Sciweavers

813 search results - page 2 / 163
» Pipeline-centric provenance model
Sort
View
SC
2009
ACM
13 years 11 months ago
Pipeline-centric provenance model
In this paper we propose a new provenance model which is tailored to a class of workflow-based applications. We motivate the approach with use cases from the astronomy community. ...
Paul T. Groth, Ewa Deelman, Gideon Juve, Gaurang M...
ER
2006
Springer
96views Database» more  ER 2006»
13 years 8 months ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu
FGCS
2011
153views more  FGCS 2011»
12 years 12 months ago
Representing distributed systems using the Open Provenance Model
From the World Wide Web to supply chains and scientific simulations, distributed systems are a widely used and important approach to building computational systems. Tracking prov...
Paul T. Groth, Luc Moreau
ICDE
2009
IEEE
160views Database» more  ICDE 2009»
13 years 2 months ago
Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting
Data provenance is information that describes how a given data item was produced. The provenance includes source and intermediate data as well as the transformations involved in pr...
Boris Glavic, Gustavo Alonso
CTRSA
2005
Springer
154views Cryptology» more  CTRSA 2005»
13 years 10 months ago
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
Tsz Hon Yuen, Victor K. Wei