Access control for OPM provenance graphs

  • Authors:
  • Roxana Danger;Robin Campbell Joy;John Darlington;Vasa Curcin

  • Affiliations:
  • Department of Computing, Imperial College London, London, UK;Department of Computing, Imperial College London, London, UK;Department of Computing, Imperial College London, London, UK;Department of Computing, Imperial College London, London, UK

  • Venue:
  • IPAW'12 Proceedings of the 4th international conference on Provenance and Annotation of Data and Processes
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

The field of provenance in computer science arose from the need to capture the lineage of software data outputs in an automated manner that is semantically consistent across various applications that participated in producing the said outputs. This vision being outside the capabilities of simple text logs, a series of Provenance Challenges investigated the suitability of different approaches, in the process giving rise to the Open Provenance Model (OPM) [3], currently being reworked into PROV, a W3C standard.