Describes the different aspects of data provenance (interaction, relationship and actor state provenance) and how these translate to p-assertions. The other part of the paper is about securing provenance data.
CITATION STYLE
Groth, P., Miles, S., Tan, V., & Moreau, L. (2005). Architecture for Provenance Systems. University of Southampton Internal Report. Retrieved from http://eprints.ecs.soton.ac.uk/11310/1/provenanceArchitecture4.pdf
Mendeley helps you to discover research relevant for your work.