
19
Chapter 2
Security and Provenance
2.1 Overview
ere are many opportunities for research in data provenance (Davidson and Freire
2008; Gil et al. 2007; Moreau 2009). ese include (1) information management
infrastructure to efficiently and effectively manage the growing volume of prov-
enance information, (2) provenance analytics and visualization for mining and
extracting knowledge from provenance data, which has been largely unexplored,
and (3) interoperability of different provenance systems and tools to aid in the
integration of provenance. Also, recently there have been a series of challenges
for provenance (Moreau et al. 2011). e first prov ...