A construction of distributed reference counting
Acta Informatica
Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
Chimera: AVirtual Data System for Representing, Querying, and Automating Data Derivation
SSDBM '02 Proceedings of the 14th International Conference on Scientific and Statistical Database Management
Data Provenance: Some Basic Issues
FST TCS 2000 Proceedings of the 20th Conference on Foundations of Software Technology and Theoretical Computer Science
On the Use of Agents in BioInformatics Grid
CCGRID '03 Proceedings of the 3st International Symposium on Cluster Computing and the Grid
A time-and-value centric provenance model and architecture for medical event streams
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
What Makes You Think That? The Semantic Web's Proof Layer
IEEE Intelligent Systems
A fuzzy model for calculating workflow trust using provenance data
Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities
A three tier architecture applied to LiDAR processing and monitoring
Scientific Programming - Scientific Workflows
Provenance Provisioning in Mobile Agent-Based Distributed Job Workflow Execution
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part I: ICCS 2007
IBM Journal of Research and Development
Advances and Challenges for Scalable Provenance in Stream Processing Systems
Provenance and Annotation of Data and Processes
Scientific workflow design for mere mortals
Future Generation Computer Systems
Recording Process Documentation in the Presence of Failures
Methods, Models and Tools for Fault Tolerance
Preserving integrity and confidentiality of a directed acyclic graph model of provenance
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Understanding documentation and reconstruction requirements for computer-assisted decision processes
Decision Support Systems
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
Multi-unit combinatorial reverse auctions with transformability relationships among goods
WINE'05 Proceedings of the First international conference on Internet and Network Economics
Towards low overhead provenance tracking in near real-time stream filtering
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
A provenance model for manually curated data
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Security issues in a SOA-Based provenance system
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
An identity crisis in the life sciences
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Toward the modeling of data provenance in scientific publications
Computer Standards & Interfaces
A framework for scalable distributed provenance storage system
Computer Standards & Interfaces
FlowRecommender: a workflow recommendation technique for process provenance
AusDM '09 Proceedings of the Eighth Australasian Data Mining Conference - Volume 101
Characterizing workflow-based activity on a production e-infrastructure using provenance data
Future Generation Computer Systems
Hi-index | 0.01 |
Both the scientific and business communities, which are beginning to rely on Grids as problem-solving mechanisms, have requirements in terms of provenance. The provenance of some data is the documentation of process that led to the data; its necessity is apparent in fields ranging from medicine to aerospace. To support provenance capture in Grids, we have developed an implementation-independent protocol for the recording of provenance. We describe the protocol in the context of a service-oriented architecture and formalise the entities involved using an abstract state machine or a three-dimensional state transition diagram. Using these techniques we sketch a liveness property for the system.