- Ahmad, R., Jung, E., de Senne Garcia, C., Irshad, H., Gehani, A. Discrepancy detection in whole network provenance. In Proceedings of the 12th USENIX Workshop on the Theory and Practice of Provenance; https://www.usenix.org/conference/tapp2020/presentation/ahmad.Google Scholar
- Fan, J., Gerald, A., Raj, S., Patel, J. The case against specialized graph analytics engines. In Proceedings of the 7th Biennial Conf. on Innovative Data Systems, 2015; http://cidrdb.org/cidr2015/Papers/CIDR15_Paper20.pdf.Google Scholar
- Gehani, A. SPADE; http://spade.csl.sri.com.Google Scholar
- Gehani, A., Kim, M., Zhang, J. Steps toward managing lineage metadata in grid clusters. In Proceedings of the 1st Usenix Workshop on Theory and Practice of Provenance, 2009, 1--9 Google ScholarDigital Library
- Gehani, A., Kim, M. Mendel: Efficiently verifying the lineage of data modified in multiple trust domains, Proceedings of the 19th ACM Intern. Symp. High Performance Distributed Computing 2010; 227--239. Google ScholarDigital Library
- Gehani, A., Tariq, D. SPADE: Support for provenance auditing in distributed environments. In Proceedings of the 13th ACM/IFIP/Usenix Middleware Conf.; 2012 Google ScholarDigital Library
- Gehani, A., Kazmi, H., Irshad, H. Scaling SPADE to "Big Provenance." In Proceedings of the 8th Usenix Workshop on Theory and Practice of Provenance, 2016, 26--33; https://www.usenix.org/conference/tapp16/workshop-program/presentation/gehani.Google Scholar
- Ghosh, S., Das, A., Porras, P., Yegneswaran, V., Gehani, A. Automated categorization of onion sites for analyzing the dark web ecosystem. In Proceedings of the 23rd ACM Intern. Conf. Knowledge Discovery and Data Mining, 2017, 1793--1802 Google ScholarDigital Library
- Glavic, B. Big data provenance: challenges and implications for benchmarking. Revised Selected Papers of the 1st Workshop on Specifying Big Data Benchmarks 8163, 2012, 72--80 Google ScholarDigital Library
- Khoury, J., Upthegrove, T., Caro, A., Benyo, B., Kong, D. An event-based data model for granular information flow tracking. Proceedings of the 12th Usenix Workshop on the Theory and Practice of Provenance, 2020; https://www.usenix.org/biblio-4496.Google Scholar
- Moreau, L. et al. The Open Provenance Model core specification. Future Generation Computer Systems 27, 6 (2011) Google ScholarDigital Library
- Patel, J., Deshmukh, H., Zhu, J., Potti, N., Zhang, Z., Spehlmann, M., Memisoglu, H., Saurabh, S. Quickstep: A data platform based on the scaling-up approach. In Proceedings of the VLDB Endowment 11, 6 (2018), 663--676 Google ScholarDigital Library
- W3C Working Group. PROV-overview, 2013; https://www.w3.org/TR/prov-overview/.Google Scholar
Index Terms
- Digging into big provenance (with SPADE)
Recommendations
Digging into Big Provenance (with SPADE): A user interface for querying provenance
ProvenanceSeveral interfaces exist for querying provenance. Many are not flexible in allowing users to select a database type of their choice. Some provide query functionality in a data model that is different from the graph-oriented one that is natural for ...
Provenance for data mining
TaPP '13: Proceedings of the 5th USENIX Workshop on the Theory and Practice of ProvenanceData mining aims at extracting useful information from large datasets. Most data mining approaches reduce the input data to produce a smaller output summarizing the mining result. While the purpose of data mining (extracting information) necessitates ...
Big Data Provenance: Challenges and Implications for Benchmarking
Revised Selected Papers of the First Workshop on Specifying Big Data Benchmarks - Volume 8163Data Provenance is information about the origin and creation process of data. Such information is useful for debugging data and transformations, auditing, evaluating the quality of and trust in data, modelling authenticity, and implementing access ...
Comments