{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:51:06Z","timestamp":1756896666471},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319164618"},{"type":"electronic","value":"9783319164625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16462-5_25","type":"book-chapter","created":{"date-parts":[[2015,3,20]],"date-time":"2015-03-20T17:27:58Z","timestamp":1426872478000},"page":"242-253","source":"Crossref","is-referenced-by-count":2,"title":["Engineering Choices for Open World Provenance"],"prefix":"10.1007","author":[{"given":"M.","family":"David Allen","sequence":"first","affiliation":[]},{"given":"Adriane","family":"Chapman","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"Blaustein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,21]]},"reference":[{"unstructured":"Provenance Challenge (2010). http:\/\/twiki.ipaw.info\/bin\/view\/Challenge\/","key":"25_CR1"},{"unstructured":"Transaction Processing Performance Council (2013). http:\/\/www.tpc.org\/","key":"25_CR2"},{"doi-asserted-by":"crossref","unstructured":"Al-Khalifa, S., Yu, C., Jagadish, H.V.: Querying structured text in an XML database. In: SIGMOD (2003)","key":"25_CR3","DOI":"10.1145\/872760.872761"},{"unstructured":"Allen, M.D., Chapman, A., Blaustein, B., Seligman, L.: Getting it together: enabling multi-organization provenance exchange. In: TaPP (2011)","key":"25_CR4"},{"doi-asserted-by":"crossref","unstructured":"Anand, M.K., Bowers, S., McPhillips, T., Ludascher, B.: Efficient provenance storage over nested data collections. In: EDBT, pp. 958\u2013969 (2009)","key":"25_CR5","DOI":"10.1145\/1516360.1516470"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1016\/j.datak.2010.03.005","volume":"69","author":"SL Artem Chebotko","year":"2010","unstructured":"Artem Chebotko, S.L., Fei, X., Fotouhi, F.: RDFPROV: a relational RDF store for querying and managing scientific workflow provenance. Data Knowl. Eng. 69, 836\u2013865 (2010)","journal-title":"Data Knowl. Eng."},{"unstructured":"Belhajjame, K., Gomez-Perez, J.M., Sahoo, S.: ProvBench (2013). https:\/\/sites.google.com\/site\/provbench\/provbench-at-bigprov-13","key":"25_CR7"},{"doi-asserted-by":"crossref","unstructured":"Belhajjame, K., Zhao, J., Garijo, D., Garrido, A., Soiland-Reyes, S., Alper, P., Corcho, O.: A workflow PROV-corpus based on taverna and wings. In: Khalid Belhajjame, J.M.G.-P., Sahoo, S. (ed.) ProvBench (2013)","key":"25_CR8","DOI":"10.1145\/2457317.2457376"},{"unstructured":"Benjelloun, O., Sarma, A.D., Halevy, A., Widom, J.: ULDBs: databases with uncertainty and lineage. In: VLDB, pp. 953\u2013964, Seoul, Korea (2006)","key":"25_CR9"},{"doi-asserted-by":"crossref","unstructured":"Blaustein, B., Chapman, A., Seligman, L., Allen, M.D., Rosenthal, A.: Surrogate parenthood: protected and informative graphs. In: PVLDB (2010)","key":"25_CR10","DOI":"10.14778\/2002974.2002979"},{"unstructured":"Chapman, A., Allen, M.D., Blaustein, B.: It\u2019s about the data: provenance as a tool for assessing data fitness. In: TaPP (2012)","key":"25_CR11"},{"doi-asserted-by":"crossref","unstructured":"Chapman, A., Blaustein, B.T., Seligman, L., Allen, M.D.: PLUS: a provenance manager for integrated information. In: IEEE Computer Information Reuse and Integration (2011)","key":"25_CR12","DOI":"10.1109\/IRI.2011.6009558"},{"unstructured":"Dey, M. Agun, M. Wang, Lud\u00e4scher, B., Bowers, S., Missier, P.: A provenance repository for storing and retrieving data lineage information. Technical Report, DataONE Provenance and Workflow Working Group (2011)","key":"25_CR13"},{"doi-asserted-by":"crossref","unstructured":"Foster, J.N., Green, T.J., Tannen, V.: Annotated XML: queries and provenance. In: PODS, pp. 271\u2013280 (2008)","key":"25_CR14","DOI":"10.1145\/1376916.1376954"},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1002\/cpe.1247","volume":"20","author":"J Frew","year":"2008","unstructured":"Frew, J., Metzger, D., Slaughter, P.: Automatic capture and reconstruction of computational provenance. Concurr. Comput. Pract. Exper. 20, 485\u2013496 (2008)","journal-title":"Concurr. Comput. Pract. Exper."},{"unstructured":"L. M. R. G. Jr., M. Wilde, Mattoso, M., Foster, I.: Provenance traces of the swift parallel scripting system. In: Khalid Belhajjame, J.Z., Gomez-Perez, J.M., Sahoo, S. (ed.) ProvBench (2013)","key":"25_CR16"},{"unstructured":"Mason, C.: Cryptographic Binding of Metadata. National Security Agency\u2019s Review of Emerging Technologies, vol. 18 (2009)","key":"25_CR17"},{"doi-asserted-by":"crossref","unstructured":"Missier, P., Chen, Z.: Extracting PROV provenance traces from Wikipedia history pages. In: EDBT (2013)","key":"25_CR18","DOI":"10.1145\/2457317.2457375"},{"doi-asserted-by":"crossref","unstructured":"Missier, P., Embury, S.M., Greenwood, M., Preece, A., Jin, B.: Managing information quality in e-science: the qurator workbench. In: SIGMOD, pp. 1150\u20131152 (2007)","key":"25_CR19","DOI":"10.1145\/1247480.1247638"},{"key":"25_CR20","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-79450-6","volume-title":"Provenance An Introduction to PROV","author":"L Moreau","year":"2013","unstructured":"Moreau, L., Groth, P.: Provenance An Introduction to PROV. Morgan & Claypool Publishers, San Rafael (2013)"},{"key":"25_CR21","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1002\/cpe.1233","volume":"20","author":"L Moreau","year":"2008","unstructured":"Moreau, L., Lud\u00e4scher, B., et al.: Special issue: the first provenance challenge. Concurr. Comput. Pract. Experience 20, 409\u2013418 (2008)","journal-title":"Concurr. Comput. Pract. Experience"},{"unstructured":"NIST, Descriptions of SHA-256, SHA-384, and SHA-512 (2001)","key":"25_CR22"},{"doi-asserted-by":"crossref","unstructured":"Park, H., Ikeda, R., Widom, J.: RAMP: A system for capturing and tracing provenance in MapReduce workflows. In: VLDB (2011)","key":"25_CR23","DOI":"10.14778\/3402755.3402768"},{"unstructured":"Rivest, R.: The MD5 message-digest algorithm. IETF Working Memo (1992). http:\/\/tools.ietf.org\/html\/rfc1321","key":"25_CR24"},{"key":"25_CR25","volume-title":"Graph Databases","author":"I Robinson","year":"2013","unstructured":"Robinson, I., Webber, J., Eifrem, E.: Graph Databases. O\u2019Reilly Media Inc, Sebastopol (2013)"},{"unstructured":"Rosenthal, A., Seligman, L., Chapman, A., Blaustein, B.: Scalable access controls for lineage. In: Theory and Practice of Provenance (2008)","key":"25_CR26"},{"doi-asserted-by":"crossref","unstructured":"Scheidegger, C.E., Vo, H.T., Koop, D., Freire, J., Silva, C.: Querying and re-using workflows with VisTrails. In: SIGMOD (2008)","key":"25_CR27","DOI":"10.1145\/1376616.1376747"},{"unstructured":"W3C, Provenance Data Model (2013). http:\/\/www.w3.org\/TR\/prov-dm\/","key":"25_CR28"},{"key":"25_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/11426639_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"X Wang","year":"2005","unstructured":"Wang, X., Yu, H.: How to break MD5 and other hash functions. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 19\u201335. Springer, Heidelberg (2005)"},{"key":"25_CR30","doi-asserted-by":"publisher","first-page":"w557","DOI":"10.1093\/nar\/gkt328","volume":"41","author":"K Wolstencroft","year":"2013","unstructured":"Wolstencroft, K., Haines, R., et al.: The taverna workflow suite: designing and executing workflows of web services on the desktop, web or in the cloud. Nucleic Acids Res. 41, w557\u2013w561 (2013)","journal-title":"Nucleic Acids Res."},{"doi-asserted-by":"crossref","unstructured":"Xiey, Y., Muniswamy-Reddy, K.-K., Fengy, D., Liz, Y., Longz, D.D.E., Tany, Z., Chen, L.: A hybrid approach for efficient provenance storage. In: CIKM (2012)","key":"25_CR31","DOI":"10.1145\/2396761.2398511"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data and Processes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16462-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,8]],"date-time":"2023-08-08T22:40:35Z","timestamp":1691534435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-16462-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319164618","9783319164625"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16462-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}