A. For each of the two papers:
1. Write a one-paragraph summary of the paper.
2. Comment on one thing you think is particularly worth noting and/or discussing about the paper.
B. Give a few example application scenarios or application domains where data provenance may be helpful.
C. Discuss what are the threats to ensuring the integrity (or privacy) of provenance logs, and what are the potential solutions.