ACM DL

Internet Technology (TOIT)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Internet Technology (TOIT) - Special Issue on Provenance of Online Data and Regular Papers, Volume 17 Issue 4, September 2017

Section: Special Issue on Provenance of Online Data

Guest Editorial: The Provenance of Online Data
Adriane Chapman, James Cheney, Simon Miles
Article No.: 33
DOI: 10.1145/3108938

Taming the Costs of Trustworthy Provenance through Policy Reduction
Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, Trent Jaeger
Article No.: 34
DOI: 10.1145/3062180

Provenance is an increasingly important tool for understanding and even actively preventing system intrusion, but the excessive storage burden imposed by automatic provenance collection threatens to undermine its value in practice. This situation...

A Canonical Form for PROV Documents and Its Application to Equality, Signature, and Validation
Luc Moreau
Article No.: 35
DOI: 10.1145/3032990

We present a canonical form for prov that is a normalized way of representing prov documents as mathematical expressions. As opposed to the normal form specified by the prov-constraints recommendation, the...

Managing Provenance of Implicit Data Flows in Scientific Experiments
Vitor C. Neves, Daniel De Oliveira, Kary A. C. S. Ocaña, Vanessa Braganholo, Leonardo Murta
Article No.: 36
DOI: 10.1145/3053372

Scientific experiments modeled as scientific workflows may create, change, or access data products not explicitly referenced in the workflow specification, leading to implicit data flows. The lack of knowledge about implicit data flows makes the...

PROV2R: Practical Provenance Analysis of Unstructured Processes
Manolis Stamatogiannakis, Elias Athanasopoulos, Herbert Bos, Paul Groth
Article No.: 37
DOI: 10.1145/3062176

Information produced by Internet applications is inherently a result of processes that are executed locally. Think of a web server that makes use of a CGI script, or a content management system where a post was first edited using a word processor....

Section: Regular Papers

Facilitating Adoption of Internet Technologies and Services with Externalities via Cost Subsidization
Steven Weber
Article No.: 38
DOI: 10.1145/3091109

This article models the temporal adoption dynamics of an abstracted Internet technology or service, where the instantaneous net value of the service perceived by each (current or potential) user/customer incorporates three key features: (i) user...

Bandwidth Measurements within the Cloud: Characterizing Regular Behaviors and Correlating Downtimes
José Luis García-Dorado
Article No.: 39
DOI: 10.1145/3093893

The search for availability, reliability, and quality of service has led cloud infrastructure customers to disseminate their services, contents, and data over multiple cloud data centers, often involving several Cloud service providers (CSPs). The...

Exploiting Contextual Information in Attacking Set-Generalized Transactions
Jianhua Shao, Hoang Ong
Article No.: 40
DOI: 10.1145/3106165

Transactions are records that contain a set of items about individuals. For example, items browsed by a customer when shopping online form a transaction. Today, many activities are carried out on the Internet, resulting in a large amount of...