-
1
-
-
80053151809
-
Provenance capture in the wild
-
M. D. Allen, A. Chapman, B. Blaustein, and L. Seligman, "Provenance Capture in the Wild," in IPAW, 2010.
-
(2010)
IPAW
-
-
Allen, M.D.1
Chapman, A.2
Blaustein, B.3
Seligman, L.4
-
3
-
-
33750057367
-
Provenance collection support in the kepler scientific workflow system
-
Provenance and Annotation of Data - International Provenance and Annotation Workshop, IPAW 2006, Revised Selected Papers
-
I. Altintas, O. Barney, and E. Jaeger-Frank, "Provenance Collection Support in the Kepler Scientific Workflow System," IPAW, pp. 118-132, 2006. (Pubitemid 44577314)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4145
, pp. 118-132
-
-
Altintas, I.1
Barney, O.2
Jaeger-Frank, E.3
-
4
-
-
84925001453
-
ULDBs: Databases with uncertainty and lineage
-
Korea
-
O. Benjelloun, A. D. Sarma, A. Halevy, and J. Widom, "ULDBs: Databases with Uncertainty and Lineage," VLDB Seoul, Korea, pp. 953-964, 2006.
-
(2006)
VLDB Seoul
, pp. 953-964
-
-
Benjelloun, O.1
Sarma, A.D.2
Halevy, A.3
Widom, J.4
-
5
-
-
80053148450
-
Surrogate parenthood: Protected and informative graphs
-
B. Blaustein, A. Chapman, L. Seligman, M. D. Allen, and A. Rosenthal, "Surrogate Parenthood: Protected and Informative Graphs," PVLDB, 2010.
-
(2010)
PVLDB
-
-
Blaustein, B.1
Chapman, A.2
Seligman, L.3
Allen, M.D.4
Rosenthal, A.5
-
6
-
-
50249184837
-
PLUS: Synthesizing privacy, lineage, uncertainty and security
-
B. T. Blaustein, L. Seligman, M. Morse, M. D. Allen, and A. Rosenthal, "PLUS: Synthesizing privacy, lineage, uncertainty and security," ICDE Workshops, pp. 242-245, 2008.
-
(2008)
ICDE Workshops
, pp. 242-245
-
-
Blaustein, B.T.1
Seligman, L.2
Morse, M.3
Allen, M.D.4
Rosenthal, A.5
-
7
-
-
33846076805
-
Provenance management in curated databases
-
DOI 10.1145/1142473.1142534, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
-
P. Buneman, A. Chapman, and J. Cheney, "Provenance Management in Curated Databases," ACM SIGMOD, pp. 539-550, 2006. (Pubitemid 46946538)
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 539-550
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
-
8
-
-
50149084918
-
Pedigree information for enhanced situation and threat assessment
-
M. Ceruti, A. Ashfelter, R. Brooks, G. Chen, S. Das, G. Raven, M. Sudit, and E. Wright, " Pedigree Information for Enhanced Situation and Threat Assessment " FUSION, 2006.
-
(2006)
FUSION
-
-
Ceruti, M.1
Ashfelter, A.2
Brooks, R.3
Chen, G.4
Das, S.5
Raven, G.6
Sudit, M.7
Wright, E.8
-
9
-
-
57149126660
-
Efficient provenance storage
-
A. Chapman, H. V. Jagadish, and P. Ramanan, "Efficient Provenance Storage," SIGMOD, pp. 993-1006, 2008.
-
(2008)
SIGMOD
, pp. 993-1006
-
-
Chapman, A.1
Jagadish, H.V.2
Ramanan, P.3
-
10
-
-
41149161699
-
Addressing the provenance challenge using ZOOM
-
DOI 10.1002/cpe.1232
-
S. Cohen-Boulakia, O. Biton, S. Cohen, and S. Davidson, "Addressing the provenance challenge using ZOOM," Concurrency and Computation: Practice and Experience, vol. 20, pp. 497-506, 2008. (Pubitemid 351428363)
-
(2008)
Concurrency Computation Practice and Experience
, vol.20
, Issue.5
, pp. 497-506
-
-
Cohen-Boulakia, S.1
Biton, O.2
Cohen, S.3
Davidson, S.4
-
12
-
-
57349100882
-
Annotated XML: Queries and provenance
-
J. N. Foster, T. J. Green, and V. Tannen, "Annotated XML: Queries and Provenance," PODS, pp. 271-280, 2008.
-
(2008)
PODS
, pp. 271-280
-
-
Foster, J.N.1
Green, T.J.2
Tannen, V.3
-
13
-
-
41149178153
-
Automatic capture and reconstruction of computational provenance
-
DOI 10.1002/cpe.1247
-
J. Frew, D. Metzger, and P. Slaughter, "Automatic capture and reconstruction of computational provenance," Concurr. Comput. : Pract. Exper., vol. 20, pp. 485-496, 2008. (Pubitemid 351428362)
-
(2008)
Concurrency Computation Practice and Experience
, vol.20
, Issue.5
, pp. 485-496
-
-
Frew, J.1
Metzger, D.2
Slaughter, P.3
-
15
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
R. Hasan, R. Sion, and M. Winslett, "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance," in FAST. San Francisco, 2009, pp. 1-14.
-
(2009)
FAST. San Francisco
, pp. 1-14
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
16
-
-
77957912417
-
Data lineage model for Taverna workflows with lightweight anotation requirements
-
P. Missier, K. Belhajjame, J. Zhao, and C. Goble, "Data lineage model for Taverna workflows with lightweight anotation requirements," in IPAW, 2008.
-
(2008)
IPAW
-
-
Missier, P.1
Belhajjame, K.2
Zhao, J.3
Goble, C.4
-
17
-
-
35448939702
-
Managing information quality in e-science: The qurator workbench
-
DOI 10.1145/1247480.1247638, SIGMOD 2007: Proceedings of the ACM SIGMOD International Conference on Management of Data
-
P. Missier, S. M. Embury, M. Greenwood, A. Preece, and B. Jin, "Managing information quality in e-science: the qurator workbench," SIGMOD, pp. 1150-1152, 2007. (Pubitemid 47630911)
-
(2007)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 1150-1152
-
-
Missier, P.1
Embury, S.M.2
Greenwood, M.3
Preece, A.4
Jin, B.5
-
18
-
-
50649104772
-
-
University of Southampton
-
L. Moreau, J. Freire, J. Futrelle, R. McGrath, J. Myers, and P. Paulson, "The Open Provenance Model," University of Southampton 2007.
-
(2007)
The Open Provenance Model
-
-
Moreau, L.1
Freire, J.2
Futrelle, J.3
McGrath, R.4
Myers, J.5
Paulson, P.6
-
19
-
-
85076227002
-
Provenance-aware storage systems
-
K.-K. Muniswamy-Reddy, D. A. Holland, U. Braun, and M. I. Seltzer, "Provenance-Aware Storage Systems," USENIX, pp. 43-56, 2006.
-
(2006)
USENIX
, pp. 43-56
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.A.2
Braun, U.3
Seltzer, M.I.4
-
20
-
-
79952808695
-
Scalable access controls for lineage
-
A. Rosenthal, L. Seligman, A. Chapman, and B. Blaustein, "Scalable Access Controls for Lineage," in Theory and Practice of Provenance, 2008.
-
(2008)
Theory and Practice of Provenance
-
-
Rosenthal, A.1
Seligman, L.2
Chapman, A.3
Blaustein, B.4
-
21
-
-
57149124755
-
Querying and re-using workflows with vistrails
-
C. E. Scheidegger, H. T. Vo, D. Koop, J. Freire, and C. Silva, "Querying and Re-Using Workflows with VisTrails," SIGMOD, 2008.
-
(2008)
SIGMOD
-
-
Scheidegger, C.E.1
Vo, H.T.2
Koop, D.3
Freire, J.4
Silva, C.5
-
22
-
-
42449141856
-
Karma2: Provenance management for data driven workflows
-
Y. Simmhan, B. Plale, and D. Gannon, "Karma2: Provenance Management for Data Driven Workflows," Journal of Web Services Research, vol. 5, 2008.
-
(2008)
Journal of Web Services Research
, vol.5
-
-
Simmhan, Y.1
Plale, B.2
Gannon, D.3
-
23
-
-
70349887668
-
Fine-grained tamper-evident data pedigree
-
J. Zhang, A. Chapman, and K. LeFevre, "Fine-Grained Tamper-Evident Data Pedigree," Secure Data Management, pp. 17-32, 2009.
-
(2009)
Secure Data Management
, pp. 17-32
-
-
Zhang, J.1
Chapman, A.2
Lefevre, K.3
|