Reflective programming in the relational algebra
Journal of Computer and System Sciences
Materialized views: techniques, implementations, and applications
Materialized views: techniques, implementations, and applications
MetaML and multi-stage programming with explicit annotations
Theoretical Computer Science - Partial evaluation and semantics-based program manipulation
Tracing the lineage of view data in a warehousing environment
ACM Transactions on Database Systems (TODS)
Journal of the American Society for Information Science and Technology - Special issue on the still the frontier: Information Science at the Millenium
Adaptive functional programming
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
On propagation of deletions and annotations through views
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Reasoning About Knowledge
Review on Computational Trust and Reputation Models
Artificial Intelligence Review
Lineage retrieval for scientific data processing: a survey
ACM Computing Surveys (CSUR)
A survey of data provenance in e-science
ACM SIGMOD Record
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Boomerang: resourceful lenses for string data
Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Extracting causal graphs from an open provenance data model
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
On the expressiveness of implicit provenance in query and update languages
ACM Transactions on Database Systems (TODS)
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Towards semantics for provenance security
TAPP'09 First workshop on on Theory and practice of provenance
Provenance as dependency analysis
DBPL'07 Proceedings of the 11th international conference on Database programming languages
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Document provenance in the cloud: constraints and challenges
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
Correct blame for contracts: no more scapegoating
Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Proceedings of the 4th International Workshop on Logic in Databases
Future Generation Computer Systems
Determining the provenance of software artifacts
Proceedings of the 5th International Workshop on Software Clones
A quest for beauty and wealth (or, business processes for database researchers)
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Provenance for aggregate queries
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
SIGMOD '12 Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data
A core calculus for provenance
POST'12 Proceedings of the First international conference on Principles of Security and Trust
ACM Transactions on Database Systems (TODS)
A new compression algorithm of data provenance based on self-adaptive granularity
International Journal of Computer Applications in Technology
Middleware-Enabled Mobile Framework in mHealth
UCC '13 Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing
A core calculus for provenance
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
Science, industry, and society are being revolutionized by radical new capabilities for information sharing, distributed computation, and collaboration offered by the World Wide Web. This revolution promises dramatic benefits but also poses serious risks due to the fluid nature of digital information. One important cross-cutting issue is managing and recording provenance, or metadata about the origin, context, or history of data. We posit that provenance will play a central role in emerging advanced digital infrastructures. In this paper, we outline the current state of provenance research and practice, identify hard open research problems involving provenance semantics, formal modeling, and security, and articulate a vision for the future of provenance.