منابع مشابه
Provenance as Dependency Analysis
Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings, particularly database management systems; however, although many candidate definitions of provenance have been proposed, the mathematical or semantic foundations of data provenance have received comparatively little attention. In this article...
متن کاملDerivation Rule Dependency and Data Provenance Semantics
This paper proposes a derivation rule dependency (DRD) to represent data provenance semantics. Data provenances are mostly for tracing data lineage and data creation processes. We propose to treat data provenance semantics as derivation dependencies meta-data. This study is a kind of conceptual one. We are in the process of building a prototype that manages and apply it to real world examples. ...
متن کاملDependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems
A unique characteristics of provenance data is that it forms a directed acyclic graph (DAG) in accordance with the underlying causality dependencies between entities (acting users, action processes and data objects) involved in transactions. Data provenance raises at least two distinct security-related issues. One is how to control access to provenance data which we call Provenance Access contr...
متن کاملA Query Language of Data Provenance Based on Dependency View for Process Analysis
For the scale of data in process keep increasing, data provenance also becomes large and constantly growing, which brings challenges to the efficiency of provenance tracking in process analysis. This paper proposes a kind of dependency view to extract a global data provenance description of the data process instance, and then defines a contextual query language based on dependency view to imple...
متن کاملProvenance as a Security Control
Much has been written about security and provenance. Although both have their own large areas of concern, there is a very significant intersection. One is often brought to bear upon the other, in the study of the security of provenance. We discuss through a series of examples how provenance might be regarded as a security control in its own right. We argue that a risk-based approach to provenan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Mathematical Structures in Computer Science
سال: 2011
ISSN: 0960-1295,1469-8072
DOI: 10.1017/s0960129511000211