{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:15:41Z","timestamp":1746159341828,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_40","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T14:26:22Z","timestamp":1391783182000},"page":"451-460","source":"Crossref","is-referenced-by-count":0,"title":["Making an Application Provenance-Aware through UML \u2013 A General Scheme"],"prefix":"10.1007","author":[{"given":"P.","family":"Badharudheen","sequence":"first","affiliation":[]},{"given":"Anu Mary","family":"Chacko","sequence":"additional","affiliation":[]},{"given":"S. D.","family":"Madhu Kumar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","unstructured":"Vahdat, A., Anderson, T.: Transparent result caching. In: Proceedings of the Annual Conference on USENIX Annual Technical Conference, ATEC 1998, p. 3. USENIX Association, Berkeley (1998)"},{"key":"40_CR2","unstructured":"Zhao, J., Goble, C., Greenwood, M., Wroe, C., Stevens, R.: Annotating, linking, and browsing provenance logs for e-science. In: Proc. of the Workshop on Semantic Web Technologies for Searching and Retrieving Scientific Data, pp. 158\u2013176 (2003)"},{"key":"40_CR3","unstructured":"Lanter, D.P.: Lineage in GIS: The Problem and a Solution. Technical paper. National Center for Geographic Information and Analysis (1990)"},{"key":"40_CR4","doi-asserted-by":"crossref","unstructured":"Foster, I., Vockler, J., Wilde, M., Zhao, Y.: Chimera: a virtual data system for representing, querying, and automating data derivation. In: Proceedings of the 14th International Conference on Scientific and Statistical Database Management, pp. 37\u201346 (2002)","DOI":"10.1109\/SSDM.2002.1029704"},{"key":"40_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/3-540-44503-X_20","volume-title":"Database Theory - ICDT 2001","author":"P. Buneman","year":"2000","unstructured":"Buneman, P., Khanna, S., Tan, W.-C.: Why and Where: A Characterization of Data Provenance. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.\u00a01973, p. 316. Springer, Heidelberg (2000)"},{"key":"40_CR6","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1145\/1066157.1066296","volume-title":"Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD 2005","author":"L. Chiticariu","year":"2005","unstructured":"Chiticariu, L., Tan, W.-C., Vijayvargiya, G.: DBNotes: a post-it system for relational databases based on provenance. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data, SIGMOD 2005, pp. 942\u2013944. ACM, New York (2005)"},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Miles, S., Groth, P., Munroe, S., Moreau, L.: Prime: A Methodology for Developing Provenance-aware Applications. ACM Trans. Softw. Eng. Methodol.\u00a020(3), 8:1\u20138:42 (2011)","DOI":"10.1145\/2000791.2000792"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Badharudheen, P., Chacko, A.M., Madhukumar, S.D.: A Scheme for Generating Provenance-aware Applications Through UML. International Journal of Management and Information Technology\u00a06(3) (2013)","DOI":"10.24297\/ijmit.v6i3.725"},{"key":"40_CR9","doi-asserted-by":"crossref","unstructured":"Lanceloti, L.A., Maldonado, J.C., Gimenes, I.M.S., Oliveira Jr., E.A.: Smartyparser: a xmi parser for uml-based software product line variability models. In: Proceedings of the Seventh International Workshop on Variability Modelling of Software-intensive Systems, VaMoS 2013, pp. 10:1\u201310:5. ACM, New York (2013)","DOI":"10.1145\/2430502.2430516"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T20:17:47Z","timestamp":1746130667000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_40","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}