Provenance Explained

Provenance is the chronology of the ownership, custody or location of a historical object.[1] The term was originally mostly used in relation to works of art, but is now used in similar senses in a wide range of fields, including archaeology, paleontology, archival science, economy, computing, and scientific inquiry in general.

The primary purpose of tracing the provenance of an object or entity is normally to provide contextual and circumstantial evidence for its original production or discovery, by establishing, as far as practicable, its later history, especially the sequences of its formal ownership, custody and places of storage. The practice has a particular value in helping authenticate objects. Comparative techniques, expert opinions and the results of scientific tests may also be used to these ends, but establishing provenance is essentially a matter of documentation. The term dates to the 1780s in English. Provenance is conceptually comparable to the legal term chain of custody.

For museums and the art trade, in addition to helping establish the authorship and authenticity of an object, provenance has become increasingly important in helping establish the moral and legal validity of a chain of custody, given the increasing amount of looted art. These issues first became a major concern regarding works that had changed hands in Nazi-controlled areas in Europe before and during World War II. Many museums began compiling pro-active registers of such works and their history. Recently the same concerns have come to prominence for works of African art, often exported illegally, and antiquities from many parts of the world, but currently especially in Iraq, and then Syria.[2]

In archaeology and paleontology, the derived term provenience is used with a related but very particular meaning, to refer to the location (in modern research, recorded precisely in three dimensions) where an artifact or other ancient item was found.[3] Provenance covers an object's complete documented history. An artifact may thus have both a provenience and a provenance.

Works of art and antiques

The provenance of works of fine art, antiques and antiquities is of great importance, especially to their owner. There are a number of reasons why painting provenance is important, which mostly also apply to other types of fine art. A good provenance increases the value of a painting, and establishing provenance may help confirm the date, artist and, especially for portraits, the subject of a painting. It may confirm whether a painting is genuinely of the period it seems to date from. The provenance of paintings can help resolve ownership disputes. For example, provenance between 1933 and 1945 can determine whether a painting was looted by the Nazis.[4]

Many galleries are putting a great deal of effort into researching the provenance of paintings in their collections for which there is no firm provenance during that period.[4] Documented evidence of provenance for an object can help to establish that it has not been altered and is not a forgery, a reproduction, stolen or looted art. Provenance helps assign the work to a known artist, and a documented history can be of use in helping to prove ownership. An example of a detailed provenance is given in the Arnolfini portrait.

The quality of provenance of an important work of art can make a considerable difference to its selling price in the market. This is affected by the degree of certainty of the provenance, the status of past owners as collectors, and in many cases by the strength of evidence that an object has not been illegally excavated or exported from another country. The provenance of a work of art may vary greatly in length, depending on context or the amount that is known, from a single name to an entry in a scholarly catalogue some thousands of words long.

An expert certification can mean the difference between an object having no value and being worth a fortune. Certifications themselves may be open to question. Jacques van Meegeren forged the work of his father Han van Meegeren, who had forged the work of Vermeer. Jacques sometimes produced a certificate with his forgeries, stating that a work was created by his father.

John Drewe was able to pass off as genuine paintings, a large number of forgeries that would have easily been recognised as such by scientific examination. He established an impressive, but false provenance. Because of this, galleries and dealers accepted the paintings as genuine. He created this false provenance by forging letters and other documents, including false entries in earlier exhibition catalogues.[5]

Sometimes provenance can be as simple as a photograph of the item with its original owner. Simple yet definitive documentation such as that can increase its value by an order of magnitude, but only if the owner was of high renown. Many items that were sold at auction have gone far past their estimates because of a photograph showing that item with a famous person. Some examples include antiques owned by politicians, musicians, artists, actors, etc.[6]

In the context of discussions about the restitution of cultural objects in museum collections of colonial origin, the AfricaMuseum in Belgium started to publicly present information about such objects in its permanent exhibition in 2021.[7]

Researching the provenance of paintings

The objective of provenance research is to produce a complete list of owners (together, where possible, with the supporting documentary proof) from when the painting was commissioned or in the artist's studio through to the present time. In practice, there are likely to be gaps in the list and documents that are missing or lost. The documented provenance should also list when the painting has been part of an exhibition and a bibliography of when it has been discussed, or illustrated in print.

Where the research is proceeding backwards, to discover the previous provenance of a painting whose current ownership and location are known, it is important to record the physical details of the painting – style, subject, signature, materials, dimensions, frame, etc.[8] The titles of paintings and the attribution to a particular artist may change over time. The size of the work and its description can be used to identify earlier references to the painting.

The back of a painting can contain significant provenance information. There may be exhibition marks, dealer stamps, gallery labels and other indications of previous ownership. There may be shipping labels. In the BBC TV programme Fake or Fortune? the provenance of the painting Bords de la Seine à Argenteuil was investigated using a gallery sticker and shipping label on the back. Early provenance can sometimes be indicated by a cartellino, a trompe-l'œil representation of an inscribed label, added to the front of a painting.[9] However, these can be forged, or can fade or be painted over.

Auction records are an important resource to assist in researching the provenance of paintings.

If a painting has been in private hands for an extended period and on display in a stately home, it may be recorded in an inventory – for example, the Lumley inventory.[15] The painting may also have been noticed by a visitor who subsequently wrote about it. It may have been mentioned in a will or a diary. Where the painting has been bought from a dealer, or changed hands in a private transaction, there may be a bill of sale or sales receipt that provides evidence of provenance. Where the artist is known, there may be a French: [[catalogue raisonné]] listing all the artist's known works and their location at the time of writing. A database of French: catalogues raisonné is available at the International Foundation for Art Research.[16]

Historic photos of the painting may be discussed and illustrated in a more general work on the artist, period or genre. Similarly, a photograph of a painting may show inscriptions (or a signature) that subsequently became lost as a result of overzealous restoration. Conversely, a photograph may show that an inscription was not visible at an earlier date. One of the disputed aspects of the "Rice" portrait of Jane Austen concerns apparent inscriptions identifying artist and sitter.[16]

Archives

Provenance – also known as custodial history – is a core concept within archival science and archival processing. The term refers to the individuals, groups, or organizations that originally created or received the items in an accumulation of records, and to the items' subsequent chain of custody.[17] The principle of provenance, also termed the principle of "archival integrity", and a major strand in the broader principle of respect des fonds, stipulates that records originating from a common source, or fonds, should be kept together – where practicable, physically, but in all cases intellectually, in the way in which they are catalogued and arranged in finding aids.

Conversely, records of different provenance should be preserved and documented separately. In archival practice, proof of provenance is provided by the operation of control systems that document the history of records kept in archives, including details of amendments made to them. The authority of an archival document or set of documents of which the provenance is uncertain, because of gaps in the recorded chain of custody, will be considered to be severely compromised.

The principles of archival provenance were developed in the 19th century by both French and Prussian archivists, and gained widespread acceptance on the basis of their formulation in the Manual for the Arrangement and Description of Archives by Dutch state archivists Samuel Muller, J. A. Feith, and R. Fruin, published in the Netherlands in 1898, often referred to as the "Dutch Manual".[18]

Seamus Ross has argued a case for adapting established principles and theories of archival provenance to the field of modern digital preservation and curation.[19]

Provenance is also the title of the journal published by the Society of Georgia Archivists.[20]

Books

In the case of books, the study of provenance refers to the study of the ownership of individual copies of books. It is usually extended to include the study of the circumstances in which individual copies of books have changed ownership, and of evidence left in books that shows how readers interacted with them.[21] [22]

Provenance studies may shed light on the books themselves, providing evidence of the role particular titles have played in social, intellectual and literary history. Such studies may also add to our knowledge of particular owners of books. For instance, looking at the books owned by a writer may help to show which works influenced him or her.

Many provenance studies are historically focused, and concentrated on books owned by writers, politicians and public figures. The recent ownership of books is studied, however, as is evidence of how ordinary or anonymous readers have interacted with books.[23] [24]

Provenance can be studied both by examining the books themselves, for instance looking at inscriptions, marginalia, bookplates, book rhymes, and bindings, and by reference to external sources of information such as auction catalogues.[21]

Pianos

Provenance for pianos is authenticated before a piano is inducted into a museum,[25] sold at an auction, or appraised for an estate or legal action, when it has extraordinary value in connection to a composer, performer, event or location that has become famous.[26] [27] For example, the piano that Wolfgang Amadeus Mozart used during the final 10 years of his life, is on display in the Mozarteum[28] Museum in Salzberg, one of many historical pianos in museums around the world. The 300,000th Steinway piano that was presented to President Franklin D. Roosevelt by Theodore Steinway, on behalf of the Steinway family[29] is on display in the White House. It is one of many pianos with a provenance that have extraordinary value because of art, sculpture or design incorporated into the cabinet. It has legs carved into golden eagles and figures painted on the body of the piano.

For a piano, provenance can be established by starting with the authentication of the brand of manufacture and serial number, which will usually identify age. Then bills of sale, tuning records, bills of lading,[30] concert programs that identify a piano by serial number, letters, famous signatures inside or on the outside of a piano, statements under oath in a court of law and photographs can all help authenticate a piano's provenance.

Piano Provenance and Valuation

Pianos can sell for millions of dollars, when the provenance is significant enough to increase its value well beyond what it would be worth as a musical instrument alone.[31] [32]

When decisions need to be made in a court of law for a bankruptcy, or before a piano goes up for auction, or when an educational institution needs to establish a value for a deed of trust being established with the gift of a piano, then experts are usually hired to authenticate the piano's provenance.

Piano provenance has emerged as a field of study with experts having college degrees in some specialty connected to the piano or to art combined with professional training and experience in the field.

Most experts belong to some form of association. For example, Karen Earle Lile niece of Tony Terran and Kendall Ross Bean, members of the Preservations Artisans Guild,[33] were chosen [34] by Mercersburg Academy to research and authenticate the provenance of the Lennon-Ono-Green-Warhol piano before it was put up for sale to fund a Deed of Trust by the Shaool Family to Mercersburg Academy for future student scholarships.[35] Because this piano was part of a famous lawsuit in 2000 and had extensive coverage as the "Lost Lennon Piano",[36] when provenance research done by Lile was revealed by the Alex Cooper Auctioneers to the public, the provenance became the subject of dozens of newspapers and magazines that picked up the story.[37] [38] [39]

In the case of sculpture or art that are incorporated into the piano's cabinet, experts might be come from the field of art valuation and belong to an appraiser society such as the American Society of Appraisers or the International Society of Appraisers.[40]

Wines

In transactions of old wine with the potential of improving with age, the issue of provenance has a large bearing on the assessment of the contents of a bottle, both in terms of quality and the risk of wine fraud. A documented history of wine cellar conditions is valuable in estimating the quality of an older vintage due to the fragile nature of wine.[41]

Recent technology developments have aided collectors in assessing the temperature and humidity history of the wine which are two key components in establishing perfect provenance. For example, there are devices available that rest inside the wood case and can be read through the wood by waving a smartphone equipped with a simple app. These devices track the conditions the case has been exposed to for the duration of the battery life, which can be as long as 15 years, and sends a graph and high/low readings to the smartphone user. This takes the trust issue out of the hands of the owner and gives it to a third party for verification.

Science

Archaeology, anthropology, and paleontology

Archaeology and anthropology researchers use provenience to refer to the exact location or find spot of an artifact, a bone or other remains, a soil sample, or a feature within an ancient site, whereas provenance covers an object's complete documented history. Ideally, in modern excavations, the provenience is recorded in three dimensions on a site grid with great precision, and may also be recorded on video to provide additional proof and context. In older work, often undertaken by amateurs, only the general site or approximate area may be known, especially when an artifact was found outside a professional excavation and its specific position not recorded. The term provenience appeared in the 1880s, about a century after provenance. Outside of academic contexts, it has been used as a synonymous variant spelling of provenance, especially in American English.

Any given antiquity may have both a provenience, where it was found, and a provenance, where it has been since it was found. A summary of the distinction is that "provenience is a fixed point, while provenance can be considered an itinerary that an object follows as it moves from hand to hand."[42] Another metaphor is that provenience is an artifact's "birthplace", while provenance is its "résumé".[43] This can be imprecise. Many artifacts originated as trade goods created in one region, but were used and finally deposited in another.

Aside from scientific precision, a need for the distinction in these fields has been described thus:

In this context, the provenance can occasionally be the detailed history of where an object has been since its creation, as in art history contexts – not just since its modern finding. In some cases, such as where there is an inscription on the object, or an account of it in written materials from the same era, an object of study in archaeology or cultural anthropology may have an early provenance – a known history that predates modern research – then a provenience from its modern finding, and finally a continued provenance relating to its handling and storage or display after the modern acquisition.

Evidence of provenance in the more general sense can be of importance in archaeology. Fakes are not unknown, and finds are sometimes removed from the context in which they were found without documentation, reducing their value to science. Even when apparently discovered in situ, archaeological finds are treated with caution. The provenience of a find may not be properly represented by the context in which it was found, e.g. due to stratigraphic layers being disturbed by erosion, earthquakes, or ancient reconstruction or other disturbance at a site.

Artifacts can be moved through looting as well as trade, far from their place of origin and long before modern rediscovery. Many source nations have passed legislation forbidding the domestic trade in cultural heritage. Further research is often required to establish the true provenance and legal status of a find, and what the relationship is between the exact provenience and the overall provenance.

In paleontology and paleoanthropology, it is recognized that fossils can also move from their primary context and are sometimes found, apparently in-situ, in deposits to which they do not belong because they have been moved, for example, by the erosion of nearby but different outcrops. It is unclear how strictly paleontology maintains the provenience and provenance distinction. For example, a short glossary at a website, primarily aimed at young students, of the American Museum of Natural History treats the terms as synonymous,[44] while scholarly paleontology works make frequent use of provenience in the same precise sense as used in archaeology and paleoanthropology.

While exacting details of a find's provenience are primarily of use to scientific researchers, most natural history and archaeology museums also make strenuous efforts to record how the items in their collections were acquired. These records are often of use in helping to establish a chain of provenance.

Data provenance

Scientific research is generally held to be of good provenance when it is documented in detail sufficient to allow reproducibility.[45] [46] Scientific workflow systems assist scientists and programmers with tracking their data through all transformations, analyses, and interpretations. Data sets are reliable when the processes used to create them are reproducible and analyzable for defects.[47] Security researchers are interested in data provenance because it can analyze suspicious data and make large opaque systems transparent.[48]

Current initiatives to effectively manage, share, and reuse ecological data are indicative of the increasing importance of data provenance. Examples of these initiatives are National Science Foundation Datanet projects, DataONE and Data Conservancy, as well as the U.S. Global Change Research Program.[49] Some international academic consortia, such as the Research Data Alliance, have specific groups to tackle issues of provenance. In that case it is the Research Data Provenance Interest Group.[50]

Computer science

Within computer science, informatics uses the term "provenance"[51] to mean the lineage of data, as per data provenance, with research in the last decade extending the conceptual model of causality and relation to include processes that act on data and agents that are responsible for those processes. See, for example, the proceedings of the International Provenance Annotation Workshop (IPAW)[52] and Theory and Practice of Provenance (TaPP).[53] Semantic web standards bodies, including the World Wide Web Consortium in 2014, have ratified a standard data model for provenance representation known as PROV[54] which draws from many of the better-known provenance representation systems that preceded it, such as the Proof Markup Language and the Open Provenance Model.[55]

Interoperability is a design goal of most recent computer science provenance theories and models, for example the Open Provenance Model (OPM) 2008 generation workshop aimed at "establishing inter-operability of systems" through information exchange agreements.[56] Data models and serialisation formats for delivering provenance information typically reuse existing metadata models where possible to enable this. Both the OPM Vocabulary[57] and the PROV Ontology[58] make extensive use of metadata models such as Dublin Core and Semantic Web technologies such as the Web Ontology Language (OWL). Current practice is to rely on the W3C PROV data model, OPM's successor.[59]

There are several maintained and open-source provenance capture implementation at the operating system level such as CamFlow,[60] [61] Progger[62] for Linux and MS Windows, and SPADE for Linux, MS Windows, and MacOS.[63] Operating system level provenance have gained interest in the security community notably to develop novel intrusion detection techniques.[64] Other implementations exist for specific programming and scripting languages, such as RDataTracker[65] for R, and NoWorkflow[66] for Python.

Whole-system provenance implementation for Linux

Petrology

See also: Provenance (geology). In the geologic use of the term, provenance instead refers to the origin or source area of particles within a rock, most commonly in sedimentary rocks. It does not refer to the circumstances of the collection of the rock. The provenance of sandstone, in particular, can be evaluated by determining the proportion of quartz, feldspar, and lithic fragments (see diagram).

Seed provenance

Seed provenance refers to the geographic location of a parent plant, from which seeds were collected. In the context of ecological restoration, seed provenancing refers to a seed-sourcing strategy that focuses on the geographic location of seed sources, as each provenance can describe the genetic material from that location.[82] Local provenancing is a position maintained by ecologists that suggests that only seeds of local provenance should be planted in a particular area. However, this view depends on the adaptationist program – a view that populations are universally locally adapted.[83] It is maintained that local seed is best adapted to local conditions, and that outbreeding depression will be avoided. Evolutionary biologists suggest that strict adherence to provenance collecting is not a wise decision because:

  1. Local adaptation is not as common as assumed.[84]
  2. Background population maladaptation can be driven by natural processes.[84]
  3. Human actions of habitat fragmentation drive maladaptation up and adaptive potential down.[85]
  4. Natural selection is changing rapidly due to climate change.[86] and habitat fragmentation
  5. Population fragments are unlikely to divergence by natural selection since fragmentation (< 500 years). This leads to a low risk of outbreeding depression.[87]

Provenance trials, where material of different provenances are planted in a single place or at different locations spanning a range of environmental conditions, is a way to reveal genetic variation among provenances. It also contributes to an understanding of how different provenances respond to various climatic and environmental conditions and can as such contribute with knowledge on how to strategically select provenances for climate change adaptation.[88]

Computers and law

The term provenance is used when ascertaining the source of goods such as computer hardware to assess if they are genuine or counterfeit. Chain of custody is an equivalent term used in law, especially for evidence in criminal or commercial cases.

Software provenance encompasses the origin of software and its licensing terms. For example, when incorporating a free, open source or proprietary software component in an application, one may wish to understand its provenance to ensure that licensing requirements are fulfilled and that other software characteristics can be understood.

Data provenance covers the provenance of computerized data. There are two main aspects of data provenance: ownership of the data and data usage. Ownership will tell the user who is responsible for the source of the data, ideally including information on the originator of the data. Data usage gives details regarding how the data has been used and modified and often includes information on how to cite the data source or sources.

Data provenance is of particular concern with electronic data, as data sets are often modified and copied without proper citation or acknowledgement of the originating data set. Databases make it easy to select specific information from data sets and merge this data with other data sources without any documentation of how the data was obtained or how it was modified from the original data set or sets.The automated analysis of data provenance graphs has been described as a mean to verify compliance with regulations regarding data usage such as introduced by the EU GDPR.[89]

Secure Provenance refers to providing integrity and confidentiality guarantees to provenance information. In other words, secure provenance means to ensure that history cannot be rewritten, and users can specify who else can look into their actions on the object.[90] [91]

A simple method of ensuring data provenance in computing is to mark a file as read only. This allows the user to view the contents of the file, but not edit or otherwise modify it. Read only can also in some cases prevent the user from accidentally or intentionally deleting the file.

See also

Bibliography

Provenance in book studies

Nazi-Era Provenance Research

External links

Notes and References

  1. OED

    "The fact of coming from some particular source or quarter; source, derivation"

  2. https://www.artnews.com/2019/06/11/african-art-repatriation-american-museums/ "Better Safe Than Sorry: American Museums Take Measures Mindful of Repatriation of African Art"
  3. Web site: Selected Archeological Terms. https://web.archive.org/web/20130210004312/http://www.nps.gov/history/seac/terms.htm. dead. 10 February 2013. 10 February 2013.
  4. Web site: Spoliation of Works of Art during the Holocaust and World War II period . National Museum Directors' Council Website . www.nationalmuseums.org.uk . 10 February 2019 .
  5. Web site: A 20th Century Master Scam. 2012-03-06. https://web.archive.org/web/20120225051837/http://www.museum-security.org/myatt-drewe.htm. 2012-02-25. dead.
  6. Web site: A $2.6 Million Lesson About Provenance | Talk Auctions . 2014-08-24 . 2014-08-26 . https://web.archive.org/web/20140826161233/http://www.talkauctions.com/a-2-6-million-lesson-about-provenance/ . dead .
  7. Web site: Provenance of the collections. 2022-01-01. Royal Museum for Central Africa - Tervuren - Belgium. en.
  8. Reynolds, Lisa, An Art Provenance Research Guide available at University of North Carolina Master's Papers
  9. Web site: Cartellino . The National Gallery . London . Glossary . 31 July 2018 .
  10. Web site: Course Reserves - nal-vam.on.worldcat.org. nal-vam.on.worldcat.org.
  11. Web site: The Art World in Britain 1660–1735. 2021-01-22.
  12. Web site: What's covered in the Indexes (Getty Research Institute). www.getty.edu.
  13. Web site: Frick Art Reference Library . The Frick Collection. www.frick.org . 10 February 2019 .
  14. Web site: Netherlands Institute for Art History Databases . 2012-06-07 . https://web.archive.org/web/20120916233914/http://english.rkd.nl/Databases . 2012-09-16 . dead .
  15. Dynasties, a catalogue of an exhibition at the Tate Gallery, Karen Hearn, page 158
  16. Web site: Art History News . Bendor . Grosvenor . Bendor Grosvenor . www.arthistorynews.com.
  17. Book: Kerstin . Abukhanfusa . Jan . Sydbeck . The Principle of Provenance: report from the First Stockholm Conference on Archival Theory and the Principle of Provenance, 2–3 September 1993 . Stockholm . Swedish National Archives . 1994 . 9789188366115 .
  18. Book: Douglas, Jennifer . 2010 . Origins: evolving ideas about the principle of provenance . Currents of Archival Thinking . Terry . Eastwood . Terry Eastwood . Heather . MacNeil . Santa Barbara, Calif. . Libraries Unlimited . 9781591586562 . 23–43 (27–28) .
  19. Ross . Seamus . 2012 . Digital Preservation, Archival Science and Methodological Foundations for Digital Libraries . New Review of Information Networking . 17 . 1 . 43–68 (esp. 50–53) . 10.1080/13614576.2012.679446 . 58540553 .
  20. Web site: Provenance, Journal of the Society of Georgia Archivists .
  21. Book: Pearson, David . Provenance Research in Book History: a Handbook . British Library . 1998 . 132 . 978-0-7123-4598-9 .
  22. Book: Pearson, David . Provenance and Rare Book Cataloguing: Its Importance and Its Challenges . 1–9. Shaw, David J. . Books and Their Owners: Provenance Information and The European Cultural Heritage . . 2005 . 978-0-9541535-3-3.
  23. Book: Curwen, Tony . Jonsson, Gunilla . amp . Provenance and the Itinerary of the Book: Recording Provenance Data in On-line Catalogues . 31–47. Shaw, David J. . Imprints and Owners: Recording the Cultural Geography of Europe . Consortium of European Research Libraries . 2007 . 978-0-9541535-6-4.
  24. Book: Jackson, H. J. . Marginalia: Readers Writing in Books . Yale University Press . 2001 . 2 . 978-0-300-08816-8 .
  25. Web site: Partridge . Kenneth . 15 Famous Pianos That You Can Visit . MentalFloss.com . 15 September 2016 . Mental Floss NY . 15 September 2016.
  26. News: John Lennon's Historic Baldwin Concert Grand Piano Up For Auction In Towson . 4 September 2023 . Newspaper . Hunt Valley Life . 2 August 2023.
  27. News: John Lennon at 80: George Michael-owned Imagine piano put on display. 4 September 2023 . Newspaper . BBC News . BBC . 7 October 2020.
  28. Web site: Official Website . Mozarteum.at . 4 September 2023.
  29. Web site: Treasures of the White House . White House History . The White House Historical Society . 4 September 2023.
  30. News: What is a Bill of Lading? Why's it so important? . 5 September 2023 . Trucker's News . 1 September 2021.
  31. News: Schrader . Adam . This Piano—Purchased by John Lennon, Gifted to Sam Green, Then Loaned to Andy Warhol—Could Ring Up $3 Million at Auction . 4 September 2023 . Online Magazine . Art Net News . Art Net . 7 August 2023.
  32. News: Staff . Hunt Valley . John Lennon's Historic Baldwin Concert Grand Piano Up For Auction In Towson.
  33. News: HIDDEN STORIES OF ICONIC LOST LENNON-ONO-GREEN-WARHOL PIANO . 4 September 2023 . Preservation Artisans Guild . 29 August 2023.
  34. News: Fusek . Maggie . Lennon, Ono, Warhol Linked To Lost Baldwin by Bay Area Experts: The story behind the iconic Lennon-Ono-Green-Warhol piano valued over $3 million and how a Walnut Creek-based pair proved its authenticity. . 4 September 2023 . Patch . 2 September 2023.
  35. News: Burris . Taj . Owned by John Lennon, lost after Andy Warhol, a piano finds itself on auction in Towson . 4 September 2023 . Newspaper . The Baltimore Banner . The Venetoulis Institute for Local Journalism . 27 August 2023.
  36. News: Gregorian . Dareh . LENNON'S PAL WANTS $1.6M FOR 'LOST' PIANO . 5 September 2023 . New York Post . 28 May 2000.
  37. News: Cassady . Daniel . A Grand Piano Once Owned by John Lennon Is Coming Up for Sale . 5 September 2023 . ARTnews . artnews.com . 28 July 2023.
  38. News: Pianos belonging to Freddie Mercury and John Lennon set to be auctioned off... but for how much? . 5 September 2023 . 14 August 2023.
  39. News: Grosskrueger . Amanda . Lennon-Ono-Green-Warhol Piano Lost and Found, Now Up for Auction In Which County? . 5 September 2023 . Online Newspaper . Conduit Street . Maryland Association of Counties . 10 August 2023.
  40. Web site: Official Website . International Society of Appraisers . 4 September 2023.
  41. winepros.com.au. Web site: Oxford Companion to Wine. ageing. 2008-04-28. https://web.archive.org/web/20080726225615/http://www.winepros.com.au/jsp/cda/reference/oxford_entry.jsp?entry_id=30. 2008-07-26. dead.
  42. Book: Joyce, Rosemary A. . From Place to Place: Provenience, Provenance, and Archaeology . Provenance: An Alternate History of Art . Gail . Feigenbaum . Inge . Jackson Reist . 2012 . 48 . Getty Research Institute . Issues & Debates . 978-1606061220.
  43. Web site: Provenience, Provenance, Let's Call the Whole Thing Off: What is the difference in meaning between provenience and provenance? . K. Kris . Hirst . December 22, 2016 . ThoughtCo . Dotdash/IAC . September 21, 2017.
  44. Web site: Glossary . American Museum of Natural History . PaleoPortal Collections Management . . 2009 . September 21, 2017.
  45. Altintas, I.; Berkley, C.; Jaeger, E.; Jones, M.; Ludascher, B.; Mock S. (2004) "Kepler: An extensible system for design and execution of scientific workflows". Proceedings of 16th International Conference on Scientific and Statistical Database Management, pp. 423–424
  46. Pasquier. Thomas. Lau. Matthew K.. Trisovic. Ana. Boose. Emery R.. Couturier. Ben. Crosas. Mercè. Ellison. Aaron M.. Gibson. Valerie. Jones. Chris R.. Seltzer. Margo. If these data could talk. Scientific Data. 5 September 2017. 4. 170114. 10.1038/sdata.2017.114. 28872630. 5584398. 2017NatSD...470114P.
  47. Boose, E.; Ellison, A.; Osterweil, L.; Clarke, L.; Podorozhny, R., Hadley, J.; Wise, A.; Foster, D. (2007) Ensuring reliable datasets for environmental models and forecasts. Ecological Informatics, 2(3):237–247
  48. Bates. Adam. Hassan. Wajih Ul. 2019. Can Data Provenance Put an End to the Data Breach?. IEEE Security & Privacy. 17. 4. 88–93. 10.1109/MSEC.2019.2913693. 195832747. free.
  49. Ma, X.; Fox, P.; Tilmes, C.; Jacobs, K.; Waple, A. (2014) Capturing and presenting provenance of global change information. Nature Climate Change 4 (6), 409-413.
  50. Web site: Research Data Provenance IG. 11 September 2013. RDA.
  51. Book: Tan. Yu Shyang. Ko. Ryan K.L.. Holmes. Geoff. 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing . Security and Data Accountability in Distributed Systems: A Provenance Survey . November 2013. 1571–1578. en-US. IEEE. 10.1109/hpcc.and.euc.2013.221. 9780769550886. 16890856.
  52. Web site: International Provenance and Annotation Workshop . International Provenance and Annotation Workshop . 10 February 2019 .
  53. Web site: TaPP 2015. workshops.inf.ed.ac.uk . 10 February 2019 .
  54. Web site: PROV-Overview. www.w3.org.
  55. Web site: Provenance Web Services. openprovenance.org.
  56. Moreau et al. (2008) The Open Provenance Model: An Overview, in J. Freire, D. Koop, and L. Moreau (Eds.): IPAW 2008, LNCS 5272, pp. 323–326, 2008. Springer. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.148.7394&amp;rep=rep1&amp;type=pdf
  57. Zhao, J. (2010) "Open Provenance Model Vocabulary Specification", accessed 2016-04-09.
  58. Lebo et al. (eds.) "PROV-O: The PROV Ontology", accessed 2016-04-09.
  59. Web site: W3C PROV Implementations: Preliminary Analysis. Khalid . Belhajjame. 4 April 2013. 10 February 2019 .
  60. http://camflow.org/ CamFlow
  61. Book: Pasquier . Thomas . Han . Xueyuan . Goldstein . Mark . Moyer . Thomas . Eyers . David . Seltzer . Margo . Bacon . Jean . Proceedings of the 2017 Symposium on Cloud Computing . Practical whole-system provenance capture . SoCC '17 . 2017. 405–418. 10.1145/3127479.3129249. https://dl.acm.org/citation.cfm?id=3129249&CFID=815806448&CFTOKEN=34069737 . ACM. 9781450350280 . 1711.05296 . 2017arXiv171105296P . 4885447 .
  62. Book: Li . Xin . Joshi . Chaitanya. Tan. Alan Yu Shyang. Ko. Ryan Kok Leong. 2015 IEEE Trustcom/BigDataSE/ISPA . Inferring User Actions from Provenance Logs . August 2015 . 1 . 742–749 . en-US. IEEE. 10.1109/trustcom.2015.442. 9781467379526. 10289/9505 . 1904317 . free.
  63. Web site: SPADE: Support for Provenance Auditing in Distributed Environments . Ashish . Gehani . 8 February 2019 . GitHub . 10 February 2019 .
  64. Han . Xueyuan . Pasquier . Thomas . Bates . Adam . Mickens . James . Seltzer . Margo . Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats . Network and Distributed System Security Symposium . 2020-02-26 . 10.14722/ndss.2020.24046. 2001.01525 . 978-1-891562-61-7 . free .
  65. Web site: An R library to collect provenance from R scripts.: End-to-end-provenance/RDataTracker. 12 December 2018. GitHub.
  66. Web site: Supporting infrastructure to run scientific experiments without a scientific workflow management system.: gems-uff/noworkflow. 19 December 2018. GitHub.
  67. Muniswamy-Reddy. Kiran-Kumar. Holland. David. Seltzer. Margo. Provenance-Aware Storage Systems. USENIX 2006 Annual Technical Conference Refereed Paper. 2006.
  68. Book: Pohly. Devin J.. McLaughlin. Stephen. McDaniel. Patrick. Butler. Kevin. Proceedings of the 28th Annual Computer Security Applications Conference . Hi-Fi . Acsac '12. 2012. 259–268. 10.1145/2420950.2420989. https://dl.acm.org/citation.cfm?doid=2420950.2420989. ACM. 9781450313124. 5622944.
  69. Web site: Pohly. Devin J.. Hi-Fi. GitHub. 19 August 2013.
  70. Book: Ko. Ryan K. L.. Jagadpramana. Peter. Lee. Bu Sung. 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications . Flogger: A File-Centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments . November 2011. 765–771. en-US. IEEE. 10.1109/trustcom.2011.100. 9781457721359. 15858535.
  71. Book: Suen. Chun Hui. Ko. Ryan K.L.. Tan. Yu Shyang. Jagadpramana. Peter. Lee. Bu Sung. 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications . S2Logger: End-to-End Data Tracking Mechanism for Cloud Data Provenance . July 2013. 594–602. en-US. IEEE. 10.1109/trustcom.2013.73. 9780769550220. 504801.
  72. Bates. Adam. Tian. Dave. Butler. Kevin R. B.. Moyer. Thomas. Trustworthy Whole-system Provenance for the Linux Kernel. Proceedings of the 24th USENIX Conference on Security Symposium. SEC'15. 2015. 319–334. USENIX Association. 9781931971232.
  73. Web site: uf_sensei / redhat-linux-provenance-release – Bitbucket. bitbucket.org. en.
  74. Book: Ko. Ryan K.L.. Will. Mark A.. 2014 IEEE 7th International Conference on Cloud Computing . Progger: An Efficient, Tamper-Evident Kernel-Space Logger for Cloud Data Provenance Tracking . June 2014. 881–889. en-US. IEEE. 10.1109/cloud.2014.121. 9781479950638. 10289/9018. 17536574. free.
  75. Book: Taha. Mohammad M. Bany. Chaisiri. Sivadon. Ko. Ryan K. L.. 2015 IEEE Trustcom/BigDataSE/ISPA . Trusted Tamper-Evident Data Provenance . August 2015. 646–653. en-US. IEEE. 10.1109/trustcom.2015.430. 9781467379526. 10720318.
  76. Book: Garae. Jeffery. Ko. Ryan K.L.. Chaisiri. Sivadon. 2016 IEEE Trustcom/BigDataSE/ISPA . UVisP: User-centric Visualization of Data Provenance with Gestalt Principles . August 2016. 1923–1930. en-US. IEEE. 10.1109/trustcom.2016.0294. 9781509032051. 10289/10996. 11231512. free.
  77. Web site: CROWLaboratory/Progger. GitHub. en. 2018-08-04.
  78. Pasquier. Thomas. Singh. Jatinder. Eyers. David. Bacon. Jean. Camflow: Managed Data-Sharing for Cloud Services. IEEE Transactions on Cloud Computing. 2015. 5. 3. 472–484. 10.1109/TCC.2015.2489211. 1506.04391. 2015arXiv150604391P. 11537746.
  79. Book: Pasquier. Thomas. Han. Xueyuan. Goldstein. Mark. Moyer. Thomas. Eyers. David. Seltzer. Margo. Bacon. Jean. Proceedings of the 2017 Symposium on Cloud Computing . Practical whole-system provenance capture . SoCC '17. 2017. 405–418. 10.1145/3127479.3129249. https://dl.acm.org/citation.cfm?id=3129249&CFID=829730322&CFTOKEN=15897970. ACM. 9781450350280. 1711.05296. 2017arXiv171105296P. 4885447.
  80. Pasquier . Thomas . Han . Xueyuan . Moyer . Thomas . Bates . Adam . Hermant . Olivier . Eyers . David . Bacon . Jean . Seltzer . Margo . Runtime Analysis of Whole-System Provenance . 25th ACM Conference on Computer and Communications Security . 14 October 2018 . 1808.06049 . 2018arXiv180806049P .
  81. Web site: CamFlow: Practical Linux Provenance. camflow.org.
  82. Breed . Martin F . Harrison . Peter A . Bischoff . Armin . Durruty . Paula . Gellie . Nick J C . Gonzales . Emily K . Havens . Kayri . Kayri Havens . Karmann . Marion . Kilkenny . Francis F . Krauss . Siegfried L . Lowe . Andrew J . Marques . Pedro . Nevill . Paul G . Vitt . Pati L . Bucharova . Anna . 2018-06-13 . Priority Actions to Improve Provenance Decision-Making . BioScience . 68 . 7 . 510–516 . 10.1093/biosci/biy050 . 0006-3568.
  83. Gould S. J.; Lewontin; R. C. (1979). "The Spandrels of San Marco and the Panglossian Paradigm: A Critique of the Adaptationist Programme". Proceedings of the Royal Society of London, Series B: Biological Sciences, 205: 581-598
  84. Gould & Lewontin 1979
  85. Willi Y, Van Buskirk J, Hoffmann AA (2006) Limits to the adaptive potential of small populations. Annual Review of Ecology, Evolution, and Systematics 37: 433-458.
  86. Parmesan C (2006) Ecological and evolutionary responses to recent climate change. Annual Review of Ecology, Evolution, and Systematics 37: 637-669.
  87. Frankham R, Ballou J, Eldridge M, Lacy R, Ralls K, et al. (2011) Predicting the probability of outbreeding depression. Conservation Biology.
  88. Konnert, M., Fady, B., Gömöry, D., A'Hara, S., Wolter, F., Ducci, F. Koskela, J., Bozzano, M., Maaten, T. and Kowalczyk, J.. Use and transfer of forest reproductive material in Europe in the context of climate change. European Forest Genetic Resources Programme (EUFORGEN), Bioversity International, Rome, Italy. 2015. xvi and 75 p.
  89. Pasquier . Thomas . Singh . Jatinder . Powles . Julia . Eyers . David . Seltzer . Margo . Bacon . Jean . Data provenance to audit compliance with privacy policy in the Internet of Things . Personal and Ubiquitous Computing . 1 April 2018 . 22 . 2 . 333–344 . 10.1007/s00779-017-1067-4 . 4594884 . 1617-4909.
  90. http://www.usenix.org/events/fast09/tech/full_papers/hasan/hasan_html/index.html The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance
  91. Chaining for securing data provenance in distributed information networks . Xinlei (Oscar) Wang, Kai Zeng, Kannan Govindan and Prasant Mohapatra. . In Proceedings of the IEEE International Conference for Military Communications. . 2012 . 1–6 . MILCOM '12 . 10.1109/MILCOM.2012.6415609. 978-1-4673-1731-3 .