1 / 10

Overview of Today’s Talks

Overview of Today’s Talks. Provenance Data Structures Recording and Querying Provenance Break (30 minutes) Distribution and Scalability Security Methodology. Recording Process Documentation by Paul Groth (pg03r@ecs.soton.ac.uk). Principles of Recording.

vmccoy
Download Presentation

Overview of Today’s Talks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Overview of Today’s Talks • Provenance Data Structures • Recording and Querying Provenance • Break (30 minutes) • Distribution and Scalability • Security • Methodology

  2. Recording Process Documentation by Paul Groth (pg03r@ecs.soton.ac.uk)

  3. Principles of Recording • Factuality – an actor should only record what it knows: • the messages it has sent and received • the relationships between those messages • its state • Attribution – every piece of documentation is an assertionby an actor and must be attributable to that actor • Immutability – an actor cannot change or delete what it already has asserted

  4. Recording an assertion • To record an assertion in a provenance store, an actor sends the following: • Which message the assertion relates to • Whether it sent or received that message • The actor’s own identity (attribution) • The content of the assertion

  5. Record Message Schema

  6. Record Message Schema The identity of the asserter of the p-assertions being recorded

  7. Record Message Schema Whether the asserter was the sender or the receiver in the interaction

  8. Record Message Schema The identifying key of the interaction that the assertions are about

  9. Record Message Schema The assertion itself: message contents, actor’s state or a relationship

  10. More Background • Complies with an the abstract P-assertion Recording Protocol (PReP) • The protocol has been formalised • Several properties have been proven • Principles are discussed in detail in forthcoming paper • Refer you to appropriate papers if desired

More Related