{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:49:34Z","timestamp":1750308574916,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,20]]},"DOI":"10.1145\/3175684.3175686","type":"proceedings-article","created":{"date-parts":[[2018,4,9]],"date-time":"2018-04-09T12:47:13Z","timestamp":1523278033000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A Minimal Attribute Set-oriented Data Provenance Method"],"prefix":"10.1145","author":[{"given":"Dai","family":"Chaofan","sequence":"first","affiliation":[{"name":"Key Laboratory of Information System Engineering, Department of information system and management, National University of Defense Technology, Changsha, China"}]},{"given":"Zhang","family":"Ran","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information System Engineering, Department of information system and management, National University of Defense Technology, Changsha, China"}]},{"given":"Li","family":"Pei","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information System Engineering, Department of information system and management, National University of Defense Technology, Changsha, China"}]},{"given":"Wang","family":"Wenqian","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information System Engineering, Department of information system and management, National University of Defense Technology, Changsha, China"}]},{"given":"Cao","family":"Zewen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information System Engineering, Department of information system and management, National University of Defense Technology, Changsha, China"}]}],"member":"320","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"issue":"3","key":"e_1_3_2_1_1_1","first-page":"13","article-title":"PROV model and its Web application{J}","volume":"58","author":"Ni Jing","year":"2014","unstructured":"Ni Jing , Meng Xianxue . PROV model and its Web application{J} . Library and Information Service , 2014 , 58 ( 3 ): 13 -- 19 . Ni Jing, Meng Xianxue. PROV model and its Web application{J}. Library and Information Service, 2014, 58(3):13--19.","journal-title":"Library and Information Service"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807269"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739078"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.04.007"},{"volume-title":"Conference on Hot Topics in Security. USENIX Association","author":"Braun U","key":"e_1_3_2_1_5_1","unstructured":"Braun U , Shinnar A , Seltzer M. Securing provenance{C}\/\/ Conference on Hot Topics in Security. USENIX Association , 2008: 752. Braun U, Shinnar A, Seltzer M. Securing provenance{C}\/\/ Conference on Hot Topics in Security. USENIX Association, 2008:752."},{"key":"e_1_3_2_1_6_1","volume-title":"Research in the Field of Securing Provenance based on OPM {D}","author":"Liu Tong","year":"2013","unstructured":"Liu Tong . Research in the Field of Securing Provenance based on OPM {D} . Shandong University of Technology , 2013 . Liu Tong. Research in the Field of Securing Provenance based on OPM {D}. Shandong University of Technology, 2013."},{"issue":"10","key":"e_1_3_2_1_7_1","first-page":"3117","article-title":"Security Provenance Model based on OPM {J}","volume":"30","author":"Liu Tong","year":"2013","unstructured":"Liu Tong , Wang Fengying . Security Provenance Model based on OPM {J} . Application Research of Comoputer , 2013 , 30 ( 10 ): 3117 -- 3120 . Liu Tong, Wang Fengying. Security Provenance Model based on OPM {J}. Application Research of Comoputer, 2013, 30(10):3117--3120.","journal-title":"Application Research of Comoputer"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.07.005"},{"key":"e_1_3_2_1_9_1","unstructured":"Initiative D C M. Dublin core metadata element set version 1.1{J}. 2013  Initiative D C M. Dublin core metadata element set version 1.1{J}. 2013"},{"key":"e_1_3_2_1_10_1","volume-title":"Provenir ontology: Towards a framework for escience provenance management{J}","author":"Sahoo S S","year":"2009","unstructured":"Sahoo S S , Sheth A P . Provenir ontology: Towards a framework for escience provenance management{J} . 2009 . Sahoo S S, Sheth A P. Provenir ontology: Towards a framework for escience provenance management{J}. 2009."},{"key":"e_1_3_2_1_11_1","volume-title":"PROV-N: The Provenance Notation{J}","author":"Moreau L","year":"2013","unstructured":"Moreau L , Missier P , Cheney J , PROV-N: The Provenance Notation{J} . 2013 . Moreau L, Missier P, Cheney J, et al. PROV-N: The Provenance Notation{J}. 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2009.09.002"},{"issue":"9","key":"e_1_3_2_1_13_1","first-page":"3215","article-title":"Survey of Provenance Technique {J}.","volume":"27","author":"Dai Chaofan","year":"2010","unstructured":"Dai Chaofan , Wang Tao, Zhang Pengcheng . Survey of Provenance Technique {J}. Application Research of Comoputer , 2010 , 27 ( 9 ): 3215 -- 3221 . Dai Chaofan, Wang Tao, Zhang Pengcheng. Survey of Provenance Technique {J}.Application Research of Comoputer, 2010, 27(9):3215--3221.","journal-title":"Application Research of Comoputer"},{"key":"e_1_3_2_1_14_1","unstructured":"Wang Zhong Yin Jianli.Traceability Mechanism Design against Personal Data Privacy Disclosure under the Context of Big Data{J}. China's circulation economy newsroom.  Wang Zhong Yin Jianli.Traceability Mechanism Design against Personal Data Privacy Disclosure under the Context of Big Data{J}. China's circulation economy newsroom."},{"issue":"23","key":"e_1_3_2_1_15_1","first-page":"3","article-title":"Problems and Current Approaches{J}","volume":"23","author":"Rahm E","year":"2000","unstructured":"Rahm E , Hong H D . Data Cleaning : Problems and Current Approaches{J} . IEEE Data Engineering Bulletin , 2000 , 23 ( 23 ): 3 -- 13 . Rahm E, Hong H D. Data Cleaning: Problems and Current Approaches{J}. IEEE Data Engineering Bulletin, 2000, 23(23):3--13.","journal-title":"IEEE Data Engineering Bulletin"},{"key":"e_1_3_2_1_16_1","volume-title":"Research on Developing ETL System Basing on Common Warehouse Metamodel {D}","author":"Chen Genshang","year":"2005","unstructured":"Chen Genshang . Research on Developing ETL System Basing on Common Warehouse Metamodel {D} . Nanjing University of Aeronautics and Astronautics , 2005 . Chen Genshang. Research on Developing ETL System Basing on Common Warehouse Metamodel {D}. Nanjing University of Aeronautics and Astronautics, 2005."},{"key":"e_1_3_2_1_17_1","volume-title":"Research on Data Provenance An Overview{J}. Science and technology square","author":"Liu Xiping","year":"2005","unstructured":"Liu Xiping , Wan Changxuan. Research on Data Provenance An Overview{J}. Science and technology square , 2005 (1):47--52. Liu Xiping, Wan Changxuan. Research on Data Provenance An Overview{J}. Science and technology square, 2005(1):47--52."},{"issue":"9","key":"e_1_3_2_1_18_1","first-page":"1917","article-title":"Survey of Data Provenance{J}","volume":"33","author":"Min Hua","year":"2012","unstructured":"Min Hua , Zhang Yong, Fu Xiaohui . Survey of Data Provenance{J} . Journal of Chinese Computer Systems , 2012 , 33 ( 9 ): 1917 -- 1923 . Min Hua, Zhang Yong, Fu Xiaohui. Survey of Data Provenance{J}. Journal of Chinese Computer Systems, 2012, 33(9):1917--1923.","journal-title":"Journal of Chinese Computer Systems"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2011.01863"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.631-632.1061"},{"key":"e_1_3_2_1_21_1","volume-title":"Theories and Approach of Data Lineage Tracing in Data Warehouse Environment {D}","author":"Dai Chaofan","year":"2002","unstructured":"Dai Chaofan , Theories and Approach of Data Lineage Tracing in Data Warehouse Environment {D} . Chang Sha : NUDT , 2002 . Dai Chaofan, Theories and Approach of Data Lineage Tracing in Data Warehouse Environment {D}. Chang Sha: NUDT, 2002."}],"event":{"name":"BDIOT2017: International Conference on Big Data and Internet of Thing","acronym":"BDIOT2017","location":"London United Kingdom"},"container-title":["Proceedings of the International Conference on Big Data and Internet of Thing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175686","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3175684.3175686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:49Z","timestamp":1750273489000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3175684.3175686"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"references-count":21,"alternative-id":["10.1145\/3175684.3175686","10.1145\/3175684"],"URL":"https:\/\/doi.org\/10.1145\/3175684.3175686","relation":{},"subject":[],"published":{"date-parts":[[2017,12,20]]},"assertion":[{"value":"2017-12-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}