{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:27:06Z","timestamp":1767706026354,"version":"3.41.0"},"reference-count":13,"publisher":"Association for Computing Machinery (ACM)","issue":"12","license":[{"start":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T00:00:00Z","timestamp":1637280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1547467"],"award-info":[{"award-number":["1547467"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:p>A user interface for querying provenance.<\/jats:p>","DOI":"10.1145\/3475358","type":"journal-article","created":{"date-parts":[[2021,11,19]],"date-time":"2021-11-19T15:30:18Z","timestamp":1637335818000},"page":"48-56","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Digging into big provenance (with SPADE)"],"prefix":"10.1145","volume":"64","author":[{"given":"Ashish","family":"Gehani","sequence":"first","affiliation":[{"name":"SRI in Menlo Park, CA"}]},{"given":"Raza","family":"Ahmad","sequence":"additional","affiliation":[{"name":"DePaul University. Chicago, IL"}]},{"given":"Hassaan","family":"Irshad","sequence":"additional","affiliation":[{"name":"SRI, Menlo Park, CA"}]},{"given":"Jianqiao","family":"Zhu","sequence":"additional","affiliation":[{"name":"Google"}]},{"given":"Jignesh","family":"Patel","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]}],"member":"320","published-online":{"date-parts":[[2021,11,19]]},"reference":[{"volume-title":"Proceedings of the 12th USENIX Workshop on the Theory and Practice of Provenance; https:\/\/www.usenix.org\/conference\/tapp2020\/presentation\/ahmad.","author":"Ahmad R.","key":"e_1_2_1_1_1","unstructured":"Ahmad, R., Jung, E., de Senne Garcia, C., Irshad, H., Gehani, A. Discrepancy detection in whole network provenance. In Proceedings of the 12th USENIX Workshop on the Theory and Practice of Provenance; https:\/\/www.usenix.org\/conference\/tapp2020\/presentation\/ahmad."},{"volume-title":"Proceedings of the 7th Biennial Conf. on Innovative Data Systems","author":"Fan J.","key":"e_1_2_1_2_1","unstructured":"Fan, J., Gerald, A., Raj, S., Patel, J. The case against specialized graph analytics engines. In Proceedings of the 7th Biennial Conf. on Innovative Data Systems, 2015; http:\/\/cidrdb.org\/cidr2015\/Papers\/CIDR15_Paper20.pdf."},{"key":"e_1_2_1_3_1","unstructured":"Gehani A. SPADE; http:\/\/spade.csl.sri.com."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1525932.1525939"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851476.1851503"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2442626.2442634"},{"key":"e_1_2_1_7_1","volume-title":"Scaling SPADE to \"Big Provenance.\" In Proceedings of the 8th Usenix Workshop on Theory and Practice of Provenance","author":"Gehani A.","year":"2016","unstructured":"Gehani, A., Kazmi, H., Irshad, H. Scaling SPADE to \"Big Provenance.\" In Proceedings of the 8th Usenix Workshop on Theory and Practice of Provenance, 2016, 26--33; https:\/\/www.usenix.org\/conference\/tapp16\/workshop-program\/presentation\/gehani."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098193"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53974-9_7"},{"volume-title":"Proceedings of the 12th Usenix Workshop on the Theory and Practice of Provenance","author":"Khoury J.","key":"e_1_2_1_10_1","unstructured":"Khoury, J., Upthegrove, T., Caro, A., Benyo, B., Kong, D. An event-based data model for granular information flow tracking. Proceedings of the 12th Usenix Workshop on the Theory and Practice of Provenance, 2020; https:\/\/www.usenix.org\/biblio-4496."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.07.005"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/3184470.3184471"},{"key":"e_1_2_1_13_1","unstructured":"W3C Working Group. PROV-overview 2013; https:\/\/www.w3.org\/TR\/prov-overview\/."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475358","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3475358","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3475358","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:28:45Z","timestamp":1750195725000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475358"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,19]]},"references-count":13,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["10.1145\/3475358"],"URL":"https:\/\/doi.org\/10.1145\/3475358","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2021,11,19]]},"assertion":[{"value":"2021-11-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}