{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T19:48:57Z","timestamp":1766951337610,"version":"3.37.3"},"reference-count":23,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T00:00:00Z","timestamp":1519862400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"NSF Award","award":["#1640864"],"award-info":[{"award-number":["#1640864"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2018,3,1]]},"DOI":"10.1109\/tkde.2017.2769056","type":"journal-article","created":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T21:34:35Z","timestamp":1510004075000},"page":"599-612","source":"Crossref","is-referenced-by-count":7,"title":["Using Reenactment to Retroactively Capture Provenance for Transactions"],"prefix":"10.1109","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3194-3944","authenticated-orcid":false,"given":"Bahareh Sadat","family":"Arab","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7882-0565","authenticated-orcid":false,"given":"Dieter","family":"Gawlick","sequence":"additional","affiliation":[]},{"given":"Vasudha","family":"Krishnaswamy","sequence":"additional","affiliation":[]},{"given":"Venkatesh","family":"Radhakrishnan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2887-2452","authenticated-orcid":false,"given":"Boris","family":"Glavic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/357775.357777"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2274576.2274597"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989303"},{"key":"ref15","article-title":"On factorisation of provenance polynomials","author":"olteanu","year":"2011","journal-title":"Proc USENIX Workshop Theory Practice Provenance"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989302"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jal.2009.09.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.14778\/2095686.2095693"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32925-8_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/568271.223785"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2508020.2500127"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1412331.1412340"},{"key":"ref5","first-page":"29","article-title":"Recording provenance for SQL queries and updates","volume":"30","author":"vansummeren","year":"2007","journal-title":"Data Eng Bulletin"},{"key":"ref8","article-title":"A generic provenance middleware for database queries, updates, and\n transactions","author":"arab","year":"2014","journal-title":"Proc USENIX Workshop Theory Practice Provenance"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14778\/3137765.3137793"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-005-0156-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41660-6_16"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983825"},{"article-title":"Formal foundations of reenactment and transaction\n provenance","year":"2016","author":"arab","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.104"},{"key":"ref21","article-title":"Reenactment for read-committed snapshot isolation (long\n version)","author":"arab","year":"2016","journal-title":"CoRR"},{"key":"ref23","article-title":"Answering historical what-if queries with provenance, reenactment, and symbolic execution","author":"arab","year":"2017","journal-title":"Tappi"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/69\/8280528\/8097406-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/8280528\/08097406.pdf?arnumber=8097406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:49:06Z","timestamp":1649443746000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8097406\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,1]]},"references-count":23,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2017.2769056","relation":{},"ISSN":["1041-4347"],"issn-type":[{"type":"print","value":"1041-4347"}],"subject":[],"published":{"date-parts":[[2018,3,1]]}}}