Return to Article Details Symbiotic view of Provenance in Cyber Infrastrcuture and Information Security Download Download PDF