SlideShare a Scribd company logo
PROV Quick Reference
cmtrim@us.ibm.com
 prov:Agent
– An agent is something that bears some form of
responsibility for an activity taking place, for the existence of
an entity, or for another agent's activity.
 prov:Entity
– An entity is a physical, digital, conceptual, or other kind of
thing with some fixed aspects; entities may be real or
imaginary.
 prov:Activity
– An activity is something that occurs over a period of time
and acts upon or with entities; it may include consuming,
processing, transforming, modifying, relocating, using, or
generating entities.
Key Definitions
Key Definitions
 Entity to Entity
– wasInfluencedBy (broad relation)
– wasDerivedFrom
 hadPrimarySource
 wasQuotedFrom
 wasRevisionOf
– alternateOf
 specializationOf
 Entity to Agent
– wasInfluencedBy (broad relation)
– wasAttributedTo
 Entity to Activity
– wasInfluencedBy (broad relation)
– wasGeneratedBy
– wasInvalidatedBy
Key Definitions
 Agent to Entity
– (none)
 Agent to Agent
– actedOnBehalfOf
 Agent to Activity
– (none)
Key Definitions
 Activity to Entity
– used
– wasEndedBy
– wasStartedBy
 Activity to Agent
– wasAssociatedWith
 Activity to Activity
– wasInformedBy
actedOnBehalfOf
 An object property to express the
accountability of an agent towards another
agent. The subordinate agent acted on
behalf of the responsible agent in an actual
activity.
Agent to Agent
alternateOf
 Two alternate entities present aspects of the
same thing. These aspects may be the same
or different, and the alternate entities may or
may not overlap in time
Entity to Entity
hadPrimarySource
 A primary source for a topic refers to something produced by some
agent with direct experience and knowledge about the topic, at the
time of the topic's study, without benefit from hindsight.
 Because of the directness of primary sources, they 'speak for
themselves' in ways that cannot be captured through the filter of
secondary sources. As such, it is important for secondary sources to
reference those primary sources from which they were derived, so that
their reliability can be investigated.
 A primary source relation is a particular case of derivation of
secondary materials from their primary sources. It is recognized that
the determination of primary sources can be up to interpretation, and
should be done according to conventions accepted within the
application's domain.
Entity to Entity
used
 A prov:Entity that was used by this
prov:Activity.
 For example,
:baking prov:used :spoon, :egg, :oven
Activity to Entity
wasAssociatedWith
 An prov:Agent that had some (unspecified)
responsibility for the occurrence of this
prov:Activity
Activity to Agent
wasAttributedTo
 Attribution is the ascribing of an entity to an
agent
Entity to Agent
wasDerivedFrom
 A derivation is a transformation of an entity
into another, an update of an entity resulting
in a new one, or the construction of a new
entity based on a pre-existing entity.
Entity to Entity
wasEndedBy
 End is when an activity is deemed to have
ended. An end may refer to an entity, known
as trigger, that terminated the activity
Activity to Entity
wasGeneratedBy
 Generation is the completion of production of
a new entity by an activity. This entity did not
exist before generation and becomes
available for usage after this generation.
Entity to Activity
wasInfluencedBy
 Because prov:wasInfluencedBy is a broad
relation, its more specific subproperties (e.g.
prov:wasInformedBy, prov:actedOnBehalfOf,
prov:wasEndedBy, etc.) should be used
when applicable.
(Activity, Agent, Entity)
wasInformedBy
 An activity a2 is dependent on or informed by
another activity a1, by way of some
unspecified entity that is generated by a1 and
used by a2
Activity to Activity
wasInvalidatedBy
 Invalidation is the start of the destruction,
cessation, or expiry of an existing entity by
an activity. The entity is no longer available
for use (or further invalidation) after
invalidation. Any generation or usage of an
entity precedes its invalidation.
Entity to Activity
wasQuotedFrom
 An entity is derived from an original entity by
copying, or 'quoting', some or all of it
Entity to Entity
wasRevisionOf
 A revision is a derivation that revises an
entity into a revised version
Entity to Entity
wasStartedBy
 Start is when an activity is deemed to have
started. A start may refer to an entity, known
as trigger, that initiated the activity.
Activity to Entity

More Related Content

More from Craig Trim

IBM Bluemix - Building a Project with Maven
IBM Bluemix - Building a Project with MavenIBM Bluemix - Building a Project with Maven
IBM Bluemix - Building a Project with Maven
Craig Trim
 
Question Types in Natural Language Processing
Question Types in Natural Language ProcessingQuestion Types in Natural Language Processing
Question Types in Natural Language Processing
Craig Trim
 
Jenkins on Docker
Jenkins on DockerJenkins on Docker
Jenkins on Docker
Craig Trim
 
IBM Bluemix: Creating a Git Project
IBM Bluemix: Creating a Git ProjectIBM Bluemix: Creating a Git Project
IBM Bluemix: Creating a Git Project
Craig Trim
 
Octave - Prototyping Machine Learning Algorithms
Octave - Prototyping Machine Learning AlgorithmsOctave - Prototyping Machine Learning Algorithms
Octave - Prototyping Machine Learning Algorithms
Craig Trim
 
The Onomyicon
The OnomyiconThe Onomyicon
The Onomyicon
Craig Trim
 
Dependency parsing (2013)
Dependency parsing (2013)Dependency parsing (2013)
Dependency parsing (2013)
Craig Trim
 
Inference using owl 2.0 semantics
Inference using owl 2.0 semanticsInference using owl 2.0 semantics
Inference using owl 2.0 semantics
Craig Trim
 
An Introduction to the Jena API
An Introduction to the Jena APIAn Introduction to the Jena API
An Introduction to the Jena API
Craig Trim
 
The art of tokenization
The art of tokenizationThe art of tokenization
The art of tokenizationCraig Trim
 
Deep Parsing (2012)
Deep Parsing (2012)Deep Parsing (2012)
Deep Parsing (2012)
Craig Trim
 

More from Craig Trim (11)

IBM Bluemix - Building a Project with Maven
IBM Bluemix - Building a Project with MavenIBM Bluemix - Building a Project with Maven
IBM Bluemix - Building a Project with Maven
 
Question Types in Natural Language Processing
Question Types in Natural Language ProcessingQuestion Types in Natural Language Processing
Question Types in Natural Language Processing
 
Jenkins on Docker
Jenkins on DockerJenkins on Docker
Jenkins on Docker
 
IBM Bluemix: Creating a Git Project
IBM Bluemix: Creating a Git ProjectIBM Bluemix: Creating a Git Project
IBM Bluemix: Creating a Git Project
 
Octave - Prototyping Machine Learning Algorithms
Octave - Prototyping Machine Learning AlgorithmsOctave - Prototyping Machine Learning Algorithms
Octave - Prototyping Machine Learning Algorithms
 
The Onomyicon
The OnomyiconThe Onomyicon
The Onomyicon
 
Dependency parsing (2013)
Dependency parsing (2013)Dependency parsing (2013)
Dependency parsing (2013)
 
Inference using owl 2.0 semantics
Inference using owl 2.0 semanticsInference using owl 2.0 semantics
Inference using owl 2.0 semantics
 
An Introduction to the Jena API
An Introduction to the Jena APIAn Introduction to the Jena API
An Introduction to the Jena API
 
The art of tokenization
The art of tokenizationThe art of tokenization
The art of tokenization
 
Deep Parsing (2012)
Deep Parsing (2012)Deep Parsing (2012)
Deep Parsing (2012)
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

PROV Overview

  • 2.  prov:Agent – An agent is something that bears some form of responsibility for an activity taking place, for the existence of an entity, or for another agent's activity.  prov:Entity – An entity is a physical, digital, conceptual, or other kind of thing with some fixed aspects; entities may be real or imaginary.  prov:Activity – An activity is something that occurs over a period of time and acts upon or with entities; it may include consuming, processing, transforming, modifying, relocating, using, or generating entities. Key Definitions
  • 3. Key Definitions  Entity to Entity – wasInfluencedBy (broad relation) – wasDerivedFrom  hadPrimarySource  wasQuotedFrom  wasRevisionOf – alternateOf  specializationOf  Entity to Agent – wasInfluencedBy (broad relation) – wasAttributedTo  Entity to Activity – wasInfluencedBy (broad relation) – wasGeneratedBy – wasInvalidatedBy
  • 4. Key Definitions  Agent to Entity – (none)  Agent to Agent – actedOnBehalfOf  Agent to Activity – (none)
  • 5. Key Definitions  Activity to Entity – used – wasEndedBy – wasStartedBy  Activity to Agent – wasAssociatedWith  Activity to Activity – wasInformedBy
  • 6. actedOnBehalfOf  An object property to express the accountability of an agent towards another agent. The subordinate agent acted on behalf of the responsible agent in an actual activity. Agent to Agent
  • 7. alternateOf  Two alternate entities present aspects of the same thing. These aspects may be the same or different, and the alternate entities may or may not overlap in time Entity to Entity
  • 8. hadPrimarySource  A primary source for a topic refers to something produced by some agent with direct experience and knowledge about the topic, at the time of the topic's study, without benefit from hindsight.  Because of the directness of primary sources, they 'speak for themselves' in ways that cannot be captured through the filter of secondary sources. As such, it is important for secondary sources to reference those primary sources from which they were derived, so that their reliability can be investigated.  A primary source relation is a particular case of derivation of secondary materials from their primary sources. It is recognized that the determination of primary sources can be up to interpretation, and should be done according to conventions accepted within the application's domain. Entity to Entity
  • 9. used  A prov:Entity that was used by this prov:Activity.  For example, :baking prov:used :spoon, :egg, :oven Activity to Entity
  • 10. wasAssociatedWith  An prov:Agent that had some (unspecified) responsibility for the occurrence of this prov:Activity Activity to Agent
  • 11. wasAttributedTo  Attribution is the ascribing of an entity to an agent Entity to Agent
  • 12. wasDerivedFrom  A derivation is a transformation of an entity into another, an update of an entity resulting in a new one, or the construction of a new entity based on a pre-existing entity. Entity to Entity
  • 13. wasEndedBy  End is when an activity is deemed to have ended. An end may refer to an entity, known as trigger, that terminated the activity Activity to Entity
  • 14. wasGeneratedBy  Generation is the completion of production of a new entity by an activity. This entity did not exist before generation and becomes available for usage after this generation. Entity to Activity
  • 15. wasInfluencedBy  Because prov:wasInfluencedBy is a broad relation, its more specific subproperties (e.g. prov:wasInformedBy, prov:actedOnBehalfOf, prov:wasEndedBy, etc.) should be used when applicable. (Activity, Agent, Entity)
  • 16. wasInformedBy  An activity a2 is dependent on or informed by another activity a1, by way of some unspecified entity that is generated by a1 and used by a2 Activity to Activity
  • 17. wasInvalidatedBy  Invalidation is the start of the destruction, cessation, or expiry of an existing entity by an activity. The entity is no longer available for use (or further invalidation) after invalidation. Any generation or usage of an entity precedes its invalidation. Entity to Activity
  • 18. wasQuotedFrom  An entity is derived from an original entity by copying, or 'quoting', some or all of it Entity to Entity
  • 19. wasRevisionOf  A revision is a derivation that revises an entity into a revised version Entity to Entity
  • 20. wasStartedBy  Start is when an activity is deemed to have started. A start may refer to an entity, known as trigger, that initiated the activity. Activity to Entity

Editor's Notes

  1. The more specific subproperties of prov:wasDerivedFrom (i.e., prov:wasQuotedFrom, prov:wasRevisionOf, prov:hadPrimarySource) should be used when applicable.
  2. The sub-properties of prov:wasInfluencedBy can be elaborated in more detail using the Qualification Pattern. For example, the binary relation :baking prov:used :spoon can be qualified by asserting :baking prov:qualifiedUsage [ a prov:Usage; prov:entity :spoon; prov:atLocation :kitchen ] . Subproperties of prov:wasInfluencedBy may also be asserted directly without being qualified. prov:wasInfluencedBy should not be used without also using one of its subproperties.