A Primer on Provenance

被引:41
作者
Carata, Lucian [1 ]
Akoush, Sherif [1 ]
Balakrishnan, Nikilesh [1 ]
Bytheway, Thomas [1 ]
Sohan, Ripduman [2 ]
Selter, Margo [3 ]
Hopper, Andy [4 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB2 1TN, England
[2] Univ Cambridge, Comp Lab, Fabr Reproducible Computat FRESCO Project, Cambridge CB2 1TN, England
[3] Harvard Univ, Sch Engn & Appl Sci, Cambridge, MA 02138 USA
[4] Univ Cambridge, Cambridge CB2 1TN, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1145/2596628
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
ASSESSING THE QUALITY or validity of a piece of data is not usually done in isolation. You typically examine the context in which the data appears and try to determine its original sources or review the process through which it was created. This is not so straightforward when dealing with digital data, however: the result of a computation might have been derived from numerous sources and by applying complex successive transformations, possibly over long periods of time. As the quantity of data that contributes to a particular result increases, keeping track of how different sources and transformations are related to each other becomes more difficult. This constrains the ability to answer questions regarding a result's history, such as: What were the underlying assumptions on which the result is based? Under what conditions does it remain valid? What other results were derived from the same data sources?. © Copyright held by Owners/Authors.
引用
收藏
页码:52 / 60
页数:9
相关论文
共 28 条
[1]   Putting Lipstick on Pig: Enabling Database-style Workflow Provenance [J].
Amsterdamer, Yael ;
Davidson, Susan B. ;
Deutch, Daniel ;
Milo, Tova ;
Stoyanovich, Julia ;
Tannen, Val .
PROCEEDINGS OF THE VLDB ENDOWMENT, 2011, 5 (04) :346-357
[2]  
Biton O., 2007, P 33 INT C VER LARG, P366
[3]  
Blum M., 1982, ADV CRYPTOLOGY REPOR
[4]   Evaluation of Filesystem Provenance Visualization Tools [J].
Borkin, Michelle A. ;
Yeh, Chelsea S. ;
Boyd, Madelaine ;
Macko, Peter ;
Gajos, Krzysztof Z. ;
Seltzer, Margo ;
Pfister, Hanspeter .
IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS, 2013, 19 (12) :2476-2485
[5]  
BRAUN U., 2008, Proceedings of the 3rd conference on Hot topics in secuity, P1
[6]  
Braun U, 2006, LECT NOTES COMPUT SC, V4145, P171
[7]  
Buneman P., 2002, P 8 INT C DAT THEOR, P316
[8]  
Callahan SP, 2008, LECT NOTES COMPUT SC, V5272, P120, DOI 10.1007/978-3-540-89965-5_13
[9]   Tracing the lineage of view data in a warehousing environment [J].
Cui, YW ;
Widom, J ;
Wiener, JL .
ACM TRANSACTIONS ON DATABASE SYSTEMS, 2000, 25 (02) :179-227
[10]  
Freire J, 2006, LECT NOTES COMPUT SC, V4145, P10