Some research strands in workflow-based provenance

Imagemap
Some research strands in workflow-based  ...metadata about this mindmapOriginally prepared for: Dagstuhl  semin ...Author: P.MissierLast updated: March 13, 2012ModellingThe elusive database / process-based 

  ...DFL - IS'08Hidders, Jan, Natalia Kwasnikowska, Jace ...value graphs, evaluation graphs --> prov ...provenance graph semantics: constructing ...construction in Haskellprovenance query challenge: define known ...discussionSensible provenance queriesProvenance query answerability / general ...IPAW'08Kwasnikowska, Natalia, and Jan den Bussc ...TAPP'10 - DFLAcar, Umut, Peter Buneman, James Cheney, ...DFL (extension of NRC) for provenancePVLDB'12 - the PigLatin paperOlston, Christopher, Benjamin Reed, Utka ...Yael Amsterdamer 2 , Susan B. Davidson 1 ...Breaks the module black box assumption a ...Key assumption: non-black box modules ar ...Ultimately grounded in NRC, as pig Latin ...But this is not clear in the paper?So that this can be used:
Y. Amsterdamer ...ContributionsA framework that marries database-style  ...A graph-based representation of fine-gra ...Definition of graph transformation opera ...Queries over the provenance graphs limit ...Implementation of the lipstick systemJoint modelling of execution traces 

 a ...the debugger argument: “I wouldn’t debug ...the visualization argument: “the workflo ...baseline: OPM then PROV (W3C)ExamplesOPMWGarijo, Daniel, and Yolanda Gil. “A New  ...JanusMissier, Paolo, Satya S Sahoo, Jun Zhao, ...D-OPM DataONE Provenance WG (in progress ...wfDesc, wfProv: from the Wf4Ever project ...see OPMWWhat is needed, really, and why?Should these features have a place 

 in ...data streaming data collections 

 (e.g. ... concurrency of blocks execution stateful computation Is there a “killer app” that showcases t ...Link between MoC and MoP 

 -- the “cano ...T = R - I + MPrivacy-preserving provenanceposition / early papers WANDS'10 - Davidson et al.Davidson, Susan B., Sanjeev Khanna, Sude ...CIDR'11 - Davidson et al.Susan B. Davidson, Sanjeev Khanna, Sudee ...Position papertrade-off: query utility vs privacy pres ...assumes queries span both workflow struc ...Data privacy -- standard in DBMSModule privacy - function computed by a  ...Structural privacy -- hides the fact tha ...SSDBM'11 - Dey, Zinn, et al.Dey, Saumen, Daniel Zinn, and Bertram Lu ...PROPUB (Provenance Publisher)state provenance publication and customi ...specify provenance policies, check wheth ...repair policy violations and reconcile c ...ICDT'11 - Davidson et al.Davidson, Susan B, Sanjeev Khanna, Sudee ...PODS'11 - Davidson et al.Davidson, Susan B, Sanjeev Khanna, Tova  ...The secure-view problem.
Module privacy  ...Explores the trade-off between the utili ...“Human in the loop” provenanceIncludes annotated descriptions of the e ...lab books, record of field workHow much human effort is justified?any evidence that human-generated, machi ...My Lab Notebookblog³ - A blogging engine for the Semant ...LabTroveoriginally: “Blogging the lab”  @OGF21 ( ...David De Roure, Jeremy Frey and Andrew M ...RightfieldCollectingBroading the scope: non-workflow RTEs R is prominent in science, other scripti ...Merging Provenance from different execut ...provenance is a manifestation of 

 Impl ...the DataONE "Data Tree of Life" projectMissier, Paolo, Bertram Ludascher, Shawn ...PASS -- system-level provenanceUSENIX conference 2006Muniswamy-Reddy, Kiran-Kumar, David A Ho ...TAPP'11Macko, Peter, Marc Chiarini, and Margo S ...Provenance challenge / CCPEHolland, D A, M I Seltzer, U Braun, and  ...Secure / tamper-evident / 

 trustworthy ...Storage security 2007Hasan, Ragib, Radu Sion, and Marianne Wi ...position paperSecurity/ usenix 2008Braun, Uri, Avraham Shinnar, and Margo S ...The fake Picasso paper (TAPP 2009)Hasan, Ragib, Radu Sion, and Marianne Wi ...architecture for capturing prove-nance i ...Scure and tamper-proof provenance chain. ...Interesting use cases where tampering wi ...The primary threat we guard against in t ...Multi layered approach: encryption for s ...Linked to issues of trustworthy computin ...trusted provenance @Tapp 10Lyle, John, and Andrew Martin. Trusted c ...Trusted Computing as a means to enforce  ...Secure data management 2009Zhang, Jing, Adriane Chapman, and Kriste ...The Tcloud  EU project Collecting and warehousing provenance: 
 ..."where can I find a repository of proven ...IDCC'11 conference on data curationMissier, Paolo, Bertram Ludascher, Shawn ...ExploitingAnalyticsProvenance and QualityOlaf Hartig and Jun Zhao: Using Web Data ...Provenance and recommender systemsProvenance and trustProvenance for incremental process impro ...TAPP'11 Missier, Paolo. “Incremental workflow  ...Provenance for reproducibilitythe wf4Ever EU projectemerging application: executable papersKoop, David, Emanuele Santos, Phillip Ma ...Provenance for improving data engineerin ...Checkpointing facilities in support of l ...partial/smart rerun of resource-intensiv ...progressive optimization of repetitive p ...TAPP'11 Missier, Paolo. “Incremental workflow  ...
hide
Some research strands in workflow-based provenance
hide
Modelling
hidebutton_ok

The elusive database / process-based

provenance convergence:

 "Is there a common notion of provenance

that can view wf provenance

and db provenance as different flavors

of the same broad model?"

hide
PVLDB'12 - the PigLatin paper
hidebutton_ok
Privacy-preserving provenance
hide
Collecting
hide

Secure / tamper-evident /

trustworthy provenance for workflows 

Police forces are becoming very interested in this