نتایج جستجو برای: provenance

تعداد نتایج: 6338  

2010
Patrick D. McDaniel Kevin R. B. Butler Stephen E. McLaughlin Radu Sion Erez Zadok Marianne Winslett

Work on the End-to-End Provenance System (EEPS) began in the late summer of 2009. The EEPS effort seeks to explore the three central questions in provenance systems: (1) “Where and how do I design secure hostlevel provenance collecting instruments (called provenance monitors)?”; (2) “How do I extend completeness and accuracy guarantees to distributed systems and computations?”; and (3) “What ar...

2010
Leonardo Salayandia Paulo Pinheiro

Two challenges related to capturing provenance about scientific data are: 1) determining an adequate level of granularity to encode provenance, and 2) encoding provenance in a way that facilitates enduser interpretation and analysis. A solution to address these challenges consists in integrating two technologies: Semantic Abstract Workflows (SAWs), which are used to capture a domain expert’s un...

2015
Xing Niu Boris Glavic Dieter Gawlick Zhen Hua Liu Vasudha Krishnaswamy Venkatesh Radhakrishnan

Since its inception, the PROV standard has been widely adopted as a standardized exchange format for provenance information. Surprisingly, this standard is currently not supported by provenanceaware database systems limiting their interoperability with other provenance-aware systems. In this work we introduce techniques for exporting database provenance as PROV documents, importing PROV graphs ...

2015
Nikilesh Balakrishnan Thomas Bytheway Lucian Carata Oliver R. A. Chick James Snee Sherif Akoush Ripduman Sohan Margo I. Seltzer Andy Hopper

In recent years several hardware and systems fields have made advances in technology that open new opportunities and challenges for provenance systems. In this paper we look at such technologies and discuss the implications they have for provenance. First, we discuss processor and memory controller technologies that enable fine-grained lineage capture, resulting in more precise and accurate pro...

2006
Paul Groth Sheng Jiang Simon Miles Steve Munroe Victor Tan Sofia Tsasakou Luc Moreau

This document covers the logical and process architectures of provenance systems. The logical architecture identifies key roles and their interactions, whereas the process architecture discusses distribution and security. A fundamental aspect of our presentation is its technology-independent nature, which makes it reusable: the principles that are exposed in this document may be applied to diff...

2011
Boris Glavic Renée J. Miller

We reconsider some of the explicit and implicit properties that underlie well-established definitions of data provenance semantics. Previous work on comparing provenance semantics has mostly focused on expressive power (does the provenance generated by a certain semantics subsume the provenance generated by other semantics) and on understanding whether a semantics is insensitive to query rewrit...

Journal: :JIDM 2016
Rogers Reiche de Mendonça Sérgio Manuel Serra da Cruz Maria Luiza Machado Campos

This article presents the ETL4LinkedProv approach to manage the collection and publication of provenance with distinct levels of granularity as Linked Data. The proposed approach uses ETL-workflows and a component named Provenance Collector Agent to collect two kinds of provenance (prospective and retrospective) integrating them with domain data. The component also set the granularity of the pr...

2016
Jamal Hussein Vladimiro Sassone Luc Moreau

As data provenance becomes a significant metadata in validating the origin of information and asserting its quality, it is crucial to hide the sensitive information of provenance data to enable trustworthiness prior to sharing provenance in open environments such as the Web. In this paper, a graph rewriting system is constructed from the PROV data model to hide restricted provenance information...

2012
Jinwei Hu Khaled M. Khan Yun Bai Yan Zhang

Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this defini...

2013
Chen Shou Dongfang Zhao Tanu Malik Ioan Raicu

It has become increasingly important to capture and understand the origins and derivation of data (its provenance). A key issue in evaluating the feasibility of data provenance is its performance, overheads, and scalability. In this paper, we explore the feasibility of a management layer for parallel file systems, in which metadata includes both file operations and provenance metadata. We desig...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید