Results 31 to 40 of about 362,062 (288)

DEEP: a provenance-aware executable document system [PDF]

open access: yes, 2012
The concept of executable documents is attracting growing interest from both academics and publishers since it is a promising technology for the dissemination of scientific results. Provenance is a kind of metadata that provides a rich description of the
D. Koop   +7 more
core   +2 more sources

Towards Automatic Capturing of Manual Data Processing Provenance [PDF]

open access: yes, 2011
Often data processing is not implemented by a work ow system or an integration application but is performed manually by humans along the lines of a more or less specified procedure.
Huq, Mohammad R., Wombacher, Andreas
core   +6 more sources

Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking [PDF]

open access: yes, 2014
Cloud data provenance, or "what has happened to my data in the cloud", is a critical data security component which addresses pressing data accountability and data governance issues in cloud computing systems. In this paper, we present Progger (Provenance
Ko, Ryan K.L., Will, Mark Antony
core   +2 more sources

Data Provenance for SHACL

open access: yes, 2022
In constraint languages for RDF graphs, such as ShEx and SHACL, constraints on nodes and their properties are known as “shapes”. Using SHACL, we propose in this paper the notion of neighborhood of a node v satisfying a given shape in a graph G. This neighborhood is a subgraph of G, and provides data provenance of v for the given shape.
Delva, Thomas   +3 more
openaire   +3 more sources

Exploring complex and big data

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2017
This paper shows how big data analysis opens a range of research and technological problems and calls for new approaches. We start with defining the essential properties of big data and discussing the main types of data involved.
Stefanowski Jerzy   +2 more
doaj   +1 more source

Pricing Personal Data Based on Data Provenance

open access: yesApplied Sciences, 2019
Data have become an important asset. Mining the value contained in personal data, making personal data an exchangeable commodity, has become a hot spot of industry research.
Yuncheng Shen   +6 more
doaj   +1 more source

Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
It is extremely difficult to track down the original source of sensitive data from a variety of sources in the cloud during transit and processing. For instance, data provenance, which records the origins of data, and the record of data usage, update and
Oludare Isaac Abiodun   +3 more
doaj   +1 more source

LabelFlow: Exploiting Workflow Provenance to Surface Scientific Data Provenance [PDF]

open access: yes, 2015
Provenance traces captured by scientific workflows can be useful for designing, debugging and maintenance. However, our experience suggests that they are of limited use for reporting results, in part because traces do not comprise domain-specific annotations needed for explaining results, and the black-box nature of some workflow activities.
Alper, Pinar   +3 more
openaire   +3 more sources

Provenance Threat Modeling

open access: yes, 2017
Provenance systems are used to capture history metadata, applications include ownership attribution and determining the quality of a particular data set.
Brooks, Richard R.   +5 more
core   +1 more source

Modelling Provenance of Sensor Data for Food Safety Compliance Checking [PDF]

open access: yes, 2016
The research described here was funded by an award made by the RCUK IT as a Utility Network+ (EP/K003569/1) and the UK Food Standards Agency. We thank the owner and staff of Rye & Soda restaurant, Aberdeen for their support throughout the project ...
Edwards, Peter   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy