{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:16:25Z","timestamp":1759637785744},"reference-count":37,"publisher":"Association for Computing Machinery (ACM)","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2014,2]]},"abstract":"<jats:p>A data-dependent process (DDP) models an application whose control flow is guided by a finite state machine, as well as by the state of an underlying database. DDPs are commonly found e.g., in e-commerce. In this paper we develop a framework supporting the use of provenance in static (temporal) analysis of possible DDP executions. Using provenance support, analysts can interactively test and explore the effect of hypothetical modifications to a DDP's state machine and\/or to the underlying database. They can also extend the analysis to incorporate the propagation of annotations from meta-domains of interest, e.g., cost or access privileges.<\/jats:p>\n          <jats:p>\n            Toward this goal we note that the framework of semiring-based provenance was proven highly effective in fulfilling similar needs in the context of database queries. In this paper we consider novel constructions that generalize the semiring approach to the context of DDP analysis. These constructions address two\n            <jats:italic>interacting<\/jats:italic>\n            new challenges: (1) to combine provenance annotations for both information that resides in the database and information about external inputs (e.g., user choices), and (2) to finitely capture infinite process executions. We analyze our solution from theoretical and experimental perspectives, proving its effectiveness.\n          <\/jats:p>","DOI":"10.14778\/2732279.2732283","type":"journal-article","created":{"date-parts":[[2015,5,12]],"date-time":"2015-05-12T15:37:52Z","timestamp":1431445072000},"page":"457-468","source":"Crossref","is-referenced-by-count":9,"title":["A provenance framework for data-dependent process analysis"],"prefix":"10.14778","volume":"7","author":[{"given":"Daniel","family":"Deutch","sequence":"first","affiliation":[{"name":"Tel Aviv University"}]},{"given":"Yuval","family":"Moskovitch","sequence":"additional","affiliation":[{"name":"Tel Aviv University"}]},{"given":"Val","family":"Tannen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]}],"member":"320","published-online":{"date-parts":[[2014,2]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275507"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSDM.1998.688123"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095693"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989302"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-007-0080-z"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1412331.1412340"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/645504.656274"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000006"},{"key":"e_1_2_1_9_1","volume-title":"Business artifacts: A data-centric approach to modeling business operations and processes","author":"Cohn D.","year":"2009","unstructured":"D. Cohn and R. Hull . Business artifacts: A data-centric approach to modeling business operations and processes . IEEE Data Eng. Bull ., 32(3), 2009 . D. Cohn and R. Hull. Business artifacts: A data-centric approach to modeling business operations and processes. IEEE Data Eng. Bull., 32(3), 2009."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376772"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31862-0_21"},{"key":"e_1_2_1_12_1","volume-title":"CIDR","author":"Deutch D.","year":"2013","unstructured":"D. Deutch , Z. G. Ives , T. Milo , and V. Tannen . Caravan: Provisioning for what-if analysis . In CIDR , 2013 . D. Deutch, Z. G. Ives, T. Milo, and V. Tannen. Caravan: Provisioning for what-if analysis. In CIDR, 2013."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536274.2536301"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142584"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/2140436.2140445"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSDM.2002.1029704"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376916.1376954"},{"key":"e_1_2_1_18_1","volume-title":"CAV","author":"Fu X.","year":"2004","unstructured":"X. Fu , T. Bultan , and J. Su . Wsat: A tool for formal analysis of web services . In CAV , 2004 . X. Fu, T. Bultan, and J. Su. Wsat: A tool for formal analysis of web services. In CAV, 2004."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(03)00299-3"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/872023.872506"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646746.703742"},{"key":"e_1_2_1_22_1","volume-title":"Provenance in orchestra","author":"Green T. J.","year":"2010","unstructured":"T. J. Green , G. Karvounarakis , Z. G. Ives , and V. Tannen . Provenance in orchestra . IEEE Data Eng. Bull ., 33(3), 2010 . T. J. Green, G. Karvounarakis, Z. G. Ives, and V. Tannen. Provenance in orchestra. IEEE Data Eng. Bull., 33(3), 2010."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_4"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85780-8_30"},{"key":"e_1_2_1_26_1","first-page":"34","article-title":"Taverna: a tool for building and running workflows of services","author":"Hull D.","year":"2006","unstructured":"D. Hull , K. Wolstencroft , R. Stevens , C. Goble , M. Pocock , P. Li , and T. Oinn . Taverna: a tool for building and running workflows of services . Nucleic Acids Res. , 34 , 2006 . D. Hull, K. Wolstencroft, R. Stevens, C. Goble, M. Pocock, P. Li, and T. Oinn. Taverna: a tool for building and running workflows of services. Nucleic Acids Res., 34, 2006.","journal-title":"Nucleic Acids Res."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45319-9_14"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2274576.2274597"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/128869"},{"key":"e_1_2_1_30_1","volume-title":"Reverse data management. PVLDB, 4(12)","author":"Meliou A.","year":"2011","unstructured":"A. Meliou , W. Gatterbauer , and D. Suciu . Reverse data management. PVLDB, 4(12) , 2011 . A. Meliou, W. Gatterbauer, and D. Suciu. Reverse data management. PVLDB, 4(12), 2011."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213875"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739079"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11605157_33"},{"key":"e_1_2_1_34_1","volume-title":"Series-parallel automata and short regular expressions. Fundam. Inform., 91(3-4)","author":"Moreira N.","year":"2009","unstructured":"N. Moreira and R. Reis . Series-parallel automata and short regular expressions. Fundam. Inform., 91(3-4) , 2009 . N. Moreira and R. Reis. Series-parallel automata and short regular expressions. Fundam. Inform., 91(3-4), 2009."},{"issue":"2","key":"e_1_2_1_35_1","article-title":"Karma2: Provenance management for data-driven workflows","volume":"5","author":"Simhan Y. L.","year":"2008","unstructured":"Y. L. Simhan , B. Plale , and D. Gammon . Karma2: Provenance management for data-driven workflows . Int. J. Web Service Res. , 5 ( 2 ), 2008 . Y. L. Simhan, B. Plale, and D. Gammon. Karma2: Provenance management for data-driven workflows. Int. J. Web Service Res., 5(2), 2008.","journal-title":"Int. J. Web Service Res."},{"key":"e_1_2_1_36_1","volume-title":"Principles of Database and Knowledge-Base Systems","author":"Ullman J. D.","year":"1989","unstructured":"J. D. Ullman . Principles of Database and Knowledge-Base Systems . Computer Science Press , 1989 . J. D. Ullman. Principles of Database and Knowledge-Base Systems. Computer Science Press, 1989."},{"key":"e_1_2_1_37_1","volume-title":"w3c working group note","year":"2013","unstructured":"Prov-overview , w3c working group note , 2013 . http:\/\/www.w3.org\/TR\/prov-overview\/. Prov-overview, w3c working group note, 2013. http:\/\/www.w3.org\/TR\/prov-overview\/."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/2732279.2732283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T11:09:43Z","timestamp":1672225783000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/2732279.2732283"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,2]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,2]]}},"alternative-id":["10.14778\/2732279.2732283"],"URL":"https:\/\/doi.org\/10.14778\/2732279.2732283","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2014,2]]}}}