Transparent Provenance Derivation for User Decisions
نویسندگان
چکیده
It is rare for data’s history to include computational processes alone. Even when software generates data, users ultimately decide to execute software procedures, choose their configuration and inputs, reconfigure, halt and restart processes, and so on. Understanding the provenance of data thus involves understanding the reasoning of users behind these decisions, but demanding that users explicitly document decisions could be intrusive if implemented naively, and impractical in some cases. In this paper, therefore, we explore an approach to transparently deriving the provenance of user decisions at query time. The user reasoning is simulated, and if the result of the simulation matches the documented decision, the simulation is taken to approximate the actual reasoning. The plausibility of this approach requires that the simulation mirror human decision-making, so we adopt an automated process explicitly modelled on human psychology. The provenance of the decision is modelled in Open Provenance Model (OPM), allowing it to be queried as part of a larger provenance graph, and an OPM profile is provided to allow consistent querying of provenance across user decisions.
منابع مشابه
Selective Provenance for Datalog Programs Using Top-K Queries
Highly expressive declarative languages, such as datalog, are now commonly used to model the operational logic of dataintensive applications. The typical complexity of such datalog programs, and the large volume of data that they process, call for result explanation. Results may be explained through the tracking and presentation of data provenance, and here we focus on a detailed form of proven...
متن کاملSecure Scientific Workflow Provenance Querying with Security Views
Provenance, the metadata that pertains to the derivation history of a data product starting from its original sources, has become increasingly important in scientific workflow environments. In many cases, both data products and their provenance can be sensitive and effective access control mechanisms are essential to protect their confidentiality. In this paper, we propose i) a formalization of...
متن کاملApproximated Provenance for Complex Applications
Many applications now involve the collection of large amounts of data from multiple users, and then aggregating and manipulating it in intricate ways. The complexity of such applications, combined with the size of the collected data, makes it difficult to understand how information was derived, and consequently difficult to asses its credibility, to optimize and debug its derivation, etc. Prove...
متن کاملDerivation Rule Dependency and Data Provenance Semantics
This paper proposes a derivation rule dependency (DRD) to represent data provenance semantics. Data provenances are mostly for tracing data lineage and data creation processes. We propose to treat data provenance semantics as derivation dependencies meta-data. This study is a kind of conceptual one. We are in the process of building a prototype that manages and apply it to real world examples. ...
متن کاملTrust and Provenance You Can’t Have One Without The Other
On the social web content is no longer generated by a small number of established authorities but by a huge number of mostly anonymous users. On the semantic web new content is created by combining existing information from different sources on the fly. In both cases trust is of fundamental importance. Is the user providing new content trustworthy? How trustworthy is information inferred from s...
متن کامل