{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:10:53Z","timestamp":1725725453360},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380266"},{"type":"electronic","value":"9783642380273"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38027-3_6","type":"book-chapter","created":{"date-parts":[[2013,5,4]],"date-time":"2013-05-04T15:40:44Z","timestamp":1367682044000},"page":"48-58","source":"Crossref","is-referenced-by-count":0,"title":["Layering of the Provenance Data for Cloud Computing"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Imran","sequence":"first","affiliation":[]},{"given":"Helmut","family":"Hlavacs","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Deelman, E., Singh, G., Livny, M., Berriman, B., Good, J.: The cost of doing science on the cloud: The montage example (2008)","DOI":"10.1109\/SC.2008.5217932"},{"key":"6_CR2","first-page":"15","volume-title":"Experiences using cloud computing for a scientific workflow application","author":"J.S. V\u00f6ckler","year":"2011","unstructured":"V\u00f6ckler, J.S., Juve, G., Deelman, E., Rynge, M., Berriman, B.: Experiences using cloud computing for a scientific workflow application, pp. 15\u201324. ACM, USA (2011)"},{"key":"6_CR3","unstructured":"Barga, R.S., Simmhan, Y.L., Chinthaka, E., Sahoo, S.S.: Jackson: Provenance for scientific workflows towards reproducible research. IEEE Data Eng. Bull. (2010)"},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1057977.1057978","volume":"37","author":"R. Bose","year":"2005","unstructured":"Bose, R., Frew, J.: Lineage retrieval for scientific data processing: a survey. ACM Comput. Surv.\u00a037(1), 1\u201328 (2005)","journal-title":"ACM Comput. Surv."},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Simmhan, Y.L., Plale, B., Gannon, D.: A Survey of Data Provenance Techniques. Technical report, Computer Science Department, Indiana University (2005)","DOI":"10.1145\/1084805.1084812"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee: Above the Clouds: A Berkeley View of Cloud Computing (2009)","DOI":"10.1145\/1721654.1721672"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Imran, M., Hlavacs, H.: Applications of provenance data for cloud infrastructure. In: Eighth International Conference on Semantics, Knowledge and Grids (SKG), pp. 16\u201323 (2012)","DOI":"10.1109\/SKG.2012.21"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/978-3-540-89965-5_17","volume-title":"Provenance and Annotation of Data and Processes","author":"D. Crawl","year":"2008","unstructured":"Crawl, D., Altintas, I.: A provenance-based fault tolerance mechanism for scientific workflows. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol.\u00a05272, pp. 152\u2013159. Springer, Heidelberg (2008)"},{"key":"6_CR9","unstructured":"Miles, S., Groth, P., Branco, M., Moreau, L.: The requirements of recording and using provenance in e-Science experiments. Technical report (2005)"},{"issue":"4","key":"6_CR10","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1713254.1713258","volume":"43","author":"K.K. Muniswamy-Reddy","year":"2009","unstructured":"Muniswamy-Reddy, K.K., Seltzer, M.I.: Provenance as first class cloud data. Operating Systems Review\u00a043(4), 11\u201316 (2009)","journal-title":"Operating Systems Review"},{"key":"6_CR11","unstructured":"Muniswamy-Reddy, K.K., Macko, P., Seltzer, M.: Provenance for the cloud. In: FAST 2010, pp. 197\u2013210. USENIX Association (2010)"},{"key":"6_CR12","unstructured":"Imran, M., Hlavacs, H.: Provenance in the cloud: Why and how? In: The Third International Conference on Cloud Computing, GRIDs, and Virtualization, pp. 106\u2013112 (2012)"},{"key":"6_CR13","unstructured":"Margo, D.W., Seltzer, M.I.: The case for browser provenance. In: Workshop on the Theory and Practice of Provenance (2009)"},{"key":"6_CR14","unstructured":"Macko, P., Chiarini, M., Seltzer, M.: Collecting provenance via the xen hypervisor. In: Workshop on the Theory and Practice of Provenance (2011)"},{"key":"6_CR15","unstructured":"Muniswamy-Reddy, K.K., Braun, U., Holland, D.A., Macko, P.: Maclean: Layering in provenance systems. In: USENIX, USA (2009)"},{"key":"6_CR16","unstructured":"Muniswamy-Reddy, K.K., Holland, D.A., Braun, U., Seltzer, M.I.: Provenance-aware storage systems. In: USENIX, pp. 43\u201356 (2006)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Zhang, O.Q., Kirchberg, M., Ko, R.K.L., Lee, B.S.: How to track your data: The case for cloud computing provenance. In: CloudCom 2011, pp. 446\u2013453 (2011)","DOI":"10.1109\/CloudCom.2011.66"},{"key":"6_CR18","unstructured":"Imran, M., Hlavacs, H.: Provenance framework for the cloud environment (iaas). In: The Third International Conference on Cloud Computing, GRIDs, and Virtualization (2012)"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Youseff, L., Butrico, M., Da Silva, D.: Toward a Unified Ontology of Cloud Computing. In: Grid Computing Environments Workshop, GCE 2008, pp. 1\u201310 (2008)","DOI":"10.1109\/GCE.2008.4738443"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Rochwerger, B., Breitgand, D., Levy, E., Galis, A., Nagin, K.: The reservoir model and architecture for open federated cloud computing (2009)","DOI":"10.1147\/JRD.2009.5429058"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Wei, J., Zhang, X., Ammons, G., Bala, V., Ning, P.: Managing security of virtual machine images in a cloud environment. In: CCSW, pp. 91\u201396. ACM (2009)","DOI":"10.1145\/1655008.1655021"}],"container-title":["Lecture Notes in Computer Science","Grid and Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38027-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T02:32:13Z","timestamp":1644978733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38027-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380266","9783642380273"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38027-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}