1. Umut A. Acar, Amal Ahmed, James Cheney, and Roly Perera. 2012. A Core Calculus for Provenance. In Principles of Security and Trust. Springer, 410–429.
2. Umut A. Acar, Amal Ahmed, James Cheney, and Roly Perera. 2013. A core calculus for provenance. Journal of Computer Security 21 (2013), 919–969.
3. Bahareh Arab, Dieter Gawlick, Venkatesh Radhakrishnan, Hao Guo, and Boris Glavic. 2014. A Generic Provenance Middleware for Queries, Updates, and Transactions. In 6th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2014) . USENIX Association. https: //www.usenix.org/conference/tapp2014/agenda/presentation/arab
4. Peter Buneman, Sanjeev Khanna, and Wang-Chiew Tan. 2001. Why and Where: A Characterization of Data Provenance. In ICDT 2001 (LNCS) . Springer, 316–330.
5. Peter Buneman, Shamim A. Naqvi, Val Tannen, and Limsoon Wong. 1995. Principles of Programming with Complex Objects and Collection Types. Theor. Comp. Sci. 149, 1 (1995), 3–48.