skip to main content
research-article
Free Access

The provenance of electronic data

Authors Info & Claims
Published:01 April 2008Publication History
Skip Abstract Section

Abstract

It would include details of the processes that produced electronic data as far back as the beginning of time or at least the epoch of provenance awareness.

References

  1. Alvarez, S., Vazquez-Salceda, J., Kifor, J., Varga, L., and Willmott, S. Applying provenance in distributed organ transplant management. In Proceedings of the International Provenance and Annotation Workshop Vol. 4145 of Lecture Notes in Computer Science (Chicago, May 3--5). Springer, Heidelberg, 2006, 28--36. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Buneman, P., Khanna, S., and Tan, W.-C. Why and where: A characterization of data provenance. In Proceedings of Eighth International Conference on Database Theory Vol. 1973 of Lecture Notes in Computer Science (London, Jan. 4--6). Springer, Heidelberg, 2001, 316--330. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Burbeck, S. The Tao of E-business Services. Technical Report. IBM Software Group, Oct. 2000; www.ibm.com/developerworks/webservices/library/ws-tao/.Google ScholarGoogle Scholar
  4. Clifford, B., Foster, I., Voeckler, J.-S., Wilde, M., and Zhao, Y. Tracking provenance in a virtual data grid. Concurrency and Computation: Practice and Experience (2007); dx.doi.org/10.1002/cpe.1256. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cui, Y., Widom, H., and Wiener, J. Tracing the lineage of view data in a warehousing environment. ACM Transactions on Database Systems 25, 2 (June 2000), 179--227. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Foster, I., Kesselman, C., Nick, J., and Tuecke, S. Grid computing: Making the global Infrastructure a reality. In The Physiology of the Grid: An Open Grid Services Architecture for Distributed Systems Integration. Wiley Series in Communications Networking and Distributed Systems. John Wiley & Sons, Chichester, England, 2003, 217--249.Google ScholarGoogle ScholarCross RefCross Ref
  7. Groth, P., Jiang, S., Miles, S., Munroe, S., Tan, V., Tsasakou, S., and Moreau, L. D3.1.1: An Architecture for Provenance Systems. Technical Report. University of Southampton, Southampton, U.K., Feb. 2006; eprints.ecs.soton.ac.uk/12023/.Google ScholarGoogle Scholar
  8. Miles, S., Groth, P., Branco, M., and Moreau, L. The requirements of recording and using provenance in e-science experiments. Journal of Grid Computing 5, 1 (Mar. 2007), 1--25.Google ScholarGoogle ScholarCross RefCross Ref
  9. Seltzer, M., Holland, D., Braun, U., and Muniswamy-Reddy, K.-K. Passing the provenance challenge. Concurrency and Computation: Practice and Experience (2007); dx.doi.org/10.1002/cpe.1233. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Zhao, J., Goble, C., Stevens, R., and Turi, D. Mining Taverna's semantic web of provenance. Concurrency and Computation: Practice and Experience (2007); dx.doi.org/10.1002/cpe.1231. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. The provenance of electronic data

                  Recommendations

                  Comments

                  Login options

                  Check if you have access through your login credentials or your institution to get full access on this article.

                  Sign in

                  Full Access

                  • Published in

                    cover image Communications of the ACM
                    Communications of the ACM  Volume 51, Issue 4
                    The psychology of security: why do good users make bad decisions?
                    April 2008
                    94 pages
                    ISSN:0001-0782
                    EISSN:1557-7317
                    DOI:10.1145/1330311
                    Issue’s Table of Contents

                    Copyright © 2008 ACM

                    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                    Publisher

                    Association for Computing Machinery

                    New York, NY, United States

                    Publication History

                    • Published: 1 April 2008

                    Permissions

                    Request permissions about this article.

                    Request Permissions

                    Check for updates

                    Qualifiers

                    • research-article
                    • Popular
                    • Refereed

                  PDF Format

                  View or Download as a PDF file.

                  PDF

                  eReader

                  View online with eReader.

                  eReader

                  HTML Format

                  View this article in HTML Format .

                  View HTML Format