2015
DOI: 10.1007/s00778-015-0390-5
|View full text |Cite
|
Sign up to set email alerts
|

Provenance-based analysis of data-centric processes

Abstract: We consider in this paper static analysis of the possible executions of data-dependent applications, namely applications whose control flow is guided by a finite-state machine, as well as by the state of an underlying database. We note that previous work in this context has not addressed two important features of such analysis, namely analysis under hypothetical scenarios, such as changes to the application's state machine and/or to the underlying database, and the consideration of meta-data, such as cost or a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 29 publications
0
13
0
Order By: Relevance
“…A data-dependent process (DDP) is a finite state machine that evaluates queries against a relational database to determine some transitions and uses external requests to trigger other transitions [9,10]. In [9] and [10], Deutch et al extend provenance semirings [13] to linear temporal logic formulas issued against a DDP. Both DDP provenance and wat-provenance aim to extend traditional data provenance to state machines, but they do so in very different ways.…”
Section: Related Workmentioning
confidence: 99%
“…A data-dependent process (DDP) is a finite state machine that evaluates queries against a relational database to determine some transitions and uses external requests to trigger other transitions [9,10]. In [9] and [10], Deutch et al extend provenance semirings [13] to linear temporal logic formulas issued against a DDP. Both DDP provenance and wat-provenance aim to extend traditional data provenance to state machines, but they do so in very different ways.…”
Section: Related Workmentioning
confidence: 99%
“…We have implemented our provenance framework in the context of PROPOLIS (PROvisioned Process Analysis) [13]. The system architecture is shown in Fig.…”
Section: Prototype Implementationmentioning
confidence: 99%
“…We have implemented our model and algorithms in the context of a system prototype called PROPOLIS (PROvisioned data-dependent PrOcess anaLysIS) [13]. PROPOLIS allows analysts to define, in addition to an LTL formula, annotations (from e.g.…”
Section: Introductionmentioning
confidence: 99%
“…In a nutshell, data provenance captures details of the computation that took place and resulted in the generation of each output data item. Multiple models for data provenance have been proposed, for multiple query languages such as the (positive) relational algebra, datalog (see [23]), data-intensive workflows (e.g., [14,35]) data mining [21], and datacentric applications [16]. Provenance has been proven useful for managing access control, trust, hypothetical reasoning, view maintenance and debugging (see [19,22,15,23,8]).…”
Section: Introductionmentioning
confidence: 99%