In Proceedings of the 4th Usenix Conference on Theory and Practice of Provenance, (2012) 7--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Halevy, D. and Shamir, A. The LSD broadcast encryption scheme. In Advances in Cryptology, (2002), 47--60. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Hasan, R., Sion, R. and Winslett, M. The case of the fake Picasso: preventing history forgery with secure provenance. In Proceedings of the 7th Conference on File and Storage Technologies, (2009), 1--14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Macko, P. and Seltzer, M. A general-purpose provenance library. In Proceedings of the 4th Usenix Conference on Theory and Practice of Provenance, (2012), 6--6. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Macko, P. and Seltzer, M. Provenance Map Orbiter: interactive exploration of large provenance graphs. In Proceedings of the 3rd Conference on Theory and Practice of Provenance, (2011)Google ScholarGoogle Scholar
  19. McDaniel, P. et al. Towards a secure and efficient system for end-to-end provenance. In Proceedings of the 2nd Conference on Theory and Practice of Provenance, (2010), 2--2. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Moreau, L. and Missier, P. PROV-DM: The PROV Data Model. Technical Report. World Wide Web Consortium, 2013.Google ScholarGoogle Scholar
  21. Moreau, L., et al. The Open Provenance Model Core Specification (V1.1). Future Generations Computer Systems 27, 6 (2011), 743--756. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Muniswamy-Reddy, K.-K., et al. Layering in provenance systems. In Proceedings of the Usenix Annual Technical Conference, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Muniswamy-Reddy, K.-K., et al. Provenance-aware storage systems. In Proceedings of the Usenix Annual Technical Conference, (2006), 43--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Park, H., Ikeda, R. and Widom, J. RAMP: A system for capturing and tracing provenance in MapReduce workflows. In Proceedings of the 37th International Conference on Very Large Databases, (2011).Google ScholarGoogle Scholar
  25. Saxena, P., Sekar, R. and Puranik, V. Efficient fine-grained binary instrumentation with applications to taint-tracking. In Proceedings of the 6th Annual IEEE/ACM International Symposium on Code Generation and Optimization, (2008), 74--83. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Scheidegger, C., et al. Tackling the provenance challenge one layer at a time. Concurrency and Computation: Practice and Experience 20, 5 (2008), 473--483. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Shamir, A. 1979. How to share a secret. Commun. ACM 22, 11 (Nov. 1979), 612--613. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Widom, J. Trio: A system for integrated management of data, accuracy, and lineage. Technical Report 2004-40, 2004.Google ScholarGoogle Scholar

Index Terms

  1. A primer on provenance

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image Communications of the ACM
          Communications of the ACM  Volume 57, Issue 5
          May 2014
          110 pages
          ISSN:0001-0782
          EISSN:1557-7317
          DOI:10.1145/2594413
          • Editor:
          • Moshe Y. Vardi
          Issue’s Table of Contents

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Popular
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format