{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:37:49Z","timestamp":1775666269814,"version":"3.50.1"},"reference-count":192,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T00:00:00Z","timestamp":1508112000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB-TRR 161"],"award-info":[{"award-number":["SFB-TRR 161"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["The VLDB Journal"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s00778-017-0486-1","type":"journal-article","created":{"date-parts":[[2017,10,16]],"date-time":"2017-10-16T11:30:04Z","timestamp":1508153404000},"page":"881-906","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":224,"title":["A survey on provenance: What for? What form? What from?"],"prefix":"10.1007","volume":"26","author":[{"given":"Melanie","family":"Herschel","sequence":"first","affiliation":[]},{"given":"Ralf","family":"Diestelk\u00e4mper","sequence":"additional","affiliation":[]},{"given":"Houssem","family":"Ben Lahmar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,16]]},"reference":[{"key":"486_CR1","unstructured":"Acar, U., Buneman, P., Cheney, J., Van Den Bussche, J., Kwasnikowska, N., Vansummeren, S.: A graph model of data and workflow provenance. In: Workshop on Theory and Practice of Provenance (TAPP) (2010)"},{"key":"486_CR2","doi-asserted-by":"crossref","unstructured":"Ainy, E., Bourhis, P., Davidson, S.B., Deutch, D., Milo, T.: Approximated summarization of data provenance. In: Conference on Information and Knowledge Management (CIKM), pp. 483\u2013492 (2015)","DOI":"10.1145\/2806416.2806429"},{"key":"486_CR3","unstructured":"Akoush, S., Sohan, R., Hopper, A.: HadoopProv: towards provenance as a first class citizen in MapReduce. In: Workshop on Theory and Practice of Provenance (TAPP) (2013)"},{"key":"486_CR4","doi-asserted-by":"crossref","unstructured":"Alkhaldi, A., Gupta, I., Raghavan, V., Ghosh, M.: Leveraging metadata in no SQL storage systems. In: IEEE Conference on Cloud Computing (CLOUD), pp. 57\u201364 (2015)","DOI":"10.1109\/CLOUD.2015.18"},{"key":"486_CR5","doi-asserted-by":"crossref","unstructured":"Alper, P., Belhajjame, K., Goble, C.A., Karagoz, P.: Enhancing and abstracting scientific workflow provenance for data publishing. In: EDBT\/ICDT Workshops, pp. 313\u2013318 (2013)","DOI":"10.1145\/2457317.2457370"},{"key":"486_CR6","doi-asserted-by":"crossref","unstructured":"Altintas, I., Barney, O., Jaeger-Frank, E.: Provenance collection support in the Kepler scientific workflow system. In: International Provenance and Annotation Workshop (IPAW), pp. 118\u2013132 (2006)","DOI":"10.1007\/11890850_14"},{"key":"486_CR7","doi-asserted-by":"crossref","unstructured":"Alvaro, P., Rosen, J., Hellerstein, J.M.: Lineage-driven fault injection. In: ACM Conference on the Management of Data (SIGMOD), pp. 331\u2013346 (2015)","DOI":"10.1145\/2723372.2723711"},{"key":"486_CR8","doi-asserted-by":"crossref","unstructured":"Amann, B., Constantin, C., Caron, C., Giroux, P.: Weblab prov: computing fine-grained provenance links for xml artifacts. In: EDBT\/ICDT Workshops, pp. 298\u2013306 (2013)","DOI":"10.1145\/2457317.2457367"},{"key":"486_CR9","doi-asserted-by":"crossref","first-page":"346","DOI":"10.14778\/2095686.2095693","volume":"5","author":"Y Amsterdamer","year":"2011","unstructured":"Amsterdamer, Y., Davidson, S.B., Deutch, D., Milo, T., Stoyanovich, J., Tannen, V.: Putting lipstick on pig : enabling database-style workflow provenance. Proc. VLDB Endow.: PVLDB 5, 346\u2013357 (2011)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR10","unstructured":"Amsterdamer, Y., Deutch, D., Tannen, V.: On the limitations of provenance for queries with difference. In: Workshop on Theory and Practice of Provenance (TAPP) (2011)"},{"key":"486_CR11","doi-asserted-by":"crossref","unstructured":"Amsterdamer, Y., Deutch, D., Tannen, V.: Provenance for aggregate queries. In: ACM Symposium on principles of database systems (PODS), pp. 153\u2013164 (2011)","DOI":"10.1145\/1989284.1989302"},{"key":"486_CR12","doi-asserted-by":"crossref","unstructured":"Anand, M.K., Bowers, S., Lud\u00e4scher, B.: Techniques for efficiently querying scientific workflow provenance graphs. In: Conference on Extending Database Technology (EDBT), pp. 287\u2013298 (2010)","DOI":"10.1145\/1739041.1739078"},{"key":"486_CR13","doi-asserted-by":"crossref","unstructured":"Anand, M.K., Bowers, S., Lud\u00e4scher, B.: Provenance browser: displaying and querying scientific workflow provenance graphs. In: IEEE International Conference on Data Engineering (ICDE), pp. 1201\u20131204 (2010)","DOI":"10.1109\/ICDE.2010.5447741"},{"key":"486_CR14","doi-asserted-by":"crossref","unstructured":"Anand, M.K., Bowers, S., McPhillips, T., Lud\u00e4scher, B.: Efficient provenance storage over nested data collections. In: Conference on Extending Database Technology (EDBT), pp. 958\u2013969 (2009)","DOI":"10.1145\/1516360.1516470"},{"key":"486_CR15","doi-asserted-by":"crossref","unstructured":"Angelino, E., Yamins, D., Seltzer, M.I.: Starflow: a script-centric data analysis environment. In: International Provenance and Annotation Workshop (IPAW), pp. 236\u2013250 (2010)","DOI":"10.1007\/978-3-642-17819-1_27"},{"key":"486_CR16","doi-asserted-by":"crossref","unstructured":"Arab, B.S., Gawlick, D., Krishnaswamy, V., Radhakrishnan, V., Glavic, B.: Reenactment for read-committed snapshot isolation. In: Conference on Information and Knowledge Management (CIKM), pp. 841\u2013850 (2016)","DOI":"10.1145\/2983323.2983825"},{"key":"486_CR17","unstructured":"Balakrishnan, N., Bytheway, T., Carata, L., Sohan, R., Hopper, A.: Towards secure user-space provenance capture. In: Workshop on Theory and Practice of Provenance (TAPP) (2016)"},{"issue":"5","key":"486_CR18","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1002\/cpe.1235","volume":"20","author":"RS Barga","year":"2008","unstructured":"Barga, R.S., Digiampietri, L.A.: Automatic capture and efficient storage of e-Science experiment provenance. Concurr. Comput. Pract. Exp. 20(5), 419\u2013429 (2008)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"486_CR19","volume-title":"Data Quality: Concepts. Methodologies and Techniques","author":"C Batini","year":"2006","unstructured":"Batini, C., Scannapieco, M.: Data Quality: Concepts. Methodologies and Techniques. Springer, New York (2006)"},{"key":"486_CR20","doi-asserted-by":"crossref","unstructured":"Bavoil, L., Callahan, S.P., Crossno, P.J., Freire, J., Scheidegger, C.E., Silva, C.T., Vo. H.T.: Vistrails: enabling interactive multiple-view visualizations. In: IEEE Visualization (VIS), pp. 135\u2013142 (2005)","DOI":"10.1109\/VISUAL.2005.1532788"},{"issue":"3","key":"486_CR21","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s10844-014-0322-7","volume":"43","author":"E Bertino","year":"2014","unstructured":"Bertino, E., Ghinita, G., Kantarcioglu, M., Nguyen, D., Park, J., Sandhu, R., Sultana, S., Thuraisingham, B., Xu, S.: A roadmap for privacy-enhanced secure data provenance. J. Intell. Inf. Syst. 43(3), 481\u2013501 (2014)","journal-title":"J. Intell. Inf. Syst."},{"issue":"4","key":"486_CR22","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s00778-005-0156-6","volume":"14","author":"D Bhagwat","year":"2005","unstructured":"Bhagwat, D., Chiticariu, L., Tan, W.C., Vijayvargiya, G.: An annotation management system for relational databases. VLDB J. 14(4), 373\u2013396 (2005)","journal-title":"VLDB J."},{"key":"486_CR23","doi-asserted-by":"crossref","unstructured":"Bidoit, N., Herschel, M., Tzompanaki, A.: Efficient computation of polynomial explanations of why-not questions. In: Conference on Information and Knowledge Management (CIKM), pp. 713\u2013722 (2015)","DOI":"10.1145\/2806416.2806426"},{"key":"486_CR24","doi-asserted-by":"crossref","unstructured":"Bidoit, N., Herschel, M., Tzompanaki, K.: Immutably answering why-not questions for equivalent conjunctive queries. In: Workshop on Theory and Practice of Provenance (TAPP) (2014)","DOI":"10.3166\/isi.20.5.27-52"},{"key":"486_CR25","unstructured":"Bidoit, N., Herschel, M., Tzompanaki, K.: Query-based why-not provenance with NedExplain. In: Conference on Extending Database Technology (EDBT), pp. 145\u2013156 (2014)"},{"issue":"12","key":"486_CR26","doi-asserted-by":"crossref","first-page":"1980","DOI":"10.14778\/2824032.2824116","volume":"8","author":"N Bidoit","year":"2015","unstructured":"Bidoit, N., Herschel, M., Tzompanaki, K.: EFQ: why-not answer polynomials in action. Proc. VLDB Endow.: PVLDB 8(12), 1980\u20131983 (2015)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR27","doi-asserted-by":"crossref","unstructured":"Biton, O., Cohen-Boulakia, S., Davidson, S.B., Hara, C.S.: Querying and managing provenance through user views in scientific workflows. In: IEEE International Conference on Data Engineering (ICDE), pp. 1072\u20131081 (2008)","DOI":"10.1109\/ICDE.2008.4497516"},{"issue":"12","key":"486_CR28","doi-asserted-by":"crossref","first-page":"2476","DOI":"10.1109\/TVCG.2013.155","volume":"19","author":"MA Borkin","year":"2013","unstructured":"Borkin, M.A., Yeh, C.S., Boyd, M., Macko, P., Gajos, K.Z., Seltzer, M., Pfister, H.: Evaluation of filesystem provenance visualization tools. IEEE Trans. Vis. Comput. Graph. 19(12), 2476\u20132485 (2013)","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"486_CR29","unstructured":"B\u00f6rzs\u00f6nyi, S., Kossmann, D., Stocker, K.: The skyline operator. In: IEEE International Conference on Data Engineering (ICDE), pp. 421\u2013430 (2001)"},{"key":"486_CR30","doi-asserted-by":"crossref","unstructured":"Bourhis, P., Deutch, D., Moskovitch, Y.: POLYTICS: provenance-based analytics of data-centric applications. In: IEEE International Conference on Data Engineering (ICDE), pp. 1373\u20131374 (2017)","DOI":"10.1109\/ICDE.2017.183"},{"issue":"5","key":"486_CR31","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1002\/cpe.1226","volume":"20","author":"S Bowers","year":"2008","unstructured":"Bowers, S., McPhillips, T.M., Lud\u00e4scher, B.: Provenance in collection-oriented scientific workflows. Concurr. Comput. Pract. Exp. 20(5), 519\u2013529 (2008)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"486_CR32","doi-asserted-by":"crossref","unstructured":"Bowers, S., McPhillips, T.M., Riddle, S., Anand, M.K., Lud\u00e4scher, B.: Kepler\/pPOD: Scientific workflow and provenance support for assembling the tree of life. In: International Provenance and Annotation Workshop (IPAW), pp. 70\u201377 (2008)","DOI":"10.1007\/978-3-540-89965-5_9"},{"key":"486_CR33","doi-asserted-by":"crossref","unstructured":"Buneman, P., Khanna, S., Tan, W.C.: Why and where: a characterization of data provenance. In: International Conference on Database Theory (ICDT), pp. 316\u2013330 (2001)","DOI":"10.1007\/3-540-44503-X_20"},{"key":"486_CR34","doi-asserted-by":"crossref","unstructured":"Buneman, P., Khanna, S., Tan, W.C.: On propagation of deletions and annotations through views. In: ACM Symposium on Principles of Database Systems (PODS), pp. 150\u2013158 (2002)","DOI":"10.1145\/543613.543633"},{"key":"486_CR35","doi-asserted-by":"crossref","unstructured":"Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: A language for provenance access control. In: ACM Conference on Data and Application Security and Privacy (CODASPY), pp. 133\u2013144 (2011)","DOI":"10.1145\/1943513.1943532"},{"key":"486_CR36","doi-asserted-by":"crossref","unstructured":"Cadenhead, T., Khadilkar, V., Kantarcioglu, M., Thuraisingham, B.: Transforming provenance using redaction. In: ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 93\u2013102 (2011)","DOI":"10.1145\/1998441.1998456"},{"key":"486_CR37","doi-asserted-by":"crossref","unstructured":"Callahan, S.P., Freire, J., Santos, E., Scheidegger, C.E., Vo, T., Silva, H.T.: VisTrails : visualization meets data management. In: ACM Conference on the Management of Data (SIGMOD), pp. 745\u2013747 (2006)","DOI":"10.1145\/1142473.1142574"},{"key":"486_CR38","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1613\/jair.3870","volume":"48","author":"D Calvanese","year":"2013","unstructured":"Calvanese, D., Ortiz, M., Simkus, M., Stefanoni, G.: Reasoning about explanations for negative query answers in DL-Lite. J. Artif. Intell. Res.: JAIR 48, 635\u2013669 (2013)","journal-title":"J. Artif. Intell. Res.: JAIR"},{"key":"486_CR39","doi-asserted-by":"crossref","unstructured":"Cao, B., Plale, B., Subramanian, G., Robertson, E., Simmhan, Y.: Provenance information model of Karma version 3. In: Congress on Services\u2014I (SERVICES), pp. 348\u2013351 (2009)","DOI":"10.1109\/SERVICES-I.2009.54"},{"key":"486_CR40","doi-asserted-by":"crossref","unstructured":"Cao, Y., Jones, C., Mcphillips, T., Jones, M.B., Lud\u00e4scher, B., Missier, P., Schwalm, C., Slaughter, P., Vieglais, D., Walker, L., Wei, Y.: DataONE: a data federation with provenance support. In: International Provenance and Annotation Workshop (IPAW), pp. 230\u2013234 (2016)","DOI":"10.1007\/978-3-319-40593-3_28"},{"key":"486_CR41","doi-asserted-by":"crossref","unstructured":"Caron, C., Amann, B., Constantin, C., Giroux, P.: WePIGE: the Weblab provenance information generator and explorer. In: Conference on Extending Database Technology (EDBT), pp. 664\u2013667 (2014)","DOI":"10.1145\/2457317.2457367"},{"key":"486_CR42","doi-asserted-by":"crossref","unstructured":"Chapman, A., Jagadish, H., Ramanan, P.: Efficient provenance storage. In: ACM Conference on the Management of Data (SIGMOD), pp. 993\u20131006 (2008)","DOI":"10.1145\/1376616.1376715"},{"key":"486_CR43","doi-asserted-by":"crossref","unstructured":"Chapman, A., Jagadish, H.V.: Why not? In: ACM Conference on the Management of Data (SIGMOD), pp. 523\u2013534 (2009)","DOI":"10.1145\/1559845.1559901"},{"issue":"4","key":"486_CR44","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1109\/TSC.2010.38","volume":"3","author":"A Chebotko","year":"2010","unstructured":"Chebotko, A., Lu, S., Chang, S., Fotouhi, F., Yang, P.: Secure abstraction views for scientific workflow provenance querying. IEEE Trans. Serv. Comput. 3(4), 322\u2013337 (2010)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"486_CR45","doi-asserted-by":"crossref","unstructured":"Cheney, J.: A formal framework for provenance security. In: IEEE Computer Security Foundations Symposium (CSF), pp. 281\u2013293 (2011)","DOI":"10.1109\/CSF.2011.26"},{"issue":"4","key":"486_CR46","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1561\/1900000006","volume":"1","author":"J Cheney","year":"2009","unstructured":"Cheney, J., Chiticariu, L., Tan, W.C.: Provenance in databases: why, how, and where. Found Trends Databases 1(4), 379\u2013474 (2009)","journal-title":"Found Trends Databases"},{"key":"486_CR47","doi-asserted-by":"crossref","unstructured":"Cheney, J., Perera, R.: An analytical survey of provenance sanitization. In: International Provenance and Annotation Workshop (IPAW), pp. 113\u2013126 (2014)","DOI":"10.1007\/978-3-319-16462-5_9"},{"key":"486_CR48","unstructured":"Chester, S., Assent, I.: Explanations for skyline query results. In: Conference on Extending Database Technology (EDBT), pp. 349\u2013360 (2015)"},{"key":"486_CR49","doi-asserted-by":"crossref","unstructured":"Cheung K., Hunter, J.: Provenance explorer\u2014customized provenance views using semantic inferencing. In: International Semantic Web Conference (ISWC), pp. 215\u2013227 (2006)","DOI":"10.1007\/11926078_16"},{"key":"486_CR50","unstructured":"Chirigati, F., Shasha, D., Freire, J.: ReproZip: using provenance to support computational reproducibility. In: Workshop on Theory and Practice of Provenance (TAPP), pp. 1\u20134 (2013)"},{"key":"486_CR51","unstructured":"Chiticariu, L., Tan, W.C.: Debugging schema mappings with routes. In: Conference on Very Large Data Bases (VLDB), pp. 79\u201390 (2006)"},{"issue":"12","key":"486_CR52","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.14778\/2994509.2994530","volume":"9","author":"Z Chothia","year":"2016","unstructured":"Chothia, Z., Liagouris, J., McSherry, F., Roscoe, T.: Explaining outputs in modern data analytics. Proc. VLDB Endow.: PVLDB 9(12), 1137\u20131148 (2016)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR53","unstructured":"Commission, E.: Horse meat: one year after\u2014actions announced and delivered! (2014). Accessed March 15, 2016"},{"key":"486_CR54","doi-asserted-by":"publisher","unstructured":"Cranmer, K., Heinrich, L., Jones, R., South, D.M.: Analysis preservation in ATLAS. J. Physi. 664(3) (2015). doi: 10.1088\/1742-6596\/664\/3\/032013","DOI":"10.1088\/1742-6596\/664\/3\/032013"},{"key":"486_CR55","doi-asserted-by":"crossref","unstructured":"Crawl, D., Altintas, I.: A provenance-based fault tolerance mechanism for scientific workflows. In: International Provenance and Annotation Workshop (IPAW), pp. 152\u2013159 (2008)","DOI":"10.1007\/978-3-540-89965-5_17"},{"key":"486_CR56","doi-asserted-by":"crossref","unstructured":"Crawl, D., Wang, J., Altintas, I.: Provenance for mapreduce-based data-intensive workflows. In: Workshop on Workflows in Support of Large-Scale Science (WORKS), pp. 21\u201330 (2011)","DOI":"10.1145\/2110497.2110501"},{"key":"486_CR57","unstructured":"Cui, Y., Widom, J.: Lineage tracing for general data warehouse transformations. In: Conference on Very Large Data Bases (VLDB), pp. 471\u2013480 (2001)"},{"issue":"2","key":"486_CR58","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1145\/357775.357777","volume":"25","author":"Y Cui","year":"2000","unstructured":"Cui, Y., Widom, J., Wiener, J.L.: Tracing the lineage of view data in a warehousing environment. ACM Trans. Database Syst: TODS 25(2), 179\u2013227 (2000)","journal-title":"ACM Trans. Database Syst: TODS"},{"key":"486_CR59","doi-asserted-by":"crossref","unstructured":"Curbera, F., Doganata, Y.N., Martens, A., Mukhi, N., Slominski, A.: Business provenance\u2014a technology to increase traceability of end-to-end operations. In: On the Move to Meaningful Internet Systems OTM, pp. 100\u2013119 (2008)","DOI":"10.1007\/978-3-540-88871-0_10"},{"key":"486_CR60","doi-asserted-by":"crossref","unstructured":"Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: Workshop on Secure Data Management (SDM), pp. 82\u201398 (2008)","DOI":"10.1007\/978-3-540-85259-9_6"},{"issue":"4","key":"486_CR61","first-page":"44","volume":"30","author":"SB Davidson","year":"2007","unstructured":"Davidson, S.B., Cohen-Boulakia, S., Eyal, A., Lud\u00e4scher, B., McPhillips, T.M., Bowers, S., Anand, M.K., Freire, J.: Provenance in scientific workflow systems. IEEE Data Eng. Bull. 30(4), 44\u201350 (2007)","journal-title":"IEEE Data Eng. Bull."},{"key":"486_CR62","doi-asserted-by":"crossref","unstructured":"Davidson, S.B., Freire, J.: Provenance and scientific workflows: challenges and opportunities. In: ACM Conference on the Management of Data (SIGMOD), pp. 1345\u20131350 (2008)","DOI":"10.1145\/1376616.1376772"},{"key":"486_CR63","doi-asserted-by":"crossref","unstructured":"De Nies, T., Taxidou, I., Dimou, A., Verborgh, R., Fischer, P.M., Mannens, E., de\u00a0Walle, R.: Towards multi-level provenance reconstruction of information diffusion on social media. In: Conference on Information and Knowledge Management (CIKM), pp. 1823\u20131826 (2015)","DOI":"10.1145\/2806416.2806642"},{"key":"486_CR64","doi-asserted-by":"crossref","unstructured":"Deelman, E., Berriman, G.B., Chervenak, A.L., Corcho, \u00d3., Groth, P.T., Moreau, L.: Metadata and provenance management. In: Shoshani, A., Rotem, D. (eds.) Scientific Data Management: Challenges, Technology, and Deployment. Chapman & Hall\/CRC, Boca Raton (2009)","DOI":"10.1201\/9781420069815-c12"},{"issue":"3","key":"486_CR65","first-page":"219","volume":"13","author":"E Deelman","year":"2005","unstructured":"Deelman, E., Singh, G., Su, M., Blythe, J., Gil, Y., Kesselman, C., Mehta, G., Vahi, K., Berriman, G.B., Good, J., Laity, A.C., Jacob, J.C., Katz, D.S.: Pegasus: a framework for mapping complex scientific workflows onto distributed systems. Sci. Program. 13(3), 219\u2013237 (2005)","journal-title":"Sci. Program."},{"key":"486_CR66","unstructured":"Dellis, E., Seeger, B.: Efficient computation of reverse skyline queries. In: Conference on Very Large Data Bases (VLDB), pp. 291\u2013302 (2007)"},{"key":"486_CR67","doi-asserted-by":"crossref","unstructured":"Deutch, D., Gilad, A., Moskovitch, Y.: selP: selective tracking and presentation of data provenance. In: IEEE International Conference on Data Engineering (ICDE), pp. 1484\u20131487 (2015)","DOI":"10.1109\/ICDE.2015.7113407"},{"issue":"6","key":"486_CR68","doi-asserted-by":"crossref","first-page":"457","DOI":"10.14778\/2732279.2732283","volume":"7","author":"D Deutch","year":"2014","unstructured":"Deutch, D., Moskovitch, Y., Tannen, V.: A provenance framework for data-dependent process analysis. Proc. VLDB Endow. 7(6), 457\u2013468 (2014)","journal-title":"Proc. VLDB Endow."},{"key":"486_CR69","unstructured":"Dey, S., Belhajjame, K., Koop, D., Raul, M., Lud\u00e4scher, B.: Linking prospective and retrospective provenance in scripts. In: Workshop on Theory and Practice of Provenance (TAPP) (2015)"},{"key":"486_CR70","doi-asserted-by":"crossref","unstructured":"Dey, S.C., Zinn, D., Lud\u00e4scher, B.: Propub: towards a declarative approach for publishing customized, policy-aware provenance. In: Conference on Scientific and Statistical Database Management (SSDBM), pp. 225\u2013243 (2011)","DOI":"10.1007\/978-3-642-22351-8_13"},{"key":"486_CR71","doi-asserted-by":"crossref","unstructured":"Ellkvist, T., Koop, D., Anderson, E.W., Freire, J., Silva, C.T.: Using provenance to support real-time collaborative design of workflows. In: International Provenance and Annotation Workshop (IPAW), pp. 266\u2013279 (2008)","DOI":"10.1007\/978-3-540-89965-5_27"},{"key":"486_CR72","doi-asserted-by":"crossref","unstructured":"Fehrenbach, S., Cheney, J.: Language-integrated provenance. In: Symposium on Principles and Practice of Declarative Programming (PPDP), pp. 214\u2013227 (2016)","DOI":"10.1145\/2967973.2968604"},{"key":"486_CR73","doi-asserted-by":"crossref","unstructured":"Foster, J.N., Green, T.J., Tannen, V.: Annotated XML: queries and provenance. In: ACM Symposium on Principles of Database Systems (PODS), pp. 271\u2013280 (2008)","DOI":"10.1145\/1376916.1376954"},{"issue":"3","key":"486_CR74","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MCSE.2008.79","volume":"10","author":"J Freire","year":"2008","unstructured":"Freire, J., Koop, D., Santos, E., Silva, C.T.: Provenance for computational tasks: a survey. Comput. Sci. Eng. 10(3), 11\u201321 (2008)","journal-title":"Comput. Sci. Eng."},{"key":"486_CR75","doi-asserted-by":"crossref","unstructured":"Freire, J., Silva, C.T., Callahan, S.P., Santos, E., Scheidegger, C.E., Vo, H.T.: Managing rapidly-evolving scientific workflows. In: International Provenance and Annotation Workshop (IPAW), pp. 10\u201318 (2006)","DOI":"10.1007\/11890850_2"},{"issue":"6","key":"486_CR76","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1016\/j.future.2010.05.003","volume":"27","author":"LMR Gadelha","year":"2011","unstructured":"Gadelha, L.M.R., Clifford, B., Mattoso, M., Wilde, M., Foster, I.: Provenance management in Swift. Future Gener. Comput. Syst. 27(6), 775\u2013780 (2011)","journal-title":"Future Gener. Comput. Syst."},{"issue":"7","key":"486_CR77","doi-asserted-by":"crossref","first-page":"738","DOI":"10.14778\/2752939.2752943","volume":"8","author":"Y Gao","year":"2015","unstructured":"Gao, Y., Liu, Q., Chen, G., Zheng, B., Zhou, L.: Answering why-not questions on reverse top-k queries. Proc. VLDB Endow.: PVLDB 8(7), 738\u2013749 (2015)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR78","doi-asserted-by":"crossref","unstructured":"Garijo, D., Corcho, \u00d3., Gil, Y.: Detecting common scientific workflow fragments using templates and execution provenance. In: International Conference on Knowledge Capture (K-CAP), pp. 33\u201340 (2013)","DOI":"10.1145\/2479832.2479848"},{"key":"486_CR79","doi-asserted-by":"crossref","unstructured":"Gehani, A., Tariq, D.: SPADE: support for provenance auditing in distributed environments. In: Proceedings of the International Middleware Conference, pp. 101\u2013120 (2012)","DOI":"10.1007\/978-3-642-35170-9_6"},{"key":"486_CR80","doi-asserted-by":"crossref","unstructured":"Glavic, B., Alonso, G.: The perm provenance management system in action. In: ACM Conference on the Management of Data (SIGMOD), pp. 1055\u20131058 (2009)","DOI":"10.1145\/1559845.1559980"},{"issue":"1","key":"486_CR81","doi-asserted-by":"crossref","first-page":"1314","DOI":"10.14778\/1920841.1921003","volume":"3","author":"B Glavic","year":"2010","unstructured":"Glavic, B., Alonso, G., Miller, R.J., Haas, L.M.: TRAMP: understanding the behavior of schema mappings through provenance. Proc. VLDB Endow.: PVLDB 3(1), 1314\u20131325 (2010)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR82","doi-asserted-by":"crossref","unstructured":"Glavic, B., Esmaili, K.S., Fischer, P.M., Tatbul, N.: Ariadne: managing fine-grained provenance on data streams. In: Conference on Distributed Event-Based Systems (DEBS), pp. 39\u201350 (2013)","DOI":"10.1145\/2488222.2488256"},{"key":"486_CR83","unstructured":"Goble, C.: Position statement: musings on provenance, workflow and (semantic web) annotations for bioinformatics. In: Workshop on Data Derivation and Provenance, pp. 152\u2013159 (2002)"},{"issue":"8","key":"486_CR84","doi-asserted-by":"crossref","first-page":"R86","DOI":"10.1186\/gb-2010-11-8-r86","volume":"11","author":"J Goecks","year":"2010","unstructured":"Goecks, J., Nekrutenko, A., Taylor, J.: Galaxy: a comprehensive approach for supporting accessible, reproducible, and transparent computational research in the life sciences. Genome Biol. 11(8), R86 (2010)","journal-title":"Genome Biol."},{"key":"486_CR85","doi-asserted-by":"crossref","unstructured":"Green, T.J., Karvounarakis, G., Tannen, V.: Provenance semirings. In: ACM Symposium on Principles of Database Systems (PODS), pp. 31\u201340 (2007)","DOI":"10.1145\/1265530.1265535"},{"key":"486_CR86","doi-asserted-by":"crossref","unstructured":"Green, T.J., Karvounarakis, G., Taylor, N.E., Biton, O., Ives, Z.G., Tannen, V.: ORCHESTRA: facilitating collaborative data sharing. In: ACM Conference on the Management of Data (SIGMOD), pp. 1131\u20131133 (2007)","DOI":"10.1145\/1247480.1247631"},{"issue":"1","key":"486_CR87","doi-asserted-by":"crossref","first-page":"39","DOI":"10.2218\/ijdc.v7i1.213","volume":"7","author":"P Groth","year":"2012","unstructured":"Groth, P., Gil, Y., Cheney, J., Miles, S.: Requirements for provenance on the web. Int. J. Digit. Curation 7(1), 39\u201356 (2012)","journal-title":"Int. J. Digit. Curation"},{"key":"486_CR88","doi-asserted-by":"crossref","unstructured":"Groth, P., Miles, S., Fang, W., Wong, S.C., Zauner, K.-P., Moreau, L.: Recording and using provenance in a protein compressibility experiment. In: IEEE Symposium on High Performance Distributed Computing (HPDC), pp. 201\u2013208 (2005)","DOI":"10.1109\/HPDC.2005.1520960"},{"key":"486_CR89","unstructured":"Groth, P., Moreau, L.: PROV-Overview: An Overview of the PROV Family of Documents (2013). Accessed 15 March 2016"},{"key":"486_CR90","doi-asserted-by":"crossref","unstructured":"Grust, T., Rittinger, J.: Observing SQL queries in their natural habitat. ACM Trans. Database Syst.: TODS 38(1), 3-1\u20133-33 (2012)","DOI":"10.1145\/2445583.2445586"},{"key":"486_CR91","unstructured":"Hartig, O., Zhao, J.: Using web data provenance for quality assessment. In: Workshop on the Role of Semantic Web in Provenance Management (SWPM) (2009)"},{"key":"486_CR92","doi-asserted-by":"crossref","unstructured":"He, Z., Lo, E.: Answering why-not questions on top-k queries. In: IEEE International Conference on Data Engineering (ICDE), pp. 750\u2013761 (2012)","DOI":"10.1109\/ICDE.2012.8"},{"issue":"6","key":"486_CR93","doi-asserted-by":"crossref","first-page":"1300","DOI":"10.1109\/TKDE.2012.158","volume":"26","author":"Z He","year":"2014","unstructured":"He, Z., Lo, E.: Answering why-not questions on top-k queries. IEEE Trans. Knowl. Data Eng.: TKDE 26(6), 1300\u20131315 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng.: TKDE"},{"issue":"3","key":"486_CR94","first-page":"10:1","volume":"5","author":"M Herschel","year":"2015","unstructured":"Herschel, M.: A hybrid approach to answering why-not questions on relational query results. ACM J. Data Inf. Qual.: JDIQ 5(3), 10:1\u201310:29 (2015)","journal-title":"ACM J. Data Inf. Qual.: JDIQ"},{"key":"486_CR95","doi-asserted-by":"crossref","unstructured":"Herschel, M., Eichelberger, H.: The Nautilus Analyzer: understanding and debugging data transformations. In: Conference on Information and Knowledge Management (CIKM), pp. 2731\u20132733 (2012)","DOI":"10.1145\/2396761.2398743"},{"key":"486_CR96","unstructured":"Herschel, M., Grust, T.: Transformation lifecycle management with Nautilus. In: Workshop on the Quality of Data (QDB) (2011)"},{"issue":"1","key":"486_CR97","doi-asserted-by":"crossref","first-page":"185","DOI":"10.14778\/1920841.1920869","volume":"3","author":"M Herschel","year":"2010","unstructured":"Herschel, M., Hern\u00e1ndez, M.A.: Explaining missing answers to SPJUA queries. Proc. VLDB Endow.: PVLDB 3(1), 185\u2013196 (2010)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR98","doi-asserted-by":"crossref","unstructured":"Herschel, M., Hlawatsch, M.: Provenance: on and behind the screens. In: ACM Conference on the Management of Data (SIGMOD), pp. 2213\u20132217 (2016)","DOI":"10.1145\/2882903.2912568"},{"key":"486_CR99","doi-asserted-by":"crossref","unstructured":"Hlawatsch, M., Burch, M., Beck, F., Freire, J., Silva, C., Weiskopf, D.: Visualizing the evolution of module workflows. In: International Conference on Information Visualisation (IV), pp. 40\u201349 (2015)","DOI":"10.1109\/iV.2015.19"},{"key":"486_CR100","doi-asserted-by":"crossref","unstructured":"Hoekstra, R., Groth, P.: Prov-o-viz-understanding the role of activities in provenance. In: International Provenance and Annotation Workshop (IPAW), pp. 215\u2013220 (2014)","DOI":"10.1007\/978-3-319-16462-5_18"},{"issue":"1","key":"486_CR101","doi-asserted-by":"crossref","first-page":"736","DOI":"10.14778\/1453856.1453936","volume":"1","author":"J Huang","year":"2008","unstructured":"Huang, J., Chen, T., Doan, A., Naughton, J.F.: On the provenance of non-answers to queries over extracted data. Proc. VLDB Endow.: PVLDB 1(1), 736\u2013747 (2008)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR102","doi-asserted-by":"crossref","unstructured":"Huq, M.R., Apers, P.M.G., Wombacher, A.: Provenancecurious: a tool to infer data provenance from scripts. In: Conference on Extending Database Technology (EDBT), pp. 765\u2013768 (2013)","DOI":"10.1145\/2452376.2452475"},{"key":"486_CR103","doi-asserted-by":"crossref","unstructured":"Hussein, J., Moreau, L., Sassone, V.: Obscuring provenance confidential information via graph transformation. In: Conference on Trust Management (IFIP), pp. 109\u2013125 (2015)","DOI":"10.1007\/978-3-319-18491-3_8"},{"key":"486_CR104","unstructured":"Ikeda, R., Park, H., Widom, J.: Provenance for generalized map and reduce workflows. In: Conference on Innovative Data Systems Research (CIDR), pp. 273\u2013283 (2011)"},{"issue":"4","key":"486_CR105","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1145\/1634.1886","volume":"31","author":"T Imieli\u0144ski","year":"1984","unstructured":"Imieli\u0144ski, T., Lipski Jr., W.: Incomplete information in relational databases. J. ACM 31(4), 761\u2013791 (1984)","journal-title":"J. ACM"},{"issue":"3","key":"486_CR106","doi-asserted-by":"crossref","first-page":"216","DOI":"10.14778\/2850583.2850595","volume":"9","author":"M Interlandi","year":"2015","unstructured":"Interlandi, M., Shah, K., Tetali, S.D., Gulzar, M.A., Yoo, S., Kim, M., Millstein, T., Condie, T.: Titian: data provenance support in Spark. Proc. VLDB Endow.: PVLDB 9(3), 216\u2013227 (2015)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR107","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.jss.2014.07.011","volume":"97","author":"MS Islam","year":"2014","unstructured":"Islam, M.S., Liu, C., Zhou, R.: Flexiq: a flexible interactive querying framework by exploiting the skyline operator. J. Syst. Softw. 97, 97\u2013117 (2014)","journal-title":"J. Syst. Softw."},{"key":"486_CR108","doi-asserted-by":"crossref","unstructured":"Islam, M.S., Zhou, R., Liu, C.: On answering why-not questions in reverse skyline queries. In: IEEE International Conference on Data Engineering (ICDE), pp. 973\u2013984 (2013)","DOI":"10.1109\/ICDE.2013.6544890"},{"key":"486_CR109","doi-asserted-by":"crossref","unstructured":"Karsai, L., Fekete, A., Kay, J., Missier, P.: Clustering provenance facilitating provenance exploration through data abstraction. In: Workshop on Human-In-the-Loop Data Analytics (HILDA), pp. 6:1\u20136:5 (2016)","DOI":"10.1145\/2939502.2939508"},{"issue":"3","key":"486_CR110","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/2380776.2380778","volume":"41","author":"G Karvounarakis","year":"2012","unstructured":"Karvounarakis, G., Green, T.J.: Semiring-annotated data: queries and provenance? SIGMOD Rec. 41(3), 5\u201314 (2012)","journal-title":"SIGMOD Rec."},{"issue":"3","key":"486_CR111","doi-asserted-by":"crossref","first-page":"19:1","DOI":"10.1145\/2508020.2500127","volume":"38","author":"G Karvounarakis","year":"2013","unstructured":"Karvounarakis, G., Green, T.J., Ives, Z.G., Tannen, V.: Collaborative data sharing via update exchange and provenance. ACM Trans. Database Syst.: TODS 38(3), 19:1\u201319:42 (2013)","journal-title":"ACM Trans. Database Syst.: TODS"},{"key":"486_CR112","doi-asserted-by":"crossref","unstructured":"Karvounarakis, G., Ives, Z.G., Tannen, V.: Querying data provenance. In: ACM Conference on the Management of Data (SIGMOD), pp. 951\u2013962 (2010)","DOI":"10.1145\/1807167.1807269"},{"key":"486_CR113","doi-asserted-by":"crossref","unstructured":"Ko, R.K.L., Will, M.A.: Progger: an efficient, tamper-evident kernel-space logger for cloud data provenance tracking. In: IEEE Conference on Cloud Computing (CLOUD), pp. 881\u2013889 (2014)","DOI":"10.1109\/CLOUD.2014.121"},{"key":"486_CR114","doi-asserted-by":"crossref","unstructured":"K\u00f6hler, S., Lud\u00e4scher, B., Zinn, D.: First-order provenance games. In: In Search of Elegance in the Theory and Practice of Computation, pp. 382\u2013399 (2013)","DOI":"10.1007\/978-3-642-41660-6_20"},{"key":"486_CR115","doi-asserted-by":"crossref","unstructured":"K\u00f6hler, S., Riddle, S., Zinn, D., McPhillips, T.M., Lud\u00e4scher, B.: Improving workflow fault tolerance through provenance-based recovery. In: Conference on Scientific and Statistical Database Management (SSDBM), pp. 207\u2013224 (2011)","DOI":"10.1007\/978-3-642-22351-8_12"},{"key":"486_CR116","unstructured":"Korolev, V., Joshi, A.: PROB: a tool for tracking provenance and reproducibility of big data experiments. In: Reproduce, HPCA, pp. 264\u2013286 (2014)"},{"key":"486_CR117","doi-asserted-by":"crossref","unstructured":"Krishnan, S., Wang, J., Franklin, M.J., Goldberg, K., Kraska, T.: Privateclean: data cleaning and differential privacy. In: ACM Conference on the Management of Data (SIGMOD), pp. 937\u2013951 (2016)","DOI":"10.1145\/2882903.2915248"},{"key":"486_CR118","unstructured":"Kulkarni, D.: A provenance model for key-value systems. In: Workshop on Theory and Practice of Provenance (TAPP), pp. 12:1\u201312:4 (2013)"},{"key":"486_CR119","doi-asserted-by":"crossref","unstructured":"Kwasnikowska, N., Van den Bussche, J.: Mapping the NRC dataflow model to the open provenance model. In: Workshop on Theory and Practice of Provenance (TAPP), pp. 3\u201316 (2008)","DOI":"10.1007\/978-3-540-89965-5_3"},{"key":"486_CR120","unstructured":"Lerner, B., Boose, E.R.: RDataTracker: collecting provenance in an interactive scripting environment. In: Workshop on Theory and Practice of Provenance (TAPP), pp. 1\u20134 (2014)"},{"key":"486_CR121","doi-asserted-by":"crossref","unstructured":"Lipford, H.R., Stukes, F., Dou, W., Hawkins, M.E., Chang, R.: Helping users recall their reasoning process. In: IEEE Conference on Visual Analytics Science and Technology (VAST), pp. 187\u2013194 (2010)","DOI":"10.1109\/VAST.2010.5653598"},{"key":"486_CR122","doi-asserted-by":"crossref","unstructured":"Logothetis, D., De, S., Yocum, K.: Scalable lineage capture for debugging DISC analytics. In: Symposium on Cloud Computing (SOCC), pp. 1\u201315 (2013)","DOI":"10.1145\/2523616.2523619"},{"key":"486_CR123","unstructured":"Macko, P., Chiarini, M.: Collecting provenance via the xen hypervisor. In: Workshop on Theory and Practice of Provenance (TAPP) (2011)"},{"key":"486_CR124","unstructured":"Macko, P., Seltzer, M.: Provenance map orbiter: interactive exploration of large provenance graphs. In: Workshop on Theory and Practice of Provenance (TAPP) (2011)"},{"key":"486_CR125","doi-asserted-by":"crossref","unstructured":"Martens, A., Slominski, A., Lakshmanan, G.T., Mukhi, N.: Advanced case management enabled by business provenance. In: International Conference on Web Services (ICWS), pp. 639\u2013641 (2012)","DOI":"10.1109\/ICWS.2012.68"},{"issue":"5","key":"486_CR126","doi-asserted-by":"crossref","first-page":"541","DOI":"10.1016\/j.future.2008.06.013","volume":"25","author":"T McPhillips","year":"2009","unstructured":"McPhillips, T., Bowers, S., Zinn, D., Lud\u00e4scher, B.: Scientific workflow design for mere mortals. Future Gener. Comput. Syst. 25(5), 541\u2013551 (2009)","journal-title":"Future Gener. Comput. Syst."},{"issue":"1","key":"486_CR127","doi-asserted-by":"crossref","first-page":"298","DOI":"10.2218\/ijdc.v10i1.370","volume":"10","author":"TM McPhillips","year":"2015","unstructured":"McPhillips, T.M., Song, T., Kolisnik, T., Aulenbach, S., Belhajjame, K., Bocinsky, K., Cao, Y., Chirigati, F., Dey, S.C., Freire, J., Huntzinger, D.N., Jones, C., Koop, D., Missier, P., Schildhauer, M., Schwalm, C.R., Wei, Y., Cheney, J., Bieda, M., Lud\u00e4scher, B.: YesWorkflow: a user-oriented, language-independent tool for recovering workflow information from scripts. Int. J. Digit. Curation 10(1), 298\u2013313 (2015)","journal-title":"Int. J. Digit. Curation"},{"issue":"1","key":"486_CR128","doi-asserted-by":"crossref","first-page":"34","DOI":"10.14778\/1880172.1880176","volume":"4","author":"A Meliou","year":"2010","unstructured":"Meliou, A., Gatterbauer, W., Moore, K.F., Suciu, D.: The complexity of causality and responsibility for query answers and non-answers. Proc. VLDB Endow.: PVLDB 4(1), 34\u201345 (2010)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR129","doi-asserted-by":"crossref","unstructured":"Michlmayr, A., Rosenberg, F., Leitner, P., Dustdar, S.: Service provenance in QoS-aware web service runtimes. In: International Conference on Web Services (ICWS), pp. 115\u2013122 (2009)","DOI":"10.1109\/ICWS.2009.32"},{"key":"486_CR130","doi-asserted-by":"crossref","unstructured":"Missier, P., Belhajjame, K., Cheney, J.: The W3C PROV family of specifications for modelling provenance metadata. In: Conference on Extending Database Technology (EDBT), pp. 773\u2013776 (2013)","DOI":"10.1145\/2452376.2452478"},{"key":"486_CR131","doi-asserted-by":"crossref","unstructured":"Missier, P., Belhajjame, K., Zhao, J., Roos, M., Goble, C.A.: Data lineage model for Taverna workflows with lightweight annotation requirements. In: International Provenance and Annotation Workshop (IPAW), pp. 17\u201330 (2008)","DOI":"10.1007\/978-3-540-89965-5_4"},{"key":"486_CR132","doi-asserted-by":"crossref","unstructured":"Missier, P., Bryans, J., Gamble, C., Curcin, V., Danger, R.: ProvAbs: model, policy, and tooling for abstracting PROV graphs. In: International Provenance and Annotation Workshop (IPAW), pp. 3\u201315 (2014)","DOI":"10.1007\/978-3-319-16462-5_1"},{"key":"486_CR133","unstructured":"Missier, P., Dey, S., Belhajjame, K., Cuevas-Vicentt\u00edn, V., Lud\u00e4scher, B.: D-prov: extending the prov provenance model with workflow structure. In: Workshop on Theory and Practice of Provenance (TAPP), pp. 9:1\u20139:7 (2013)"},{"issue":"6","key":"486_CR134","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1016\/j.future.2010.10.012","volume":"27","author":"P Missier","year":"2011","unstructured":"Missier, P., Goble, C.: Workflows to open provenance graphs, round-trip. Future Gener. Comput. Syst. 27(6), 812\u2013819 (2011)","journal-title":"Future Gener. Comput. Syst."},{"key":"486_CR135","doi-asserted-by":"crossref","unstructured":"Missier, P., Paton, N.W., Belhajjame, K.: Fine-grained and efficient lineage querying of collection-based workflow provenance. In: Conference on Extending Database Technology (EDBT), pp. 299\u2013310 (2010)","DOI":"10.1145\/1739041.1739079"},{"issue":"2\u20133","key":"486_CR136","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1561\/1800000010","volume":"2","author":"L Moreau","year":"2010","unstructured":"Moreau, L.: The foundations for provenance on the web. Found. Trends Web Sci. 2(2\u20133), 99\u2013241 (2010)","journal-title":"Found. Trends Web Sci."},{"issue":"2","key":"486_CR137","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1016\/j.websem.2011.03.001","volume":"9","author":"L Moreau","year":"2011","unstructured":"Moreau, L.: Provenance-based reproducibility in the semantic web. J. Web Semant. 9(2), 202\u2013221 (2011)","journal-title":"J. Web Semant."},{"issue":"6","key":"486_CR138","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1016\/j.future.2010.07.005","volume":"27","author":"L Moreau","year":"2011","unstructured":"Moreau, L., Freire, J., Futrelle, J., McGrath, R., Myers, J., Paulson, P.: The open provenance model. Future Gener. Comput. Syst. 27(6), 743\u2013756 (2011)","journal-title":"Future Gener. Comput. Syst."},{"issue":"12","key":"486_CR139","doi-asserted-by":"crossref","first-page":"1872","DOI":"10.14778\/2824032.2824089","volume":"8","author":"T M\u00fcller","year":"2015","unstructured":"M\u00fcller, T., Grust, T.: Provenance for SQL through abstract interpretation: value-less, but worthwhile. Proc. VLDB Endow.: PVLDB 8(12), 1872\u20131875 (2015)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR140","unstructured":"Muniswamy-Reddy, K., Macko, P., Seltzer, M.I.: Provenance for the cloud. In: USENIX Conference on File and Storage Technologies (FAST), pp. 197\u2013210 (2010)"},{"key":"486_CR141","unstructured":"Muniswamy-Reddy, K.-K., Braun, U., Holland, D.A., Macko, P., Maclean, D., Margo, D., Seltzer, M., Smogor, R.: Layering in provenance systems. In: USENIX Annual Technical Conference (2009)"},{"key":"486_CR142","unstructured":"Muniswamy-Reddy, K.-K., Holland, D.A., Braun, U., Seltzer, M.: Provenance-aware storage systems. In: USENIX Annual Technical Conference, pp. 43\u201356 (2006)"},{"key":"486_CR143","doi-asserted-by":"crossref","unstructured":"Murta, L., Braganholo, V., Chirigati, F., Koop, D., Freire, J.: noWorkflow: capturing and analyzing provenance of scripts. In: International Provenance and Annotation Workshop (IPAW), pp. 71\u201383 (2014)","DOI":"10.1007\/978-3-319-16462-5_6"},{"key":"486_CR144","doi-asserted-by":"crossref","unstructured":"Myers, A.C.: JFlow: practical mostly-static information flow control. In: Proceedings of the Symposium on Principles of Programming Languages (POPL), number January, pp. 228\u2013241 (1999)","DOI":"10.1145\/292540.292561"},{"key":"486_CR145","doi-asserted-by":"crossref","unstructured":"Nagappan, M., Vouk, M.A.: A Model for sharing of confidential provenance information in a query based system. In: International Provenance and Annotation Workshop (IPAW), pp. 62\u201369 (2008)","DOI":"10.1007\/978-3-540-89965-5_8"},{"key":"486_CR146","first-page":"1","volume":"88","author":"S New","year":"2010","unstructured":"New, S.: The transparent supply chain. Harvard Bus. Rev. 88, 1\u20135 (2010)","journal-title":"Harvard Bus. Rev."},{"key":"486_CR147","doi-asserted-by":"crossref","unstructured":"Ni, Q., Xu, S., Bertino, E., Sandhu, R., Han, W.: An access control language for a general provenance model. In: Workshop on Secure Data Management (SDM), pp. 68\u201388 (2009)","DOI":"10.1007\/978-3-642-04219-5_5"},{"key":"486_CR148","unstructured":"Nies, T.D., Coppens, S., Verborgh, R., Sande, M.V., Mannens, E., Walle, R.V.D., Nies, D., Sande, V., Walle, V.D., Access, L.E., Towards, S.: Easy access to provenance: an essential step towards trust on the web. In: Computer Software and Applications Conference Workshops (COMPSACW) (2013)"},{"key":"486_CR149","unstructured":"Niu, X., Kapoor, R., Glavic, B., Gawlick, D., Liu, Z.H., Krishnaswamy, V., Radhakrishnan, V.: Interoperability for provenance-aware databases using PROV and JSON. In: Workshop on Theory and Practice of Provenance (TAPP) (2015)"},{"issue":"17","key":"486_CR150","doi-asserted-by":"crossref","first-page":"3045","DOI":"10.1093\/bioinformatics\/bth361","volume":"20","author":"TM Oinn","year":"2004","unstructured":"Oinn, T.M., Addis, M., Ferris, J., Marvin, D., Senger, M., Greenwood, R.M., Carver, T., Glover, K., Pocock, M.R., Wipat, A., Li, P.: Taverna: a tool for the composition and enactment of bioinformatics workflows. Bioinformatics 20(17), 3045\u20133054 (2004)","journal-title":"Bioinformatics"},{"issue":"10","key":"486_CR151","doi-asserted-by":"crossref","first-page":"1067","DOI":"10.1002\/cpe.993","volume":"18","author":"TM Oinn","year":"2006","unstructured":"Oinn, T.M., Greenwood, R.M., Addis, M., Alpdemir, M.N., Ferris, J., Glover, K., Goble, C.A., Goderis, A., Hull, D., Marvin, D., Li, P., Lord, P.W., Pocock, M.R., Senger, M., Stevens, R., Wipat, A., Wroe, C.: Taverna: lessons in creating a workflow environment for the life sciences. Concurr. Comput. Pract. Exp. 18(10), 1067\u20131100 (2006)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"486_CR152","doi-asserted-by":"crossref","unstructured":"Oliveira, W., Missier, P., Oca\u00f1a, K., de\u00a0Oliveira, D., Braganholo, V.: Analyzing provenance across heterogeneous provenance graphs. In: International Provenance and Annotation Workshop (IPAW), pp. 57\u201370 (2016)","DOI":"10.1007\/978-3-319-40593-3_5"},{"issue":"12","key":"486_CR153","doi-asserted-by":"crossref","first-page":"1237","DOI":"10.14778\/3402755.3402758","volume":"4","author":"C Olston","year":"2011","unstructured":"Olston, C., Reed, B.: Inspector gadget: a framework for custom monitoring and debugging of distributed dataflows. Proc. VLDB Endow.: PVLDB 4(12), 1237\u20131248 (2011)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR154","doi-asserted-by":"crossref","unstructured":"Olston, C., Reed, B., Srivastava, U., Kumar, R., Tomkins, A.: Pig latin: a not-so-foreign language for data processing. In: ACM Conference on the Management of Data (SIGMOD), pp. 1099\u20131110 (2008)","DOI":"10.1145\/1376616.1376726"},{"key":"486_CR155","doi-asserted-by":"crossref","unstructured":"Papadias, D., Tao, Y., Fu, G., Seeger, B.: An optimal and progressive algorithm for skyline queries. In: ACM Conference on the Management of Data (SIGMOD), pp. 467\u2013478 (2003)","DOI":"10.1145\/872757.872814"},{"key":"486_CR156","doi-asserted-by":"crossref","unstructured":"Park, J., Nguyen, D., Sandhu, R.: A provenance-based access control model. In: Conference on Privacy, Security and Trust (PST), pp. 137\u2013144 (2012)","DOI":"10.1109\/PST.2012.6297930"},{"key":"486_CR157","unstructured":"Pham, Q., Malik, T., Foster, I.: Using provenance for repeatability. In: Workshop on Theory and Practice of Provenance (TAPP) (2013)"},{"key":"486_CR158","doi-asserted-by":"crossref","unstructured":"Pimentel, J.A.F., Freire, J., Murta, L., Braganholo, V.: Fine-grained provenance collection over scripts through program slicing. In: International Provenance and Annotation Workshop (IPAW), pp. 199\u2013203 (2016)","DOI":"10.1007\/978-3-319-40593-3_21"},{"key":"486_CR159","doi-asserted-by":"crossref","unstructured":"Pimentel, J.F., Dey, S., McPhillips, T., Belhajjame, K., Koop, D., Murta, L., Braganholo, V., Lud\u00e4scher, B.: Yin & Yang: demonstrating complementary provenance from noWorkflow & YesWorkflow. In: International Provenance and Annotation Workshop (IPAW), pp. 161\u2013165 (2016)","DOI":"10.1007\/978-3-319-40593-3_13"},{"key":"486_CR160","doi-asserted-by":"crossref","unstructured":"Pimentel, J.F., Freire, J., Braganholo, V., Murta, L.: Tracking and analyzing the evolution of provenance from scripts. In: International Provenance and Annotation Workshop (IPAW), pp. 16\u201328 (2016)","DOI":"10.1007\/978-3-319-40593-3_2"},{"key":"486_CR161","doi-asserted-by":"crossref","unstructured":"Prabhune, A., Zweig, A., Stotzka, R., Gertz, M., Hesser, J.: Prov2ONE: an algorithm for automatically constructing ProvONE provenance graphs. In: International Provenance and Annotation Workshop (IPAW), pp. 204\u2013208 (2016)","DOI":"10.1007\/978-3-319-40593-3_22"},{"key":"486_CR162","doi-asserted-by":"crossref","unstructured":"Ragan, E.D., Endert, A., Sanyal, J., Chen, J.: Characterizing provenance in visualization and data analysis: an organizational framework of provenance types and purposes. In: IEEE Transactions on Visualization and Computer Graphics, pp. 31\u201340 (2015)","DOI":"10.1109\/TVCG.2015.2467551"},{"key":"486_CR163","doi-asserted-by":"crossref","unstructured":"Riddle, S., K\u00f6hler, S., Lud\u00e4scher, B.: Towards constraint provenance games. In: Workshop on Theory and Practice of Provenance (TAPP) (2014)","DOI":"10.1007\/978-3-642-41660-6_20"},{"key":"486_CR164","doi-asserted-by":"crossref","unstructured":"Roy, S., Chiticariu, L., Feldman, V., Reiss, F., Zhu, H.: Provenance-based dictionary refinement in information extraction. In: ACM Conference on the Management of Data (SIGMOD), pp. 457\u2013468 (2013)","DOI":"10.1145\/2463676.2465284"},{"issue":"1","key":"486_CR165","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1109\/JSAC.2002.806121","volume":"21","author":"A Sabelfeld","year":"2006","unstructured":"Sabelfeld, A., Myers, A.C.: Language-based information-flow security. IIEEE J. Sel. Areas Commun. 21(1), 5\u201319 (2006)","journal-title":"IIEEE J. Sel. Areas Commun."},{"issue":"3","key":"486_CR166","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1084805.1084812","volume":"34","author":"Y Simmhan","year":"2005","unstructured":"Simmhan, Y., Plale, B., Gannon, D.: A survey of data provenance in e-science. SIGMOD Rec. 34(3), 31\u201336 (2005)","journal-title":"SIGMOD Rec."},{"issue":"10","key":"486_CR167","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jwsr.2008040101","volume":"5","author":"YL Simmhan","year":"2008","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D.: Karma2: provenance management for data driven workflows. Int. J. Web Serv. Res. 5(10), 1\u201323 (2008)","journal-title":"Int. J. Web Serv. Res."},{"key":"486_CR168","unstructured":"Souilah, I., Francalanza, A., Sassone, V.: A formal model of provenance in distributed systems. In: Workshop on Theory and Practice of Provenance (TAPP) (2009)"},{"key":"486_CR169","doi-asserted-by":"crossref","unstructured":"Stitz, H., Luger, S., Streit, M., Gehlenborg, N.: AVOCADO: visualization of workflow-derived data provenance for reproducible biomedical research. In: European Conference on Visualization (EuroVis), pp. 481\u2013490 (2016)","DOI":"10.1111\/cgf.12924"},{"key":"486_CR170","doi-asserted-by":"crossref","unstructured":"Suen, C.H., Ko, R.K.L., Tan, Y.S., Jagadpramana, P., Lee, B.: S2logger: end-to-end data tracking mechanism for cloud data provenance. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 594\u2013602 (2013)","DOI":"10.1109\/TrustCom.2013.73"},{"key":"486_CR171","unstructured":"Szablocs, R., Aleksander, S., Yurdaer, D.: Large-Scale Distributed Storage Systems for Business Provenance. IBM Research Report, RC25154 (2011)"},{"issue":"9","key":"486_CR172","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1002\/cpe.1547","volume":"22","author":"W Tan","year":"2010","unstructured":"Tan, W., Missier, P., Foster, I., Madduri, R., De Roure, D., Goble, C.: A comparison of using Taverna and BPEL in building scientific workflows: the case of caGrid. Concurr. Comput. Pract. Exp. 22(9), 1098\u20131117 (2010)","journal-title":"Concurr. Comput. Pract. Exp."},{"issue":"4","key":"486_CR173","first-page":"3","volume":"30","author":"WC Tan","year":"2007","unstructured":"Tan, W.C.: Provenance in databases: past, current, and future. IEEE Data Eng. Bull. 30(4), 3\u201312 (2007)","journal-title":"IEEE Data Eng. Bull."},{"key":"486_CR174","doi-asserted-by":"crossref","unstructured":"Tan, Y.S., Ko, R.K.L., Holmes, G.: Security and data accountability in distributed systems: a provenance survey. In: IEEE Conference on High Performance Computing and Communications (HPCC) (2013)","DOI":"10.1109\/HPCC.and.EUC.2013.221"},{"key":"486_CR175","unstructured":"Tariq, D., Ali, M., Gehani, A.: Towards automated collection of application-level data provenance. In: Workshop on Theory and Practice of Provenance (TAPP) (2012)"},{"key":"486_CR176","doi-asserted-by":"crossref","unstructured":"ten Cate, B., Civili, C., Sherkhonov, E., Tan, W.-C.: High-level why-not explanations using ontologies. In: ACM Symposium on Principles of Database Systems (PODS), pp. 31\u201343 (2015)","DOI":"10.1145\/2745754.2745765"},{"issue":"1","key":"486_CR177","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MIC.2010.127","volume":"15","author":"Theoharis Y, Fundulaki I, Karvounarakis G, Christophides V","year":"2011","unstructured":"Theoharis Y, Fundulaki I, Karvounarakis G, Christophides V: On provenance of queries on semantic web data. IEEE Internet Comput. 15(1), 31\u201339 (2011)","journal-title":"IEEE Internet Comput."},{"issue":"2","key":"486_CR178","doi-asserted-by":"crossref","first-page":"1626","DOI":"10.14778\/1687553.1687609","volume":"2","author":"A Thusoo","year":"2009","unstructured":"Thusoo, A., Sarma, J.S., Jain, N., Shao, Z., Chakka, P., Anthony, S., Liu, H., Wyckoff, P., Murthy, R.: Hive: a warehousing solution over a map-reduce framework. Proc. VLDB Endow.: PVLDB 2(2), 1626\u20131629 (2009)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR179","doi-asserted-by":"crossref","unstructured":"Tran, Q.T., Chan, C.-Y.: How to ConQueR why-not questions. In: ACM Conference on the Management of Data (SIGMOD), pp. 15\u201326 (2010)","DOI":"10.1145\/1807167.1807172"},{"issue":"5","key":"486_CR180","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1007\/s00778-013-0349-3","volume":"23","author":"QT Tran","year":"2014","unstructured":"Tran, Q.T., Chan, C.-Y., Parthasarathy, S.: Query reverse engineering. VLDB J. 23(5), 721\u2013746 (2014)","journal-title":"VLDB J."},{"key":"486_CR181","doi-asserted-by":"crossref","unstructured":"Tylissanakis, G., Cotroni, Y.: Data provenance and reproducibility in grid based scientific workflows. In: IEEE Workshop on Grid and Pervasive Computing Conference, pp. 42\u201349 (2009)","DOI":"10.1109\/GPC.2009.16"},{"issue":"4","key":"486_CR182","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1080\/07421222.1996.11518099","volume":"12","author":"RY Wang","year":"1996","unstructured":"Wang, R.Y., Strong, D.M.: Beyond accuracy: what data quality means to data consumers. J. Manag. Inf. Syst. 12(4), 5\u201333 (1996)","journal-title":"J. Manag. Inf. Syst."},{"key":"486_CR183","unstructured":"Wang, Y.R., Madnick, S.E. et\u00a0al.: A polygen model for heterogeneous database systems: the source tagging perspective. In: Conference on Very Large Data Bases (VLDB), pp. 519\u2013538 (1990)"},{"key":"486_CR184","volume-title":"Hadoop: The Definitive Guide","author":"T White","year":"2015","unstructured":"White, T.: Hadoop: The Definitive Guide, 4th edn. O\u2019Reilly Media, Sebastopol (2015)","edition":"4"},{"key":"486_CR185","doi-asserted-by":"crossref","unstructured":"Woodruff, A., Stonebraker, M.: Supporting fine-grained data lineage in a database visualization environment. In: IEEE International Conference on Data Engineering (ICDE), pp. 91\u2013102 (1997)","DOI":"10.1109\/ICDE.1997.581742"},{"key":"486_CR186","doi-asserted-by":"crossref","unstructured":"Wylot, M., Cudr\u00e9-Mauroux, P., Groth, P.T.: Tripleprov: efficient processing of lineage queries in a native RDF store. In: World Wide Web Conference (WWW), pp. 455\u2013466 (2014)","DOI":"10.1145\/2566486.2568014"},{"key":"486_CR187","unstructured":"Zaharia, M., Chowdhury, M., Franklin, M.J., Shenker, S., Stoica, I.: Spark: cluster computing with working sets. In: USENIX Conference on Hot Topics in Cloud Computing (HotCloud) (2010)"},{"key":"486_CR188","doi-asserted-by":"crossref","unstructured":"Zhang, J., Jagadish, H.V.: Lost source provenance. In: Conference on Extending Database Technology (EDBT), pp. 311\u2013322 (2010)","DOI":"10.1145\/1739041.1739080"},{"key":"486_CR189","doi-asserted-by":"crossref","unstructured":"Zhang, J., Jagadish, H.V.: Revision provenance in text documents of asynchronous collaboration. In: IEEE International Conference on Data Engineering (ICDE), pp. 889\u2013900 (2013)","DOI":"10.1109\/ICDE.2013.6544883"},{"key":"486_CR190","doi-asserted-by":"crossref","unstructured":"Zhou, W., Fei, Q., Narayan, A., Haeberlen, A., Loo, B.T., Sherr, M.: Secure network provenance. In: ACM Symposium on Operating Systems Principles (SOPS), pp. 295\u2013310 (2011)","DOI":"10.1145\/2043556.2043584"},{"issue":"2","key":"486_CR191","doi-asserted-by":"crossref","first-page":"49","DOI":"10.14778\/2535568.2448939","volume":"6","author":"W Zhou","year":"2012","unstructured":"Zhou, W., Mapara, S., Ren, Y., Li, Y., Haeberlen, A., Ives, Z., Loo, B.T., Sherr, M.: Distributed time-aware provenance. Proc. VLDB Endow.: PVLDB 6(2), 49\u201360 (2012)","journal-title":"Proc. VLDB Endow.: PVLDB"},{"key":"486_CR192","doi-asserted-by":"crossref","unstructured":"Zhou, W., Sherr, M., Tao, T., Li, X., Loo, B.T., Mao, Y.: Efficient querying and maintenance of network provenance at internet-scale. In: ACM Conference on the Management of Data (SIGMOD), pp. 615\u2013626 (2010)","DOI":"10.1145\/1807167.1807234"}],"container-title":["The VLDB Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00778-017-0486-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-017-0486-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00778-017-0486-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T14:18:36Z","timestamp":1750947516000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00778-017-0486-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,16]]},"references-count":192,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["486"],"URL":"https:\/\/doi.org\/10.1007\/s00778-017-0486-1","relation":{},"ISSN":["1066-8888","0949-877X"],"issn-type":[{"value":"1066-8888","type":"print"},{"value":"0949-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,16]]}}}