Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
Lineage retrieval for scientific data processing: a survey
ACM Computing Surveys (CSUR)
A survey of data provenance in e-science
ACM SIGMOD Record
Adaptive functional programming
ACM Transactions on Programming Languages and Systems (TOPLAS)
Proceedings of the twenty-sixth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Boomerang: resourceful lenses for string data
Proceedings of the 35th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Provenance and scientific workflows: challenges and opportunities
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Annotated XML: queries and provenance
Proceedings of the twenty-seventh ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Fable: A Language for Enforcing User-defined Security Policies
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
AURA: a programming language for authorization and audit
Proceedings of the 13th ACM SIGPLAN international conference on Functional programming
On the expressiveness of implicit provenance in query and update languages
ACM Transactions on Database Systems (TODS)
Towards semantics for provenance security
TAPP'09 First workshop on on Theory and practice of provenance
Provenance in Databases: Why, How, and Where
Foundations and Trends in Databases
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
A formal model of dataflow repositories
DILS'07 Proceedings of the 4th international conference on Data integration in the life sciences
TAPIDO: trust and authorization via provenance and integrity in distributed objects
ESOP'08/ETAPS'08 Proceedings of the Theory and practice of software, 17th European conference on Programming languages and systems
Reliable evidence: auditability by typing
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
Correct blame for contracts: no more scapegoating
Proceedings of the 38th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
The Open Provenance Model core specification (v1.1)
Future Generation Computer Systems
Provenance views for module privacy
Proceedings of the thirtieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Secure distributed programming with value-dependent types
Proceedings of the 16th ACM SIGPLAN international conference on Functional programming
A Formal Framework for Provenance Security
CSF '11 Proceedings of the 2011 IEEE 24th Computer Security Foundations Symposium
Provenance as dependency analysis
Mathematical Structures in Computer Science - Programming Language Interference and Dependence
Hierarchical models of provenance
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Functional programs that explain their work
Proceedings of the 17th ACM SIGPLAN international conference on Functional programming
Tracing where and who provenance in Linked Data: A calculus
Theoretical Computer Science
A core calculus for provenance
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
Provenance is an increasing concern due to the revolution in sharing and processing scientific data on the Web and in other computer systems. It is proposed that many computer systems will need to become provenance-aware in order to provide satisfactory accountability, reproducibility, and trust for scientific or other high-value data. To date, there is not a consensus concerning appropriate formal models or security properties for provenance. In previous work, we introduced a formal framework for provenance security and proposed formal definitions of properties called disclosure and obfuscation This paper develops a core calculus for provenance in programming languages. Whereas previous models of provenance have focused on special-purpose languages such as workflows and database queries, we consider a higher-order, functional language with sums, products, and recursive types and functions. We explore the ramifications of using traces based on operational derivations for the purpose of comparing other forms of provenance.We design a rich class of provenance views over traces. Finally, we prove relationships among provenance views and develop some solutions to the disclosure and obfuscation problems.