Abstract
Science has been revolutionalized by the development and use of high-throughput technologies, which generate large amounts of experimental data. This data must then be analyzed to create knowledge, and for this scientists are increasingly turning to scientific workflow systems. Scientific workflow systems not only help conceptualize and visualize the analysis process, but enable the sharing and reuse of subworkflows between analysis processes by maintaining repositories of workflows.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bao, Z., Davidson, S., Milo, T.: View-adaptive labeling for fine-grained workflows (submitted)
Biton, O., Davidson, S.B., Khanna, S., Roy, S.: Optimizing user views for workflows. In: ICDT 2009: Proceedings of the 12th International Conference on Database Theory, pp. 310–323 (2009)
Davidson, S., Milo, T., Roy, S.: A propagation model for provenance views of public/private workflows (submitted)
Davidson, S.B., Khanna, S., Milo, T., Panigrahi, D., Roy, S.: Provenance views for module privacy. In: Proceedings of the 30th ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 175–186 (2011)
Davidson, S.B., Khanna, S., Roy, S., Stoyanovich, J., Tannen, V., Chen, Y.: On provenance and privacy. In: ICDT, pp. 3–10 (2011)
Davidson, S.B., Khanna, S., Tannen, V., Roy, S., Chen, Y., Milo, T., Stoyanovich, J.: Enabling privacy in provenance-aware workflow systems. In: CIDR, pp. 215–218 (2011), http://www.crdrdb.org
Dwork, C.: Differential privacy: A survey of results. In: Agrawal, M., Du, D.-Z., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1–19. Springer, Heidelberg (2008)
Dwork, C.: The differential privacy frontier (Extended abstract). In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 496–502. Springer, Heidelberg (2009)
Ganta, S.R., Kasiviswanathan, S.P., Smith, A.: Composition attacks and auxiliary information in data privacy. In: Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2008, pp. 265–273. ACM, New York (2008)
Kifer, D.: Attacks on privacy and de Finetti’s theorem. In: SIGMOD Conference, pp. 127–138 (2009)
Liu, Z., Davidson, S.B., Chen, Y.: Generating sound workflow views for correct provenance analysis. ACM Trans. Database Syst. 36(1), 6 (2011)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: L-diversity: Privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data 1(1), 3 (2007)
McSherry, F., Talwar, K.: Mechanism design via differential privacy. In: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, pp. 94–103. IEEE Computer Society, Washington, DC (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Davidson, S.B., Khanna, S., Milo, T. (2013). To Show or Not to Show in Workflow Provenance. In: Tannen, V., Wong, L., Libkin, L., Fan, W., Tan, WC., Fourman, M. (eds) In Search of Elegance in the Theory and Practice of Computation. Lecture Notes in Computer Science, vol 8000. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-41660-6_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-41660-6_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-41659-0
Online ISBN: 978-3-642-41660-6
eBook Packages: Computer ScienceComputer Science (R0)