1. Barham, P.T., Donnelly, A., Isaacs, R., Mortier, R.: Using magpie for request extraction and workload modelling. In: OSDI, pp. 259–272 (2004)
2. Muniswamy-Reddy, K.-K. Seltzer, M.: Coping with cycles in provenance, http://www.eecs.harvard.edu/~syrah/pass/pubs/cycles.pdf
3. Braun, U., Shinnar, A.: A Security Model for Provenance. Technical Report TR-04-06, Harvard University (January 2006)
4. Cornell, B., Dinda, P., Bustamante, F.: Wayback: A User-level Versioning File System for Linux. In: Proceedings of the USENIX 2004 Annual Technical Conference, FREENIX Track (2004)
5. ClearCase, http://www.ibm.org/software/awdtools/clearcase