ACM SIGMOD Record
Principles of programming with complex objects and collection types
ICDT '92 Selected papers of the fourth international conference on Database theory
Analysis and caching of dependencies
Proceedings of the first ACM SIGPLAN international conference on Functional programming
Normal forms and conservative extension properties for query languages over collection types
Journal of Computer and System Sciences
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
JFlow: practical mostly-static information flow control
Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A sound type system for secure flow analysis
Journal of Computer Security
Tracing the lineage of view data in a warehousing environment
ACM Transactions on Database Systems (TODS)
Type-based analysis and applications
PASTE '01 Proceedings of the 2001 ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering
POPL '77 Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
On propagation of deletions and annotations through views
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Foundations of Databases: The Logical Level
Foundations of Databases: The Logical Level
POPL '03 Proceedings of the 30th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Supporting Fine-grained Data Lineage in a Database Visualization Environment
ICDE '97 Proceedings of the Thirteenth International Conference on Data Engineering
Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
A Polygen Model for Heterogeneous Database Systems: The Source Tagging Perspective
VLDB '90 Proceedings of the 16th International Conference on Very Large Data Bases
ICSE '81 Proceedings of the 5th international conference on Software engineering
Dynamic slicing in higher-order programming languages
Dynamic slicing in higher-order programming languages
Lineage retrieval for scientific data processing: a survey
ACM Computing Surveys (CSUR)
A survey of data provenance in e-science
ACM SIGMOD Record
MONDRIAN: Annotating and Querying Databases through Colors and Blocks
ICDE '06 Proceedings of the 22nd International Conference on Data Engineering
Provenance management in curated databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
ULDBs: databases with uncertainty and lineage
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Provenance-aware storage systems
ATEC '06 Proceedings of the annual conference on USENIX '06 Annual Technical Conference
Imperative self-adjusting computation
Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Special Issue: The First Provenance Challenge
Concurrency and Computation: Practice & Experience - The First Provenance Challenge
Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Annotated XML: queries and provenance
Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Fable: A Language for Enforcing User-defined Security Policies
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
AURA: a programming language for authorization and audit
Proceedings of the 13th ACM SIGPLAN international conference on Functional programming
On the expressiveness of implicit provenance in query and update languages
ACM Transactions on Database Systems (TODS)
Securing information flow via dynamic capture of dependencies
Journal of Computer Security - 20th IEEE Computer Security Foundations Symposium (CSF)
Self-adjusting computation: (an overview)
Proceedings of the 2009 ACM SIGPLAN workshop on Partial evaluation and program manipulation
Provenance in Databases: Why, How, and Where
Foundations and Trends in Databases
A theory of typed coercions and its applications
Proceedings of the 14th ACM SIGPLAN international conference on Functional programming
A formal model of dataflow repositories
DILS'07 Proceedings of the 4th international conference on Data integration in the life sciences
Provenance as dependency analysis
DBPL'07 Proceedings of the 11th international conference on Database programming languages
Language-based information-flow security
IEEE Journal on Selected Areas in Communications
A core calculus for provenance
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Toward provenance-based security for configuration languages
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Tracing where and who provenance in Linked Data: A calculus
Theoretical Computer Science
BNCOD'13 Proceedings of the 29th British National conference on Big Data
Mathematical practice, crowdsourcing, and social machines
CICM'13 Proceedings of the 2013 international conference on Intelligent Computer Mathematics
A core calculus for provenance
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.03 |
Provenance is information recording the source, derivation or history of some information. Provenance tracking has been studied in a variety of settings, particularly database management systems. However, although many candidate definitions of provenance have been proposed, the mathematical or semantic foundations of data provenance have received comparatively little attention. In this paper, we argue that dependency analysis techniques familiar from program analysis and program slicing provide a formal foundation for forms of provenance that are intended to show how (part of) the output of a query depends on (parts of) its input. We introduce a semantic characterisation of such dependency provenance for a core database query language, show that minimal dependency provenance is not computable, and provide dynamic and static approximation techniques. We also discuss preliminary implementation experience with using dependency provenance to compute data slices, or summaries of the parts of the input relevant to a given part of the output.