The need for preservation aware storage: a position paper
ACM SIGOPS Operating Systems Review
A time-and-value centric provenance model and architecture for medical event streams
Proceedings of the 1st ACM SIGMOBILE international workshop on Systems and networking support for healthcare and assisted living environments
Staged deployment in mirage, an integrated software upgrade testing and distribution system
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
AutoBash: improving configuration management with operating system causality analysis
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Introducing secure provenance: problems and challenges
Proceedings of the 2007 ACM workshop on Storage security and survivability
Using provenance to aid in personal file search
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
A nine year study of file system and storage benchmarking
ACM Transactions on Storage (TOS)
Proceedings of the 2008 ACM SIGMOD international conference on Management of data
Using causality to diagnose configuration bugs
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
IBM Journal of Research and Development
Preservation DataStores: new storage paradigm for preservation environments
IBM Journal of Research and Development
A Model for Sharing of Confidential Provenance Information in a Query Based System
Provenance and Annotation of Data and Processes
Provenance and Annotation of Data and Processes
Provenance and the Price of Identity
Provenance and Annotation of Data and Processes
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Autograph: automatically extracting workflow file signatures
ACM SIGOPS Operating Systems Review
Proceedings of the 14th international conference on Intelligent user interfaces
Discovering frequent work procedures from resource connections
Proceedings of the 14th international conference on Intelligent user interfaces
The case of the fake Picasso: preventing history forgery with secure provenance
FAST '09 Proccedings of the 7th conference on File and storage technologies
FAST '09 Proccedings of the 7th conference on File and storage technologies
Spyglass: fast, scalable metadata search for large-scale storage systems
FAST '09 Proccedings of the 7th conference on File and storage technologies
A formal model of provenance in distributed systems
TAPP'09 First workshop on on Theory and practice of provenance
Scalable access controls for lineage
TAPP'09 First workshop on on Theory and practice of provenance
TAPP'09 First workshop on on Theory and practice of provenance
Steps toward managing lineage metadata in grid clusters
TAPP'09 First workshop on on Theory and practice of provenance
The case for browser provenance
TAPP'09 First workshop on on Theory and practice of provenance
Provenance as data mining: combining file system metadata with content analysis
TAPP'09 First workshop on on Theory and practice of provenance
Making a cloud provenance-aware
TAPP'09 First workshop on on Theory and practice of provenance
Transparently gathering provenance with provenance aware condor
TAPP'09 First workshop on on Theory and practice of provenance
Do You Know Where Your Data's Been? --- Tamper-Evident Database Provenance
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
An Access Control Language for a General Provenance Model
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Preventing history forgery with secure provenance
ACM Transactions on Storage (TOS)
ACM Transactions on Storage (TOS)
Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications
Pipeline-centric provenance model
Proceedings of the 4th Workshop on Workflows in Support of Large-Scale Science
SMILE: encounter-based trust for mobile social services
Proceedings of the 16th ACM conference on Computer and communications security
A characterization of the problem of secure provenancemanagement
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Fusing data management services with file systems
Proceedings of the 4th Annual Workshop on Petascale Data Storage
Provenance as first class cloud data
ACM SIGOPS Operating Systems Review
Understanding provenance black boxes
Distributed and Parallel Databases
Neon: system support for derived data management
Proceedings of the 6th ACM SIGPLAN/SIGOPS international conference on Virtual execution environments
Fine-grained and efficient lineage querying of collection-based workflow provenance
Proceedings of the 13th International Conference on Extending Database Technology
ATTEST: ATTributes-based Extendable STorage
Journal of Systems and Software
Proceedings of the 3rd Annual Haifa Experimental Systems Conference
Mendel: efficiently verifying the lineage of data modified in multiple trust domains
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
Efficient querying of distributed provenance stores
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing
FAST'10 Proceedings of the 8th USENIX conference on File and storage technologies
Maximizing efficiency by trading storage for computation
HotCloud'09 Proceedings of the 2009 conference on Hot topics in cloud computing
Garm: cross application data provenance and policy enforcement
HotSec'09 Proceedings of the 4th USENIX conference on Hot topics in security
Trusted computing and provenance: better together
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Towards a secure and efficient system for end-to-end provenance
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Towards query interoperability: PASSing PLUS
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
A graph model of data and workflow provenance
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
A conceptual model and predicate language for data selection and projection based on provenance
TAPP'10 Proceedings of the 2nd conference on Theory and practice of provenance
Layering in provenance systems
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Trail of bytes: efficient support for forensic analysis
Proceedings of the 17th ACM conference on Computer and communications security
Document provenance in the cloud: constraints and challenges
EUNICE'10 Proceedings of the 16th EUNICE/IFIP WG 6.6 conference on Networked services and applications: engineering, control and management
Efficient non-linear editing for non-volatile mobile storage
Proceedings of the 2010 ACM multimedia workshop on Mobile cloud media computing
Research issues in data provenance
Proceedings of the 48th Annual Southeast Regional Conference
The Foundations for Provenance on the Web
Foundations and Trends in Web Science
Middleware for managing provenance metadata
Middleware '10 Posters and Demos Track
Approaches towards dealing with complex systems configuration
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems
Cross-application data provenance and policy enforcement
ACM Transactions on Information and System Security (TISSEC)
Linked provenance data: A semantic Web-based approach to interoperable workflow traces
Future Generation Computer Systems
An experimentation workbench for replayable networking research
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
Towards SIRF: self-contained information retention format
Proceedings of the 4th Annual International Conference on Systems and Storage
Repair from a chair: computer repair as an untrusted cloud service
HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
A scientific workflow environment for Earth system related studies
Computers & Geosciences
PrIMe: A methodology for developing provenance-aware applications
ACM Transactions on Software Engineering and Methodology (TOSEM)
Intrusion recovery for database-backed web applications
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
SOSP '11 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles
A data management system for ab-initio nuclear physics applications
Proceedings of the 19th High Performance Computing Symposia
Provenance as dependency analysis
Mathematical Structures in Computer Science - Programming Language Interference and Dependence
Easing the burdens of HPC file management
Proceedings of the sixth workshop on Parallel Data Storage
Applying provenance in distributed organ transplant management
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Applying the virtual data provenance model
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
A provenance model for manually curated data
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Issues in automatic provenance collection
IPAW'06 Proceedings of the 2006 international conference on Provenance and Annotation of Data
Securing data provenance in the cloud
iNetSec'11 Proceedings of the 2011 IFIP WG 11.4 international conference on Open Problems in Network Security
Don't trust your roommate or access control and replication protocols in "Home" environments
HotStorage'12 Proceedings of the 4th USENIX conference on Hot Topics in Storage and File Systems
BURRITO: wrapping your lab notebook in computational infrastructure
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
Tracking and constraining authorization provenance
IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
CloudFilter: practical control of sensitive data propagation to the cloud
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop
Leyline: provenance-based search using a graphical sketchpad
Proceedings of the Symposium on Human-Computer Interaction and Information Retrieval
Toward the modeling of data provenance in scientific publications
Computer Standards & Interfaces
A framework for scalable distributed provenance storage system
Computer Standards & Interfaces
Tracing where and who provenance in Linked Data: A calculus
Theoretical Computer Science
A hybrid approach for efficient provenance storage
Proceedings of the 21st ACM international conference on Information and knowledge management
Environmental Modelling & Software
A comprehensive model for provenance
IPAW'12 Proceedings of the 4th international conference on Provenance and Annotation of Data and Processes
A comprehensive model for provenance
ER'12 Proceedings of the 2012 international conference on Advances in Conceptual Modeling
Proceedings of the third ACM conference on Data and application security and privacy
Towards secure provenance-based access control in cloud environments
Proceedings of the third ACM conference on Data and application security and privacy
SPADE: support for provenance auditing in distributed environments
Proceedings of the 13th International Middleware Conference
Distributed time-aware provenance
Proceedings of the VLDB Endowment
Provenance from log files: a BigData problem
Proceedings of the Joint EDBT/ICDT 2013 Workshops
Proceedings of the Joint EDBT/ICDT 2013 Workshops
ReproZip: using provenance to support computational reproducibility
TaPP'13 Proceedings of the 5th USENIX conference on Theory and Practice of Provenance
OPUS: a lightweight system for observational provenance in user space
TaPP'13 Proceedings of the 5th USENIX conference on Theory and Practice of Provenance
IPAPI: designing an improved provenance API
TaPP'13 Proceedings of the 5th USENIX conference on Theory and Practice of Provenance
A provenance model for key-value systems
TaPP'13 Proceedings of the 5th USENIX conference on Theory and Practice of Provenance
ReproZip: using provenance to support computational reproducibility
Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance
OPUS: a lightweight system for observational provenance in user space
Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance
IPAPI: designing an improved provenance API
Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance
A provenance model for key-value systems
Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance
Rethinking the web as a personal archive
Proceedings of the 22nd international conference on World Wide Web
Evaluation of a Hybrid Approach for Efficient Provenance Storage
ACM Transactions on Storage (TOS)
Static compiler analysis for workflow provenance
WORKS '13 Proceedings of the 8th Workshop on Workflows in Support of Large-Scale Science
Hi-index | 0.00 |
A Provenance-Aware Storage System (PASS) is a storage system that automatically collects and maintains provenance or lineage, the complete history or ancestry of an item. We discuss the advantages of treating provenance as meta-data collected and maintained by the storage system, rather than as manual annotations stored in a separately administered database. We describe a PASS implementation, discussing the challenges it presents, performance cost it incurs, and the new functionality it enables. We show that with reasonable overhead, we can provide useful functionality not available in today's file systems or provenance management systems.