Corroboration via Provenance Patterns
نویسندگان
چکیده
In today’s distributed and heterogeneous systems, provenance data is becoming increasingly important for understanding process flow, tracing how outputs came about, and enabling users to make more informed decisions based on such outputs. However, within such systems, the sources (computational or human) that generate provenance may belong to different stakeholders operating under different policies. Thus, being autonomous and self-interested, these stakeholders may claim untrue data to protect their interests (e.g. to justify bad performance). In response, this paper proposes a corroboration methodology for verifying a claim made by a source, via confirming it against the claims of other sources. In particular, given a claim in PROV, this claim is generalised to varying levels of abstraction, deriving two types of provenance templates, namely confirmation patterns, capturing the information to be confirmed, and witness patterns, capturing the relevant witnesses. These patterns are utilised to find relevant evidence, among the reports of others, that supports the claim, and to respectively estimate the reliability degree of the claim. The proposed corroboration methodology is illustrated via a case study in the service provision domain.
منابع مشابه
OPQL: Querying scientific workflow provenance at the graph level
Article history: Received 21 December 2011 Received in revised form 30 August 2013 Accepted 31 August 2013 Available online xxxx Provenance has become increasingly important in scientific workflows to understand, verify, and reproduce the result of scientific data analysis. Most existing systems store provenance data in provenance stores with proprietary provenance data models and conduct query...
متن کاملUsing Provenance Patterns to Vet Sensitive Behaviors in Android Apps
We propose Dagger, a lightweight system to dynamically vet sensitive behaviors in Android apps. Dagger avoids costly instrumentation of virtual machines or modifications to the Android kernel. Instead, Dagger reconstructs the program semantics by tracking provenance relationships and observing apps’ runtime interactions with the phone platform. More specifically, Dagger uses three types of low-...
متن کاملIntegrating Approximate Summarization with Provenance Capture
How to use provenance to explain why a query returns a result or why a result is missing has been studied extensively. Recently, we have demonstrated how to uniformly answer these types of provenance questions for first-order queries with negation and have presented an implementation of this approach in our PUG (Provenance Unification through Graphs) system. However, for realisticallysized data...
متن کاملDependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems
A unique characteristics of provenance data is that it forms a directed acyclic graph (DAG) in accordance with the underlying causality dependencies between entities (acting users, action processes and data objects) involved in transactions. Data provenance raises at least two distinct security-related issues. One is how to control access to provenance data which we call Provenance Access contr...
متن کاملGeochemistry of siliciclastic sediments of the Semnan Province and NE of Isfahan Province (Iran), implication for provenance
Some 43 samples collected from surficial sediments of Semnan Province (Alborz zone) and NE Isfahan Province (Central Iran zone) were analyzed, for constrains on provenance. Sand fraction were analyzed by XRF analyzer Philips Model PW 2450 in the laboratory of the Geology Survey Iran (GSI). Precision was 0.01%. Furthermore, 8 selected sediment samples and 8 samples from rock units from surroundi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017