{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:30:59Z","timestamp":1761611459579,"version":"3.37.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319983783"},{"type":"electronic","value":"9783319983790"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98379-0_7","type":"book-chapter","created":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T09:23:06Z","timestamp":1536139386000},"page":"87-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Versioned-PROV: A PROV Extension to Support Mutable Data Entities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6680-7470","authenticated-orcid":false,"given":"Jo\u00e3o Felipe N.","family":"Pimentel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0978-2446","authenticated-orcid":false,"given":"Paolo","family":"Missier","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5173-1247","authenticated-orcid":false,"given":"Leonardo","family":"Murta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1184-8192","authenticated-orcid":false,"given":"Vanessa","family":"Braganholo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,6]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-642-17819-1_27","volume-title":"Provenance and Annotation of Data and Processes","author":"E Angelino","year":"2010","unstructured":"Angelino, E., Yamins, D., Seltzer, M.: StarFlow: a script-centric data analysis environment. In: McGuinness, D.L., Michaelis, J.R., Moreau, L. (eds.) IPAW 2010. LNCS, vol. 6378, pp. 236\u2013250. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-17819-1_27"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Costa, F., et al.: Capturing and querying workflow runtime provenance with ProV: a practical approach. In: Joint EDBT\/ICDT Workshops. ACM, Genoa (2013)","DOI":"10.1145\/2457317.2457365"},{"issue":"6","key":"7_CR3","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1145\/367766.368168","volume":"5","author":"RW Floyd","year":"1962","unstructured":"Floyd, R.W.: Algorithm 97: shortest path. Commun. ACM. 5(6), 345 (1962)","journal-title":"Commun. ACM."},{"key":"7_CR4","unstructured":"Garijo, D., Gil, Y.: Augmenting PROV with plans in P-PLAN: scientific processes as linked data. In: LISC, Boston, USA (2012)"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"12","DOI":"10.3390\/informatics5010012","volume":"5","author":"B Lerner","year":"2018","unstructured":"Lerner, B., et al.: Using introspection to collect provenance in R. Informatics 5(1), 12 (2018)","journal-title":"Informatics"},{"key":"7_CR6","unstructured":"Moreau, L., Missier, P.: PROV-DM: The PROV Data Model (2012). \nhttp:\/\/www.w3.org\/TR\/prov-dm\/"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-3-319-40593-3_7","volume-title":"Provenance and Annotation of Data and Processes","author":"DT Michaelides","year":"2016","unstructured":"Michaelides, D.T., Parker, R., Charlton, C., Browne, W.J., Moreau, L.: Intermediate notation for provenance and workflow reproducibility. In: Mattoso, M., Glavic, B. (eds.) IPAW 2016. LNCS, vol. 9672, pp. 83\u201394. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-40593-3_7"},{"key":"7_CR8","unstructured":"Missier, P., et al.: PROV-dictionary: modeling provenance for dictionary data structures. \nhttps:\/\/www.w3.org\/TR\/prov-dictionary\/"},{"key":"7_CR9","unstructured":"Missier, P., et al.: D-PROV: extending the PROV provenance model with workflow structure. In: TaPP. USENIX, Lombard (2013)"},{"key":"7_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-89965-5_31","volume-title":"Provenance and Annotation of Data and Processes","author":"L Moreau","year":"2008","unstructured":"Moreau, L., Freire, J., Futrelle, J., McGrath, R.E., Myers, J., Paulson, P.: The open provenance model: an overview. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol. 5272, pp. 323\u2013326. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-89965-5_31"},{"key":"7_CR11","unstructured":"Muniswamy-Reddy, K.K., et al.: Provenance-aware storage systems. In: USENIX Annual Technical Conference, pp. 43\u201356. USENIX, Boston (2006)"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-319-16462-5_6","volume-title":"Provenance and Annotation of Data and Processes","author":"L Murta","year":"2015","unstructured":"Murta, L., Braganholo, V., Chirigati, F., Koop, D., Freire, J.: noWorkflow: capturing and analyzing provenance of scripts. In: Lud\u00e4scher, B., Plale, B. (eds.) IPAW 2014. LNCS, vol. 8628, pp. 71\u201383. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-16462-5_6"},{"key":"7_CR13","unstructured":"Pimentel, J.F., et al.: Versioned-PROV. \nhttps:\/\/dew-uff.github.io\/versioned-prov\/"},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-40593-3_21","volume-title":"Provenance and Annotation of Data and Processes","author":"JF Pimentel","year":"2016","unstructured":"Pimentel, J.F., Freire, J., Murta, L., Braganholo, V.: Fine-grained provenance collection over scripts through program slicing. In: Mattoso, M., Glavic, B. (eds.) IPAW 2016. LNCS, vol. 9672, pp. 199\u2013203. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-40593-3_21"},{"key":"7_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/978-3-642-34222-6_25","volume-title":"Provenance and Annotation of Data and Processes","author":"A Runnalls","year":"2012","unstructured":"Runnalls, A., Silles, C.: Provenance tracking in R. In: Groth, P., Frew, J. (eds.) IPAW 2012. LNCS, vol. 7525, pp. 237\u2013239. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-34222-6_25"},{"key":"7_CR16","unstructured":"Tariq, D., et al.: Towards automated collection of application-level data provenance. In: TaPP. USENIX, Boston (2012)"}],"container-title":["Lecture Notes in Computer Science","Provenance and Annotation of Data and Processes"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98379-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,9,5]],"date-time":"2018-09-05T09:29:24Z","timestamp":1536139764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98379-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983783","9783319983790"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98379-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}