2009
DOI: 10.1145/1462159.1462162
|View full text |Cite
|
Sign up to set email alerts
|

A model of process documentation to determine provenance in mash-ups

Abstract: Through technologies such as RSS (Really Simple Syndication), Web Services, and AJAX (Asynchronous JavaScript And XML), the Internet has facilitated the emergence of applications that are composed from a variety of services and data sources. Through tools such as Yahoo Pipes, these "mash-ups" can be composed in a dynamic, just-in-time manner from components provided by multiple institutions (i.e. Google, Amazon, your neighbour). However, when using these applications, it is not apparent where data comes from o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2010
2010
2011
2011

Publication Types

Select...
5
2

Relationship

3
4

Authors

Journals

citations
Cited by 33 publications
(40 citation statements)
references
References 39 publications
0
40
0
Order By: Relevance
“…For instance, PASOA [18] offers a model that aimed at inter-operability between execution technologies: it focuses on distribution (message-passing systems) and its definition is bound to XML. So, OPM is the first model to be purely technology agnostic.…”
Section: Discussion Related and Future Workmentioning
confidence: 99%
“…For instance, PASOA [18] offers a model that aimed at inter-operability between execution technologies: it focuses on distribution (message-passing systems) and its definition is bound to XML. So, OPM is the first model to be purely technology agnostic.…”
Section: Discussion Related and Future Workmentioning
confidence: 99%
“…Its intellectual base consists of a vast majority of workflow papers [250,174,201,97,256,294,419,39], a provenance-aware operating sytem [301], and a survey [36]; they are accompanied by database papers, which are also [1,216,75]. The research front also consists of papers that, by and large, are system-oriented.…”
Section: Analysis Of Research Trendsmentioning
confidence: 99%
“…We also obtain the list of ancestors' identifiers by the accessor ancestor G (id), which is lexicographically ordered. The hash-value contained in each node is calculated according to Equation (4).…”
Section: Secured Provenance Graphmentioning
confidence: 99%