SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Composing Lineage Metadata with XML for Custom Satellite-Derived Data Products
SSDBM '04 Proceedings of the 16th International Conference on Scientific and Statistical Database Management
Labels and event processes in the asbestos operating system
Proceedings of the twentieth ACM symposium on Operating systems principles
The taser intrusion recovery system
Proceedings of the twentieth ACM symposium on Operating systems principles
HOTOS'05 Proceedings of the 10th conference on Hot Topics in Operating Systems - Volume 10
Making information flow explicit in HiStar
OSDI '06 Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation - Volume 7
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
ATEC '98 Proceedings of the annual conference on USENIX Annual Technical Conference
Information flow control for standard OS abstractions
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Panorama: capturing system-wide information flow for malware detection and analysis
Proceedings of the 14th ACM conference on Computer and communications security
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Selective versioning in a secure disk system
SS'08 Proceedings of the 17th conference on Security symposium
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
FAST '09 Proccedings of the 7th conference on File and storage technologies
The case for browser provenance
TAPP'09 First workshop on on Theory and practice of provenance
X-trace: a pervasive network tracing framework
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Provenance collection support in the kepler scientific workflow system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
ACM Transactions on Storage (TOS)
A navigation model for exploring scientific workflow provenance graphs
Proceedings of the 4th Workshop on Workflows in Support of Large-Scale Science
Provenance as first class cloud data
ACM SIGOPS Operating Systems Review
FAST'10 Proceedings of the 8th USENIX conference on File and storage technologies
Hierarchical file systems are dead
HotOS'09 Proceedings of the 12th conference on Hot topics in operating systems
Using provenance to extract semantic file attributes
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Intrusion recovery for database-backed web applications
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
Putting lipstick on pig: enabling database-style workflow provenance
Proceedings of the VLDB Endowment
Exploring provenance in high performance scientific computing
Proceedings of the first annual workshop on High performance computing meets databases
Proceedings of the 21st international conference companion on World Wide Web
Provenance for system troubleshooting
LISA'11 Proceedings of the 25th international conference on Large Installation System Administration
A general-purpose provenance library
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Hierarchical models of provenance
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Database support for exploring scientific workflow provenance graphs
SSDBM'12 Proceedings of the 24th international conference on Scientific and Statistical Database Management
MTCProv: a practical provenance query framework for many-task scientific computing
Distributed and Parallel Databases
SPADE: support for provenance auditing in distributed environments
Proceedings of the 13th International Middleware Conference
IPAPI: designing an improved provenance API
TaPP'13 Proceedings of the 5th USENIX conference on Theory and Practice of Provenance
IPAPI: designing an improved provenance API
Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance
Evaluation of a Hybrid Approach for Efficient Provenance Storage
ACM Transactions on Storage (TOS)
Local clustering in provenance graphs
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
BNCOD'13 Proceedings of the 29th British National conference on Big Data
Go with the flow: toward workflow-oriented security assessment
Proceedings of the 2013 workshop on New security paradigms workshop
Automated data provenance capture in spreadsheets, with case studies
Future Generation Computer Systems
Hi-index | 0.00 |
Digital provenance describes the ancestry or history of a digital object. Most existing provenance systems, however, operate at only one level of abstraction: the system call layer, a workflow specification, or the high-level constructs of a particular application. The provenance collectable in each of these layers is different, and all of it can be important. Single-layer systems fail to account for the different levels of abstraction at which users need to reason about their data and processes. These systems cannot integrate data provenance across layers and cannot answer questions that require an integrated view of the provenance. We have designed a provenance collection structure facilitating the integration of provenance across multiple levels of abstraction, including a workflow engine, a web browser, and an initial runtime Python provenance tracking wrapper. We layer these components atop provenance-aware network storage (NFS) that builds upon a Provenance-Aware Storage System (PASS). We discuss the challenges of building systems that integrate provenance across multiple layers of abstraction, present how we augmented systems in each layer to integrate provenance, and present use cases that demonstrate how provenance spanning multiple layers provides functionality not available in existing systems. Our evaluation shows that the overheads imposed by layering provenance systems are reasonable.