History Being Documented Through Art Artwork That Shows History
Provenance (from the French provenir, 'to come from/along') is the chronology of the buying, custody or location of a historical object.[one] The term was originally mostly used in relation to works of art but is at present used in like senses in a broad range of fields, including archaeology, paleontology, athenaeum, manuscripts, printed books, the circular economy, and science and computing.
The primary purpose of tracing the provenance of an object or entity is normally to provide contextual and circumstantial testify for its original product or discovery, by establishing, as far as practicable, its later history, specially the sequences of its formal ownership, custody and places of storage. The practice has a particular value in helping authenticate objects. Comparative techniques, adept opinions and the results of scientific tests may also be used to these ends, but establishing provenance is essentially a matter of documentation. The term dates to the 1780s in English. Provenance is conceptually comparable to the legal term chain of custody.
For museums and the fine art trade, in addition to helping establish the authorship and actuality of an object, provenance has become increasingly of import in helping establish the moral and legal validity of a chain of custody, given the increasing amount of looted art. These issues first became a major business organisation regarding works that had changed hands in Nazi-controlled areas in Europe before and during World War 2. Many museums began compiling pro-active registers of such works and their history. Recently the aforementioned concerns take come to prominence for works of African fine art, oftentimes exported illegally, and antiquities from many parts of the world, but currently especially in Iraq, and and then Syria.[2]
In archæology and paleontology, the derived term provenience is used with a related but very detail meaning, to refer to the location (in mod research, recorded precisely in three dimensions) where an antiquity or other aboriginal item was found.[3] Provenance covers an object's consummate documented history. An antiquity may thus take both a provenience and a provenance.
Works of art and antiques [edit]
The provenance of works of fine art, antiques and antiquities is of cracking importance, especially to their possessor. In that location are a number of reasons why painting provenance is important, which mostly too employ to other types of art. A good provenance increases the value of a painting, and establishing provenance may help confirm the date, creative person and, especially for portraits, the subject area of a painting. It may confirm whether a painting is genuinely of the period it seems to date from. The provenance of paintings can help resolve ownership disputes. For instance, provenance between 1933 and 1945 can determine whether a painting was looted past the Nazis. Many galleries are putting a great deal of effort into researching the provenance of paintings in their collections for which there is no firm provenance during that catamenia.[four] Documented testify of provenance for an object can help to establish that it has not been altered and is not a forgery, a reproduction, stolen or looted art. Provenance helps assign the work to a known creative person, and a documented history can be of utilize in helping to testify ownership. An case of a detailed provenance is given in the Arnolfini portrait.
The quality of provenance of an important work of art can brand a considerable difference to its selling price in the market; this is afflicted by the degree of certainty of the provenance, the status of past owners as collectors, and in many cases past the force of evidence that an object has non been illegally excavated or exported from another country. The provenance of a work of art may vary profoundly in length, depending on context or the amount that is known, from a single proper noun to an entry in a scholarly catalogue some thousands of words long.
An expert certification can mean the divergence between an object having no value and being worth a fortune. Certifications themselves may be open to question. Jacques van Meegeren forged the work of his father Han van Meegeren (who in his turn had forged the work of Vermeer). Jacques sometimes produced a certificate with his forgeries stating that a work was created by his father.
John Drewe was able to laissez passer off as genuine paintings, a big number of forgeries that would accept hands been recognised as such by scientific exam. He established an impressive (simply false) provenance and because of this galleries and dealers accepted the paintings as genuine. He created this simulated provenance by forging letters and other documents, including false entries in before exhibition catalogues.[5]
Sometimes provenance can be every bit simple as a photograph of the particular with its original owner. Uncomplicated nonetheless definitive documentation such as that can increment its value by an gild of magnitude, but only if the owner was of high renown. Many items that were sold at auction accept gone far past their estimates because of a photo showing that item with a famous person. Some examples include antiques owned by politicians, musicians, artists, actors, etc.[six]
In the context of discussions about the restitution of cultural objects in museum collections of colonial origin, the AfricaMuseum in Belgium started to publicly present data nigh such objects in its permanent exhibition in 2021.[7]
Researching the provenance of paintings [edit]
The objective of provenance research is to produce a complete list of owners (together, where possible, with the supporting documentary proof) from when the painting was commissioned or in the artist's studio through to the present fourth dimension. In exercise, at that place are probable to be gaps in the list and documents that are missing or lost. The documented provenance should besides list when the painting has been office of an exhibition and a bibliography of when information technology has been discussed (or illustrated) in print.
Where the research is proceeding backwards, to discover the previous provenance of a painting whose current ownership and location is known, it is important to record the physical details of the painting – style, subject area, signature, materials, dimensions, frame, etc.[8] The titles of paintings and the attribution to a particular creative person may change over time. The size of the work and its description can be used to identify earlier references to the painting. The back of a painting tin incorporate meaning provenance information. In that location may be exhibition marks, dealer stamps, gallery labels and other indications of previous ownership. At that place may likewise be shipping labels. In the BBC Goggle box programme Fake or Fortune? the provenance of the painting Bords de la Seine à Argenteuil was investigated using a gallery sticker and aircraft label on the dorsum. Early on provenance tin can sometimes be indicated by a cartellino (a trompe-l'œil representation of an inscribed label) added to the front of a painting.[9] However, these tin be forged, or tin fade or be painted over.
Sale records are an of import resource to help in researching the provenance of paintings.
- The Witt Library houses a collection of cuttings from auction catalogs which enables the researcher to identify occasions when a film has been sold.
- The Heinz Library at the National Portrait Gallery, London maintains a like collection, but restricted to portraits.
- The National Fine art Library at the Victoria and Albert Museum has a collection of UK sales catalogues.[ten]
- The University of York is establishing a web site with on-line resources for investigating art history in the menses 1660–1735.[xi] This includes diaries, sales catalogues, bills, correspondence and inventories.
- The Getty Research Establish in Los Angeles has a Project for the Study of Collecting and Provenance (PSCP) which includes an on-line database, all the same existence compiled, of auction and other records relating to painting provenance.[12]
- The Frick Art Reference Library in New York has an extensive collection of auction and exhibition catalogues.[13]
- The Netherlands Institute for Fine art History (RKD) has a number of databases related to artists from the Netherlands.[fourteen]
If a painting has been in individual easily for an extended menses and on display in a stately habitation, it may exist recorded in an inventory – for example, the Lumley inventory.[15] The painting may as well accept been noticed by a visitor who subsequently wrote most information technology. It may have been mentioned in a volition or a diary. Where the painting has been bought from a dealer, or changed hands in a private transaction, at that place may be a bill of sale or sales receipt that provides evidence of provenance. Where the artist is known, there may be a catalogue raisonné listing all the artist's known works and their location at the time of writing. A database of catalogues raisonnés is available at the International Foundation for Fine art Research. Celebrated photos of the painting may be discussed and illustrated in a more than general work on the artist, period or genre. Similarly, a photo of a painting may prove inscriptions (or a signature) that after became lost every bit a result of overzealous restoration. Conversely, a photograph may show that an inscription was not visible at an earlier date. One of the disputed aspects of the "Rice" portrait of Jane Austen concerns apparent inscriptions identifying creative person and sitter.[16]
Athenaeum [edit]
Stamp on a historic document, showing that it has passed through the easily of the Records Preservation Section of the British Records Association, a rescue service for archival material: the number indicates its earlier provenance
Provenance – likewise known equally custodial history – is a core concept within archival science and archival processing. The term refers to the individuals, groups, or organizations that originally created or received the items in an accumulation of records, and to the items' subsequent chain of custody.[17] The principle of provenance (also termed the principle of "archival integrity", and a major strand in the broader principle of respect des fonds) stipulates that records originating from a common source (or fonds) should be kept together – where practicable, physically; but in all cases intellectually, in the way in which they are catalogued and arranged in finding aids. Conversely, records of different provenance should be preserved and documented separately. In archival practise, proof of provenance is provided past the operation of command systems that certificate the history of records kept in athenaeum, including details of amendments fabricated to them. The authority of an archival document or set up of documents of which the provenance is uncertain (considering of gaps in the recorded chain of custody) will be considered to exist severely compromised.
The principles of archival provenance were developed in the 19th century by both French and Prussian archivists, and gained widespread credence on the footing of their formulation in the Manual for the Arrangement and Description of Archives past Dutch country archivists Samuel Muller, J. A. Feith, and R. Fruin, published in the Netherlands in 1898 (often referred to as the "Dutch Manual").[18]
Seamus Ross has argued a case for adapting established principles and theories of archival provenance to the field of modern digital preservation and curation.[19]
Provenance is also the title of the journal published by the Guild of Georgia Archivists.[xx]
Books [edit]
In the case of books, the report of provenance refers to the study of the ownership of private copies of books. It is usually extended to include study of the circumstances in which individual copies of books accept changed ownership, and of evidence left in books that shows how readers interacted with them.[21] [22]
Provenance studies may shed light on the books themselves, providing evidence of the role detail titles accept played in social, intellectual and literary history. Such studies may also add together to our knowledge of particular owners of books. For instance, looking at the books endemic by a writer may help to evidence which works influenced him or her.
Many provenance studies are historically focused, and concentrated on books endemic by writers, politicians and public figures. The contempo ownership of books is studied, all the same, as is evidence of how ordinary or anonymous readers accept interacted with books.[23] [24]
Provenance can be studied both by examining the books themselves (for instance looking at inscriptions, marginalia, bookplates, book rhymes, and bindings) and past reference to external sources of information such as auction catalogues.[21]
Wines [edit]
In transactions of former wine with the potential of improving with age, the outcome of provenance has a large bearing on the cess of the contents of a bottle, both in terms of quality and the hazard of vino fraud. A documented history of wine cellar weather condition is valuable in estimating the quality of an older vintage due to the fragile nature of vino.[25]
Recent technology developments have aided collectors in assessing the temperature and humidity history of the wine which are ii key components in establishing perfect provenance. For example, there are devices bachelor that rest within the wood case and can be read through the wood by waving a smartphone equipped with a simple app. These devices track the conditions the case has been exposed to for the duration of the battery life, which tin can exist equally long equally 15 years, and sends a graph and loftier/low readings to the smartphone user. This takes the trust upshot out of the hands of the owner and gives it to a third political party for verification.[ citation needed ]
Scientific discipline [edit]
Archæology, anthropology, and paleontology [edit]
Archaeology and anthropology researchers utilize provenience to refer to the verbal location or find spot of an antiquity, a os or other remains, a soil sample, or a feature within an ancient site,[3] whereas provenance covers an object'southward complete documented history. Ideally, in mod excavations, the provenience is recorded in 3 dimensions on a site grid with smashing precision, and may likewise be recorded on video to provide additional proof and context. In older work, oft undertaken by amateurs, merely the general site or approximate area may exist known, especially when an artifact was plant outside a professional excavation and its specific position not recorded. The term provenience appeared in the 1880s, virtually a century after provenance. Outside of academic contexts, it has been used every bit a synonymous variant spelling of provenance, peculiarly in American English.
Any given artifact may have both a provenience (where it was found) and a provenance (where it has been since it was constitute). A summary of the stardom is that "provenience is a fixed point, while provenance can be considered an itinerary that an object follows as it moves from hand to hand."[26] Another metaphor is that provenience is an artifact's "birthplace", while provenance is its "résumé",[27] though this is imprecise (many artifacts originated every bit trade appurtenances created in one region but were used and finally deposited in another).
Aside from scientific precision, a need for the distinction in these fields has been described thus:[27]
Archaeologists ... don't care who owned an object—they are more interested in the context of an object within the customs of its (mostly original) users. ... [W]e are interested in why a Roman money turned upwardly in a shipwreck 400 years after information technology was made; while art historians don't really care, since they can generally effigy out what mint a coin came from by the information stamped on its surface. "It's a Roman coin, what else do we need to know?" says an fine art historian; "The shipping merchandise in the Mediterranean region during late Roman times" says an archaeologist. ... [P]rovenance for an art historian is important to establish ownership, simply provenience is interesting to an archaeologist to establish pregnant.
In this context, the provenance tin occasionally be the detailed history of where an object has been since its cosmos,[27] every bit in fine art history contexts – not just since its modernistic finding. In some cases, such equally where in that location is an inscription on the object, or an business relationship of information technology in written materials from the same era, an object of study in archaeology or cultural anthropology may accept an early provenance – a known history that predates modernistic enquiry – then a provenience from its modern finding, and finally a continued provenance relating to its treatment and storage or display after the modern acquisition.
Evidence of provenance in the more general sense can exist of importance in archaeology. Fakes are not unknown, and finds are sometimes removed from the context in which they were plant without documentation, reducing their value to science. Fifty-fifty when plainly discovered in situ, archaeological finds are treated with caution. The provenience of a observe may not be properly represented by the context in which it was found (due east.1000. due to stratigraphic layers beingness disturbed past erosion, earthquakes, or ancient reconstruction or other disturbance at a site. Artifacts tin can also exist moved through looting as well as trade, far from their place of origin and long before modern rediscovery. Many source nations take passed legislation forbidding the domestic trade in cultural heritage. Farther research is frequently required to establish the truthful provenance and legal status of a find, and what the relationship is between the exact provenience and the overall provenance.
In paleontology and paleoanthropology, it is recognized that fossils can also move from their primary context and are sometimes plant, apparently in-situ, in deposits to which they do not belong because they take been moved, for example, by the erosion of nearby but different outcrops. It is unclear how strictly paleontology maintains the provenience and provenance distinction. For example, a brusque glossary at a website (primarily aimed at young students) of the American Museum of Natural History treats the terms as synonymous,[28] while scholarly paleontology works make frequent use of provenience in the same precise sense every bit used in archæology and paleoanthropology.
While exacting details of a find'due south provenience are primarily of use to scientific researchers, near natural history and archaeology museums also make strenuous efforts to record how the items in their collections were acquired. These records are often of use in helping to constitute a chain of provenance.
Data provenance [edit]
Scientific enquiry is generally held to exist of good provenance when it is documented in detail sufficient to permit reproducibility.[29] [thirty] Scientific workflow systems assist scientists and programmers with tracking their data through all transformations, analyses, and interpretations. Data sets are reliable when the processes used to create them are reproducible and analyzable for defects.[31] Security researchers are interested in data provenance because it can analyze suspicious data and make large opaque systems transparent.[32] Current initiatives to effectively manage, share, and reuse ecological data are indicative of the increasing importance of information provenance. Examples of these initiatives are National Science Foundation Datanet projects, DataONE and Information Conservancy, also equally the U.Due south. Global Change Research Plan.[33] Some international academic consortia, such equally the Inquiry Data Alliance, have specific groups to tackle issues of provenance. In that example information technology is the Inquiry Information Provenance Interest Group.[34]
Computer science [edit]
Within computer science, information science uses the term "provenance"[35] to mean the lineage of data, as per data provenance, with enquiry in the last decade extending the conceptual model of causality and relation to include processes that act on data and agents that are responsible for those processes. Meet, for example, the proceedings of the International Provenance Annotation Workshop (IPAW)[36] and Theory and Practise of Provenance (TaPP).[37] Semantic web standards bodies, including the World Wide Web Consortium in 2014, have ratified a standard data model for provenance representation known every bit PROV[38] which draws from many of the better-known provenance representation systems that preceded it, such equally the Proof Markup Language and the Open up Provenance Model.[39]
Interoperability is a blueprint goal of most recent information science provenance theories and models, for instance the Open Provenance Model (OPM) 2008 generation workshop aimed at "establishing inter-operability of systems" through data exchange agreements.[40] Data models and serialisation formats for delivering provenance data typically reuse existing metadata models where possible to enable this. Both the OPM Vocabulary[41] and the PROV Ontology[42] make extensive employ of metadata models such as Dublin Core and Semantic Spider web technologies such as the Spider web Ontology Language (OWL). Current practice is to rely on the W3C PROV data model, OPM'due south successor.[43]
In that location are several maintained and open-source provenance capture implementation at the operating system level such equally CamFlow,[44] [45] Progger[46] for Linux and MS Windows, and SPADE for Linux, MS Windows, and MacOS.[47] Operating system level provenance have gained interest in the security customs notably to develop novel intrusion detection techniques.[48] Other implementations exist for specific programming and scripting languages, such as RDataTracker[49] for R, and NoWorkflow[50] for Python.
Whole-organisation provenance implementation for Linux [edit]
- PASS[51] – closed source – not maintained – kernel v2.half-dozen.X
- Howdy-Fi[52] – open source[53] – not maintained – kernel v3.2.x
- Flogger[54] – closed source – not maintained – kernel v2.6.x
- S2Logger[55] – closed source – not maintained – kernel v2.half-dozen.x
- LPM[56] – open source[57] – not maintained – kernel v2.6.10
- Progger[58] [46] [59] [60] – open up source[61] – not maintained – kernel v2.6.x and kernel v.4.xiv.x
- CamFlow[62] [63] [64] – open source[65] – maintained – kernel v5.15.X
Petrology [edit]
In the geologic utilize of the term, provenance instead refers to the origin or source expanse of particles within a rock, well-nigh commonly in sedimentary rocks. It does not refer to the circumstances of the collection of the rock. The provenance of sandstone, in particular, can be evaluated by determining the proportion of quartz, feldspar, and lithic fragments (encounter diagram).
Seed provenance [edit]
Seed provenance refers to the specified expanse in which plants that produced seed are located or were derived. Local provenancing is a position maintained by ecologists that suggests that but seeds of local provenance should be planted in a particular area. However, this view depends on the adaptationist program – a view that populations are universally locally adapted.[66] It is maintained that local seed is best adapted to local weather condition, and that outbreeding depression will be avoided. Evolutionary biologists suggest that strict adherence to provenance collecting is non a wise decision because:
- Local adaptation is not as common as assumed.[67]
- Groundwork population maladaptation can be driven by natural processes.[67]
- Man actions of habitat fragmentation drive maladaptation up and adaptive potential down.[68]
- Natural selection is changing rapidly due to climatic change.[69] and habitat fragmentation
- Population fragments are unlikely to divergence by natural selection since fragmentation (< 500 years). This leads to a low run a risk of outbreeding depression.[70]
Provenance trials, where material of different provenances are planted in a single place or at different locations spanning a range of environmental weather condition, is a mode to reveal genetic variation among provenances. It too contributes to an agreement of how dissimilar provenances respond to various climatic and environmental weather and tin as such contribute with noesis on how to strategically select provenances for climate alter adaptation.[71]
Computers and constabulary [edit]
The term provenance is used when ascertaining the source of goods such every bit computer hardware to appraise if they are genuine or counterfeit. Concatenation of custody is an equivalent term used in police, especially for show in criminal or commercial cases.
Software provenance encompasses the origin of software and its licensing terms. For example, when incorporating a complimentary, open source or proprietary software component in an application, one may wish to understand its provenance to ensure that licensing requirements are fulfilled and that other software characteristics tin exist understood.
Data provenance covers the provenance of computerized information. There are 2 master aspects of data provenance: ownership of the information and information usage. Ownership will tell the user who is responsible for the source of the data, ideally including information on the originator of the information. Data usage gives details regarding how the data has been used and modified and often includes information on how to cite the data source or sources. Information provenance is of particular business with electronic information, every bit information sets are often modified and copied without proper citation or acknowledgement of the originating data ready. Databases make information technology like shooting fish in a barrel to select specific information from data sets and merge this data with other information sources without any documentation of how the information was obtained or how information technology was modified from the original data set or sets.[33] The automatic analysis of information provenance graphs has been described every bit a hateful to verify compliance with regulations regarding data usage such every bit introduced by the EU GDPR.[72]
Secure Provenance refers to providing integrity and confidentiality guarantees to provenance information. In other words, secure provenance ways to ensure that history cannot exist rewritten, and users can specify who else tin look into their actions on the object.[73] [74]
A simple method of ensuring data provenance in calculating is to mark a file every bit read only. This allows the user to view the contents of the file, simply not edit or otherwise alter it. Read only can besides in some cases prevent the user from accidentally or intentionally deleting the file.
Run into also [edit]
- Certificate of origin
- Chronological dating
- Mail-digging analysis
- Traceability
References [edit]
- ^ OED: "The fact of coming from some particular source or quarter; source, derivation"
- ^ "Meliorate Condom Than Sorry: American Museums Take Measures Mindful of Repatriation of African Fine art", by Robin Scher, Art News, 11 June 2019
- ^ a b "Selected Archeological Terms". 10 Feb 2013. Archived from the original on 10 February 2013.
- ^ "Spoliation of Works of Fine art during the Holocaust and World State of war Two period". www.nationalmuseums.org.uk. National Museum Directors' Council Website. Retrieved 10 February 2019.
- ^ "A 20th Century Master Scam". Archived from the original on 2012-02-25. Retrieved 2012-03-06 .
- ^ http://www.talkauctions.com/a-2-6-1000000-lesson-nigh-provenance/
- ^ "Provenance of the collections". Royal Museum for Fundamental Africa - Tervuren - Kingdom of belgium . Retrieved 2022-01-01 .
{{cite web}}: CS1 maint: url-status (link) - ^ Reynolds, Lisa, An Art Provenance Research Guide available at University of N Carolina Master's Papers Archived 2012-07-07 at archive.today
- ^ "Cartellino". Glossary. London: The National Gallery. Retrieved 31 July 2018.
- ^ "Grade Reserves - nal-vam.on.worldcat.org". nal-vam.on.worldcat.org.
- ^ "The Art Earth in United kingdom 1660–1735". Retrieved 2021-01-22 .
- ^ "What's covered in the Indexes (Getty Research Institute)". www.getty.edu.
- ^ "Frick Art Reference Library". www.frick.org. The Frick Drove. Retrieved 10 February 2019.
- ^ "Netherlands Institute for Fine art History Databases". Archived from the original on 2012-09-16. Retrieved 2012-06-07 .
- ^ Dynasties, a catalogue of an exhibition at the Tate Gallery, Karen Hearn, page 158
- ^ Grosvenor, Bendor. "Art History News". www.arthistorynews.com.
- ^ Abukhanfusa, Kerstin; Sydbeck, January, eds. (1994). The Principle of Provenance: report from the First Stockholm Conference on Archival Theory and the Principle of Provenance, 2–3 September 1993. Stockholm: Swedish National Athenaeum. ISBN9789188366115.
- ^ Douglas, Jennifer (2010). "Origins: evolving ideas about the principle of provenance". In Eastwood, Terry; MacNeil, Heather (eds.). Currents of Archival Thinking. Santa Barbara, Calif.: Libraries Unlimited. pp. 23–43 (27–28). ISBN9781591586562.
- ^ Ross, Seamus (2012). "Digital Preservation, Archival Science and Methodological Foundations for Digital Libraries". New Review of Information Networking. 17 (i): 43–68 (esp. 50–53). doi:10.1080/13614576.2012.679446. S2CID 58540553.
- ^ "Provenance, Periodical of the Social club of Georgia Archivists".
- ^ a b Pearson, David (1998). Provenance Research in Book History: a Handbook. British Library. p. 132. ISBN978-0-7123-4598-9.
- ^ Pearson, David (2005). "Provenance and Rare Book Cataloguing: Its Importance and Its Challenges". In Shaw, David J. (ed.). Books and Their Owners: Provenance Information and The European Cultural Heritage. Consortium of European Research Libraries. pp. 1–ix. ISBN978-0-9541535-3-3.
- ^ Curwen, Tony & Jonsson, Gunilla (2007). "Provenance and the Itinerary of the Volume: Recording Provenance Information in On-line Catalogues". In Shaw, David J. (ed.). Imprints and Owners: Recording the Cultural Geography of Europe. Consortium of European Inquiry Libraries. pp. 31–47. ISBN978-0-9541535-vi-4.
- ^ Jackson, H. J. (2001). Marginalia: Readers Writing in Books. Yale University Press. p. 2. ISBN978-0-300-08816-8.
- ^ winepros.com.au. Oxford Companion to Wine. "ageing". Archived from the original on 2008-07-26. Retrieved 2008-04-28 .
- ^ Joyce, Rosemary A. (2012). "From Identify to Place: Provenience, Provenance, and Archaeology". In Feigenbaum, Gail; Jackson Reist, Inge (eds.). Provenance: An Alternate History of Fine art. Issues & Debates. Getty Research Institute. p. 48. ISBN978-1606061220.
- ^ a b c Hirst, G. Kris (Dec 22, 2016). "Provenience, Provenance, Let's Call the Whole Matter Off: What is the deviation in meaning between provenience and provenance?". ThoughtCo. Dotdash/IAC. Retrieved September 21, 2017.
- ^ "Glossary". PaleoPortal Collections Management. American Museum of Natural History. 2009. Retrieved September 21, 2017.
- ^ Altintas, I.; Berkley, C.; Jaeger, E.; Jones, One thousand.; Ludascher, B.; Mock South. (2004) "Kepler: An extensible organization for design and execution of scientific workflows". Proceedings of 16th International Briefing on Scientific and Statistical Database Direction, pp. 423–424
- ^ Pasquier, Thomas; Lau, Matthew K.; Trisovic, Ana; Boose, Emery R.; Couturier, Ben; Crosas, Mercè; Ellison, Aaron M.; Gibson, Valerie; Jones, Chris R.; Seltzer, Margo (5 September 2017). "If these data could talk". Scientific Data. 4: 170114. Bibcode:2017NatSD...470114P. doi:10.1038/sdata.2017.114. PMC5584398. PMID 28872630.
- ^ Boose, E.; Ellison, A.; Osterweil, L.; Clarke, 50.; Podorozhny, R., Hadley, J.; Wise, A.; Foster, D. (2007) Ensuring reliable datasets for ecology models and forecasts. Ecological Informatics, 2(3):237–247
- ^ Bates, Adam; Hassan, Wajih Ul (2019). "Can Information Provenance Put an Terminate to the Information Breach?". IEEE Security & Privacy. 17 (4): 88–93. doi:10.1109/MSEC.2019.2913693. S2CID 195832747.
- ^ a b Ma, Ten.; Fox, P.; Tilmes, C.; Jacobs, G.; Waple, A. (2014) Capturing and presenting provenance of global change information. Nature Climate Alter 4 (6), 409-413.
- ^ "Research Data Provenance IG". RDA. eleven September 2013.
- ^ Tan, Yu Shyang; Ko, Ryan 1000.L.; Holmes, Geoff (November 2013). "Security and Information Accountability in Distributed Systems: A Provenance Survey". 2013 IEEE 10th International Briefing on Loftier Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing. IEEE: 1571–1578. doi:10.1109/hpcc.and.euc.2013.221. ISBN9780769550886. S2CID 16890856.
- ^ "International Provenance and Annotation Workshop". International Provenance and Annotation Workshop . Retrieved x February 2019.
- ^ "TaPP 2015". workshops.inf.ed.air-conditioning.united kingdom . Retrieved 10 February 2019.
- ^ "PROV-Overview". www.w3.org.
- ^ "Provenance Web Services". openprovenance.org.
- ^ Moreau et al. (2008) The Open Provenance Model: An Overview, in J. Freire, D. Koop, and 50. Moreau (Eds.): IPAW 2008, LNCS 5272, pp. 323–326, 2008. Springer. [one]
- ^ Zhao, J. (2010) "Open up Provenance Model Vocabulary Specification", accessed 2016-04-09.
- ^ Lebo et al. (eds.) "PROV-O: The PROV Ontology", accessed 2016-04-09.
- ^ Belhajjame, Khalid (four April 2013). "W3C PROV Implementations: Preliminary Assay". Retrieved 10 Feb 2019.
- ^ CamFlow, a Linux security module past the Academy of Cambridge and Harvard University
- ^ Pasquier, Thomas; Han, Xueyuan; Goldstein, Marker; Moyer, Thomas; Eyers, David; Seltzer, Margo; Salary, Jean (2017). "Practical Whole-arrangement Provenance Capture". Proceedings of the 2017 Symposium on Cloud Calculating. SoCC '17. ACM: 405–418. arXiv:1711.05296. Bibcode:2017arXiv171105296P. doi:ten.1145/3127479.3129249. ISBN9781450350280. S2CID 4885447.
- ^ a b Li, Xin; Joshi, Chaitanya; Tan, Alan Yu Shyang; Ko, Ryan Kok Leong (Baronial 2015). "Inferring User Actions from Provenance Logs". 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE. ane: 742–749. doi:ten.1109/trustcom.2015.442. hdl:10289/9505. ISBN9781467379526. S2CID 1904317.
- ^ Gehani, Ashish (eight Feb 2019). "SPADE: Support for Provenance Auditing in Distributed Environments". Retrieved 10 February 2019 – via GitHub.
- ^ Han, Xueyuan; Pasquier, Thomas; Bates, Adam; Mickens, James; Seltzer, Margo (2020-02-26). "Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats". Network and Distributed Organization Security Symposium. arXiv:2001.01525. doi:x.14722/ndss.2020.24046. ISBN978-one-891562-61-vii.
- ^ "An R library to collect provenance from R scripts.: End-to-end-provenance/RDataTracker". 12 Dec 2018 – via GitHub.
- ^ "Supporting infrastructure to run scientific experiments without a scientific workflow management arrangement.: gems-uff/noworkflow". 19 December 2018 – via GitHub.
- ^ Muniswamy-Reddy, Kiran-Kumar; Kingdom of the netherlands, David; Seltzer, Margo (2006). "Provenance-Aware Storage Systems". USENIX 2006 Annual Technical Briefing Refereed Newspaper.
- ^ Pohly, Devin J.; McLaughlin, Stephen; McDaniel, Patrick; Butler, Kevin (2012). "Hi-Fi: Collecting Loftier-fidelity Whole-system Provenance". Proceedings of the 28th Almanac Computer Security Applications Conference. Acsac '12. ACM: 259–268. doi:10.1145/2420950.2420989. ISBN9781450313124. S2CID 5622944.
- ^ Pohly, Devin J. (xix August 2013). "Hi-Fi". GitHub.
- ^ Ko, Ryan 1000. L.; Jagadpramana, Peter; Lee, Bu Sung (November 2011). "Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments". 2011IEEE 10th International Briefing on Trust, Security and Privacy in Computing and Communications. IEEE: 765–771. doi:x.1109/trustcom.2011.100. ISBN9781457721359. S2CID 15858535.
- ^ Suen, Chun Hui; Ko, Ryan Thou.L.; Tan, Yu Shyang; Jagadpramana, Peter; Lee, Bu Sung (July 2013). "S2Logger: Cease-to-End Information Tracking Mechanism for Deject Data Provenance". 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. IEEE: 594–602. doi:10.1109/trustcom.2013.73. ISBN9780769550220. S2CID 504801.
- ^ Bates, Adam; Tian, Dave; Butler, Kevin R. B.; Moyer, Thomas (2015). "Trustworthy Whole-system Provenance for the Linux Kernel". Proceedings of the 24th USENIX Briefing on Security Symposium. SEC'15. USENIX Association: 319–334. ISBN9781931971232.
- ^ "uf_sensei / redhat-linux-provenance-release – Bitbucket". bitbucket.org.
- ^ Ko, Ryan K.L.; Volition, Mark A. (June 2014). "Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking". 2014 IEEE seventh International Conference on Cloud Computing. IEEE: 881–889. doi:x.1109/cloud.2014.121. hdl:10289/9018. ISBN9781479950638. S2CID 17536574.
- ^ Taha, Mohammad Thou. Bany; Chaisiri, Sivadon; Ko, Ryan K. Fifty. (August 2015). "Trusted Tamper-Axiomatic Data Provenance". 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE: 646–653. doi:10.1109/trustcom.2015.430. ISBN9781467379526. S2CID 10720318.
- ^ Garae, Jeffery; Ko, Ryan K.Fifty.; Chaisiri, Sivadon (August 2016). "UVisP: User-centric Visualization of Data Provenance with Gestalt Principles". 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE: 1923–1930. doi:10.1109/trustcom.2016.0294. hdl:10289/10996. ISBN9781509032051. S2CID 11231512.
- ^ "CROWLaboratory/Progger". GitHub . Retrieved 2018-08-04 .
- ^ Pasquier, Thomas; Singh, Jatinder; Eyers, David; Bacon, Jean (2015). "Camflow: Managed Data-Sharing for Cloud Services". IEEE Transactions on Deject Computing. five (iii): 472–484. arXiv:1506.04391. Bibcode:2015arXiv150604391P. doi:10.1109/TCC.2015.2489211. S2CID 11537746.
- ^ Pasquier, Thomas; Han, Xueyuan; Goldstein, Mark; Moyer, Thomas; Eyers, David; Seltzer, Margo; Salary, Jean (2017). "Applied Whole-organization Provenance Capture". Proceedings of the 2017 Symposium on Cloud Computing. SoCC '17. ACM: 405–418. arXiv:1711.05296. Bibcode:2017arXiv171105296P. doi:10.1145/3127479.3129249. ISBN9781450350280. S2CID 4885447.
- ^ Pasquier, Thomas; Han, Xueyuan; Moyer, Thomas; Bates, Adam; Hermant, Olivier; Eyers, David; Salary, Jean; Seltzer, Margo (14 October 2018). "Runtime Analysis of Whole-Organisation Provenance". 25th ACM Conference on Computer and Communications Security. arXiv:1808.06049. Bibcode:2018arXiv180806049P.
- ^ "CamFlow: Applied Linux Provenance". camflow.org.
- ^ Gould S. J.; Lewontin; R. C. (1979). "The Spandrels of San Marco and the Panglossian Epitome: A Critique of the Adaptationist Programme". Proceedings of the Regal Gild of London, Series B: Biological Sciences, 205: 581-598
- ^ a b Gould & Lewontin 1979
- ^ Willi Y, Van Buskirk J, Hoffmann AA (2006) Limits to the adaptive potential of pocket-sized populations. Almanac Review of Ecology, Evolution, and Systematics 37: 433-458.
- ^ Parmesan C (2006) Ecological and evolutionary responses to contempo climate change. Annual Review of Environmental, Evolution, and Systematics 37: 637-669.
- ^ Frankham R, Ballou J, Eldridge 1000, Lacy R, Ralls Yard, et al. (2011) Predicting the probability of outbreeding depression. Conservation Biological science.
- ^ Konnert, Thou., Fady, B., Gömöry, D., A'Hara, Due south., Wolter, F., Ducci, F. Koskela, J., Bozzano, M., Maaten, T. and Kowalczyk, J. (2015). "Use and transfer of forest reproductive material in Europe in the context of climate change" (PDF). European Forest Genetic Resources Plan (EUFORGEN), Bioversity International, Rome, Italy: xvi and 75 p.
{{cite journal}}: CS1 maint: multiple names: authors list (link) - ^ Pasquier, Thomas; Singh, Jatinder; Powles, Julia; Eyers, David; Seltzer, Margo; Salary, Jean (1 April 2018). "Data provenance to inspect compliance with privacy policy in the Internet of Things". Personal and Ubiquitous Calculating. 22 (2): 333–344. doi:10.1007/s00779-017-1067-four. ISSN 1617-4909. S2CID 4594884.
- ^ The Instance of the Imitation Picasso: Preventing History Forgery with Secure Provenance, Hasan et al., USENIX FAST 2009.
- ^ Xinlei (Oscar) Wang, Kai Zeng, Kannan Govindan and Prasant Mohapatra. (2012). "Chaining for securing data provenance in distributed information networks". In Proceedings of the IEEE International Conference for Military Communications. MILCOM '12. doi:ten.1109/MILCOM.2012.6415609.
{{cite conference}}: CS1 maint: multiple names: authors list (link)
Bibliography [edit]
Provenance in book studies
- Adams, Frederick B (1969). The Uses of Provenance. Berkeley: Academy of California.
- Myers, Robin; Harris, Michael; Mandelbrote, Giles, eds. (2007). Books on the move: tracking copies through collections and the volume trade. London: British Library. ISBN978-0-7123-0986-viii.
- Pearson, David (2019). Provenance Enquiry in Book History: a Handbook. London: Bodleian Library. ISBN978-0-7123-4598-ix.
- Shaw, David J., ed. (2005). Books and Their Owners: Provenance Information and the European Cultural Heritage. London: Consortium of European Inquiry Libraries. ISBN978-0-9541535-three-3.
- Shaw, David J., ed. (2007). Imprints and Owners: Recording the Cultural Geography of Europe. London: Consortium of European Research Libraries. ISBN978-0-9541535-6-iv.
External links [edit]
| | Look up provenance in Wiktionary, the gratuitous lexicon. |
- The National Gallery of Art Washington gives cursory provenances for most featured works
- EU Provenance Project - a engineering project that sought to support the electronic certification of information provenance
- W3C Provenance Working Group
- W3C Provenance Outreach Information
Source: https://en.wikipedia.org/wiki/Provenance
0 Response to "History Being Documented Through Art Artwork That Shows History"
Post a Comment