{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:19:23Z","timestamp":1752229163379,"version":"3.41.0"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2014,5,1]],"date-time":"2014-05-01T00:00:00Z","timestamp":1398902400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2014,5]]},"abstract":"
Better understanding data requires tracking its history and context.","DOI":"10.1145\/2596628","type":"journal-article","created":{"date-parts":[[2014,4,28]],"date-time":"2014-04-28T15:24:14Z","timestamp":1398698654000},"page":"52-60","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["A primer on provenance"],"prefix":"10.1145","volume":"57","author":[{"given":"Lucian","family":"Carata","sequence":"first","affiliation":[{"name":"University of Cambridge"}]},{"given":"Sherif","family":"Akoush","sequence":"additional","affiliation":[{"name":"University of Cambridge Computer Laboratory"}]},{"given":"Nikilesh","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"University of Cambridge"}]},{"given":"Thomas","family":"Bytheway","sequence":"additional","affiliation":[{"name":"University of Cambridge"}]},{"given":"Ripduman","family":"Sohan","sequence":"additional","affiliation":[{"name":"University of Cambridge"}]},{"given":"Margo","family":"Seltzer","sequence":"additional","affiliation":[{"name":"Harvard's School of Engineering and Applied Sciences"}]},{"given":"Andy","family":"Hopper","sequence":"additional","affiliation":[{"name":"University of Cambridge"}]}],"member":"320","published-online":{"date-parts":[[2014,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095693"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 33rd International Conference on Very Large Databases","author":"Biton O.","year":"2007","unstructured":"Biton , O. , Cohen-Boulakia , S. and Davidson , S.B . ZOOM*UserViews: Querying relevant provenance in workflow systems . In Proceedings of the 33rd International Conference on Very Large Databases , ( 2007 ), 366--1369. Biton, O., Cohen-Boulakia, S. and Davidson, S.B. ZOOM*UserViews: Querying relevant provenance in workflow systems. In Proceedings of the 33rd International Conference on Very Large Databases, (2007), 366--1369."},{"key":"e_1_2_1_3_1","volume-title":"Advances in Cryptology---A Report on CRYPTO '81","author":"Blum M.","year":"1982","unstructured":"Blum , M. Coin flipping by telephone: a protocol for solving impossible problems . In Advances in Cryptology---A Report on CRYPTO '81 , ( 1982 ). Blum, M. Coin flipping by telephone: a protocol for solving impossible problems. In Advances in Cryptology---A Report on CRYPTO '81, (1982)."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2013.155"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 3rd Usenix Workshop on Hot Topics in Security","author":"Braun U.","year":"2008","unstructured":"Braun , U. , Shinnar , A. , Seltzer , M. 2008 . Securing provenance . In Proceedings of the 3rd Usenix Workshop on Hot Topics in Security , (2008), 1--5. Braun, U., Shinnar, A., Seltzer, M. 2008. Securing provenance. In Proceedings of the 3rd Usenix Workshop on Hot Topics in Security, (2008), 1--5."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_18"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 8th International Conference on Database Theory","author":"Buneman P.","year":"2002","unstructured":"Buneman , P. , Khanna , S. and Tan , W.C . Why and where: A characterization of data provenance . In Proceedings of the 8th International Conference on Database Theory , ( 2002 ), 316--330. Buneman, P., Khanna, S. and Tan, W.C. Why and where: A characterization of data provenance. In Proceedings of the 8th International Conference on Database Theory, (2002), 316--330."},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 2nd International Provenance and Annotation Workshop","author":"Callahan S.P.","year":"2008","unstructured":"Callahan , S.P. et al. Towards process provenance for existing applications . In Proceedings of the 2nd International Provenance and Annotation Workshop , ( 2008 ), 120--127. Callahan, S.P. et al. Towards process provenance for existing applications. In Proceedings of the 2nd International Provenance and Annotation Workshop, (2008), 120--127."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/357775.357777"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_2"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 3rd Usenix Workshop on the Theory and Practice of Provenance","author":"Gates C.","year":"2011","unstructured":"Gates , C. and Bishop , M . One of these records is not like the others . In Proceedings of the 3rd Usenix Workshop on the Theory and Practice of Provenance , ( 2011 ). Gates, C. and Bishop, M. One of these records is not like the others. In Proceedings of the 3rd Usenix Workshop on the Theory and Practice of Provenance, (2011)."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2442626.2442634"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 4th Usenix Conference on Theory and Practice of Provenance","author":"Guo P.J.","year":"2012","unstructured":"Guo , P.J. , and Seltzer , M . Burrito: Wrapping your lab notebook in computational infrastructure . In Proceedings of the 4th Usenix Conference on Theory and Practice of Provenance , ( 2012 ) 7--7. Guo, P.J., and Seltzer, M. Burrito: Wrapping your lab notebook in computational infrastructure. In Proceedings of the 4th Usenix Conference on Theory and Practice of Provenance, (2012) 7--7."},{"key":"e_1_2_1_15_1","volume-title":"Advances in Cryptology","author":"Halevy D.","year":"2002","unstructured":"Halevy , D. and Shamir , A . The LSD broadcast encryption scheme . In Advances in Cryptology , ( 2002 ), 47--60. Halevy, D. and Shamir, A. The LSD broadcast encryption scheme. In Advances in Cryptology, (2002), 47--60."},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of the 7th Conference on File and Storage Technologies","author":"Hasan R.","year":"2009","unstructured":"Hasan , R. , Sion , R. and Winslett , M . The case of the fake Picasso: preventing history forgery with secure provenance . In Proceedings of the 7th Conference on File and Storage Technologies , ( 2009 ), 1--14. Hasan, R., Sion, R. and Winslett, M. The case of the fake Picasso: preventing history forgery with secure provenance. In Proceedings of the 7th Conference on File and Storage Technologies, (2009), 1--14."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342875.2342881"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 3rd Conference on Theory and Practice of Provenance","author":"Macko P.","year":"2011","unstructured":"Macko , P. and Seltzer , M . Provenance Map Orbiter: interactive exploration of large provenance graphs . In Proceedings of the 3rd Conference on Theory and Practice of Provenance , ( 2011 ) Macko, P. and Seltzer, M. Provenance Map Orbiter: interactive exploration of large provenance graphs. In Proceedings of the 3rd Conference on Theory and Practice of Provenance, (2011)"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855795.1855797"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.07.005"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the Usenix Annual Technical Conference","author":"Muniswamy-Reddy K.-K.","year":"2009","unstructured":"Muniswamy-Reddy , K.-K. , Layering in provenance systems . In Proceedings of the Usenix Annual Technical Conference , 2009 . Muniswamy-Reddy, K.-K., et al. Layering in provenance systems. In Proceedings of the Usenix Annual Technical Conference, 2009."},{"key":"e_1_2_1_23_1","volume-title":"Proceedings of the Usenix Annual Technical Conference","author":"Muniswamy-Reddy K.-K.","year":"2006","unstructured":"Muniswamy-Reddy , K.-K. , Provenance-aware storage systems . In Proceedings of the Usenix Annual Technical Conference , ( 2006 ), 43--56. Muniswamy-Reddy, K.-K., et al. Provenance-aware storage systems. In Proceedings of the Usenix Annual Technical Conference, (2006), 43--56."},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 37th International Conference on Very Large Databases","author":"Park H.","year":"2011","unstructured":"Park , H. , Ikeda , R. and Widom , J . RAMP: A system for capturing and tracing provenance in MapReduce workflows . In Proceedings of the 37th International Conference on Very Large Databases , ( 2011 ). Park, H., Ikeda, R. and Widom, J. RAMP: A system for capturing and tracing provenance in MapReduce workflows. In Proceedings of the 37th International Conference on Very Large Databases, (2011)."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1356058.1356069"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:5"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2596628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2596628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:04Z","timestamp":1750234204000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2596628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":26,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2014,5]]}},"alternative-id":["10.1145\/2596628"],"URL":"https:\/\/doi.org\/10.1145\/2596628","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"type":"print","value":"0001-0782"},{"type":"electronic","value":"1557-7317"}],"subject":[],"published":{"date-parts":[[2014,5]]},"assertion":[{"value":"2014-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}