{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:35:11Z","timestamp":1759638911444,"version":"3.41.0"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2011,8]]},"abstract":"<jats:p>Provenance refers to the past processes that brought about a given (version of an) object, item or entity. By knowing the provenance of data, users can often better understand, trust, reproduce, and validate it. A provenance-aware application has the functionality to answer questions regarding the provenance of the data it produces, by using documentation of past processes. PrIMe is a software engineering technique for adapting application designs to enable them to interact with a provenance middleware layer, thereby making them provenance-aware. In this article, we specify the steps involved in applying PrIMe, analyze its effectiveness, and illustrate its use with two case studies, in bioinformatics and medicine.<\/jats:p>","DOI":"10.1145\/2000791.2000792","type":"journal-article","created":{"date-parts":[[2011,8,30]],"date-time":"2011-08-30T13:30:18Z","timestamp":1314711018000},"page":"1-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["PrIMe"],"prefix":"10.1145","volume":"20","author":[{"given":"Simon","family":"Miles","sequence":"first","affiliation":[{"name":"King's College London, UK"}]},{"given":"Paul","family":"Groth","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Steve","family":"Munroe","sequence":"additional","affiliation":[{"name":"University of Southampton, United Kingdom"}]},{"given":"Luc","family":"Moreau","sequence":"additional","affiliation":[{"name":"University of Southampton, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2011,8,26]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_4"},{"key":"e_1_2_2_2_1","unstructured":"The Apache Logging Services Project. 2007. Log4j. http:\/\/logging.apache.org\/log4j.  The Apache Logging Services Project. 2007. Log4j. http:\/\/logging.apache.org\/log4j."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/572260.572261"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.666825"},{"key":"e_1_2_2_5_1","unstructured":"Booth D. Haas H. McCabe F. Newcomer E. Champion M. Ferris C. and Orchard D. 2004. Web services architecture. W3c working group note World Wide Web Committee.  Booth D. Haas H. McCabe F. Newcomer E. Champion M. Ferris C. and Orchard D. 2004. Web services architecture. W3c working group note World Wide Web Committee."},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057977.1057978"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_15"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_7"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1412331.1412340"},{"key":"e_1_2_2_10_1","volume-title":"Proceedings of the International Conference on Databases Theory (ICDT). Lecture Notes in Computer Science","volume":"1973","author":"Buneman P.","unstructured":"Buneman , P. , Khanna , S. , and Tan , W . 2001. Why and where: A characterization of data provenance . In Proceedings of the International Conference on Databases Theory (ICDT). Lecture Notes in Computer Science , vol. 1973 . Springer, 316--330. Buneman, P., Khanna, S., and Tan, W. 2001. Why and where: A characterization of data provenance. In Proceedings of the International Conference on Databases Theory (ICDT). Lecture Notes in Computer Science, vol. 1973. Springer, 316--330."},{"volume-title":"Proceedings of the UK e-Science All-Hands Meeting. EPSRC","author":"Byrom R.","key":"e_1_2_2_11_1","unstructured":"Byrom , R. , Coghlan , B. , Cooke , A. W. , Cordenonsi , R. , Cornwall , L. , Djaoui , A. , Field , L. , Fisher , S. , Hicks , S. , Kenny , S. , Leake , J. , Magowan , J. , Nutt , W. , O'Callaghan , D. , Podhorszki , N. , Ryan , J. , Soni , M. , Taylor , P. , and Wilson , A. J . 2003. Relational grid monitoring architecture (R-GMA) . In Proceedings of the UK e-Science All-Hands Meeting. EPSRC , Nottingham, UK. Byrom, R., Coghlan, B., Cooke, A. W., Cordenonsi, R., Cornwall, L., Djaoui, A., Field, L., Fisher, S., Hicks, S., Kenny, S., Leake, J., Magowan, J., Nutt, W., O'Callaghan, D., Podhorszki, N., Ryan, J., Soni, M., Taylor, P., and Wilson, A. J. 2003. Relational grid monitoring architecture (R-GMA). In Proceedings of the UK e-Science All-Hands Meeting. EPSRC, Nottingham, UK."},{"key":"e_1_2_2_12_1","first-page":"38","article-title":"Issues in building practical provenance systems","volume":"32","author":"Chapman A.","year":"2007","unstructured":"Chapman , A. , and Jagadish , H. V. 2007 . Issues in building practical provenance systems . Bull. Tech. Comm. Data Eng. 32 , 4, 38 -- 43 . Chapman, A., and Jagadish, H. V. 2007. Issues in building practical provenance systems. Bull. Tech. Comm. Data Eng. 32, 4, 38--43.","journal-title":"Bull. Tech. Comm. Data Eng."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376715"},{"key":"e_1_2_2_14_1","first-page":"22","article-title":"Program slicing and data provenance","volume":"30","author":"Cheney J.","year":"2007","unstructured":"Cheney , J. 2007 . Program slicing and data provenance . Bull. Tech. Comm. Data Eng. 30 , 4, 22 -- 28 . Cheney, J. 2007. Program slicing and data provenance. Bull. Tech. Comm. Data Eng. 30, 4, 22--28.","journal-title":"Bull. Tech. Comm. Data Eng."},{"key":"e_1_2_2_15_1","volume-title":"Proceedings of the Symposium on Database Programming Languages (DBLP'07)","volume":"4797","author":"Cheney J.","unstructured":"Cheney , J. , Ahmed , A. , and Acar , U. A . 2007. Provenance as dependency analysis . In Proceedings of the Symposium on Database Programming Languages (DBLP'07) . Lecture Notes in Computer Science , vol. 4797 . Springer, 138--152. Cheney, J., Ahmed, A., and Acar, U. A. 2007. Provenance as dependency analysis. In Proceedings of the Symposium on Database Programming Languages (DBLP'07). Lecture Notes in Computer Science, vol. 4797. Springer, 138--152."},{"volume-title":"Proceedings of Very Large Databases (VLDB'06)","author":"Chiticariu L.","key":"e_1_2_2_16_1","unstructured":"Chiticariu , L. , and Tan , W . -C. 2006. Debugging schema mappings with routes . In Proceedings of Very Large Databases (VLDB'06) . VLDB Endowment, 79--90. Chiticariu, L., and Tan, W.-C. 2006. Debugging schema mappings with routes. In Proceedings of Very Large Databases (VLDB'06). VLDB Endowment, 79--90."},{"key":"e_1_2_2_17_1","first-page":"44","article-title":"Provenance in scientific workflow systems","volume":"32","author":"Davidson S.","year":"2007","unstructured":"Davidson , S. , Cohen-Boulakia , S. , Eyal , A. , Ludaescher , B. , McPhillips , T. , Bowers , S. , Anand , M. K. , and Freire , J. 2007 . Provenance in scientific workflow systems . Bull. Tech. Comm. Data Eng. 32 , 4, 44 -- 50 . Davidson, S., Cohen-Boulakia, S., Eyal, A., Ludaescher, B., McPhillips, T., Bowers, S., Anand, M. K., and Freire, J. 2007. Provenance in scientific workflow systems. Bull. Tech. Comm. Data Eng. 32, 4, 44--50.","journal-title":"Bull. Tech. Comm. Data Eng."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1276933.1276934"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101815.1101817"},{"key":"e_1_2_2_20_1","unstructured":"Filman R. E. Elrad. T. Clarke S. and Aksit M. 2004. Aspect-Oriented Software Development. Addison Wesley.   Filman R. E. Elrad. T. Clarke S. and Aksit M. 2004. Aspect-Oriented Software Development. Addison Wesley."},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_2"},{"key":"e_1_2_2_22_1","volume-title":"-W","author":"Gandhi R. A.","year":"2008","unstructured":"Gandhi , R. A. , and Lee , S . -W . 2008 . Regulatory requirements-driven risk assessment. Tech. rep., University of North Carolina . Gandhi, R. A., and Lee, S.-W. 2008. Regulatory requirements-driven risk assessment. Tech. rep., University of North Carolina."},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537847_4"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1265530.1265535"},{"key":"e_1_2_2_25_1","unstructured":"Groth P. Jiang S. Miles S. Munroe S. Tan V. Tsasakou S. and Moreau L. 2006. D3.1.1: An Architecture for Provenance Systems. Tech. rep. University of Southampton.  Groth P. Jiang S. Miles S. Munroe S. Tan V. Tsasakou S. and Moreau L. 2006. D3.1.1: An Architecture for Provenance Systems. Tech. rep. University of Southampton."},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.2005.1520960"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1462159.1462162"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.215"},{"key":"e_1_2_2_30_1","unstructured":"Harman P. and Watson M. 1998. Understanding UML The Developers Guide. Morgan-Kaufmann.   Harman P. and Watson M. 1998. Understanding UML The Developers Guide. Morgan-Kaufmann."},{"key":"e_1_2_2_31_1","volume-title":"-W","author":"Jacobson I.","year":"2004","unstructured":"Jacobson , I. , and Ng , P . -W . 2004 . Aspect-Oriented Software Development with Use Cases. Addison-Wesley . Jacobson, I., and Ng, P.-W. 2004. Aspect-Oriented Software Development with Use Cases. Addison-Wesley."},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(02)00056-4"},{"volume-title":"Proceedings of the 6th European Conference on Software Maintenance and Reengineering (CSMR'02)","author":"Jahnke J. H.","key":"e_1_2_2_33_1","unstructured":"Jahnke , J. H. , Wadsack , J. P. , and Z\u00fcndorf , A . 2002b. A history concept for design recovery tools . In Proceedings of the 6th European Conference on Software Maintenance and Reengineering (CSMR'02) . IEEE Computer Society, 37. Jahnke, J. H., Wadsack, J. P., and Z\u00fcndorf, A. 2002b. A history concept for design recovery tools. In Proceedings of the 6th European Conference on Software Maintenance and Reengineering (CSMR'02). IEEE Computer Society, 37."},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247001.1247007"},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.119"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_5"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/775280.775282"},{"key":"e_1_2_2_38_1","unstructured":"Lewis D. 1973. Counterfactuals. Blackwell.  Lewis D. 1973. Counterfactuals. Blackwell."},{"key":"e_1_2_2_39_1","unstructured":"MacKenzie C. M. Laskey K. McCabe F. Brown P. F. and Metz R. 2006. Reference model for service oriented architecture 1.0. Oasis standard OASIS.  MacKenzie C. M. Laskey K. McCabe F. Brown P. F. and Metz R. 2006. Reference model for service oriented architecture 1.0. Oasis standard OASIS."},{"key":"e_1_2_2_40_1","volume-title":"Eds","author":"Marik V.","year":"2005","unstructured":"Marik , V. , Brennan , R. W. , and Pechoucek , M. , Eds . 2005 . Holonic and Multi-Agent Systems for Manufacturing: Second International Conference on Industrial Applications of Holonic and Multi-Agent Systems (HoloMAS'05). Lecture Notes in Computer Science, vol. 3593 . Springer . Marik, V., Brennan, R. W., and Pechoucek, M., Eds. 2005. Holonic and Multi-Agent Systems for Manufacturing: Second International Conference on Industrial Applications of Holonic and Multi-Agent Systems (HoloMAS'05). Lecture Notes in Computer Science, vol. 3593. Springer."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/11799511_23"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/11890850_19"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-006-9055-3"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2008.82"},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:5"},{"key":"e_1_2_2_46_1","unstructured":"Miles S. Munroe S. Groth P. Jiang S. Tan V. Ibbotson J. and Moreau L. 2006. D3.2.1: The Open Provenance Specification. Tech. rep. University of Southampton.  Miles S. Munroe S. Groth P. Jiang S. Tan V. Ibbotson J. and Moreau L. 2006. D3.2.1: The Open Provenance Specification. Tech. rep. University of Southampton."},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330311.1330323"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:5"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference.","author":"Muniswamy-Reddy K.-K.","key":"e_1_2_2_49_1","unstructured":"Muniswamy-Reddy , K.-K. , Holland , D. , Braun , U. , and Seltzer , M . 2006. Provenance-aware storage systems . In Proceedings of the USENIX Annual Technical Conference. Muniswamy-Reddy, K.-K., Holland, D., Braun, U., and Seltzer, M. 2006. Provenance-aware storage systems. In Proceedings of the USENIX Annual Technical Conference."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1210525.1210535"},{"key":"e_1_2_2_51_1","first-page":"51","article-title":"Copyright and provenance: Some practical problems","volume":"32","author":"Ockerbloom J. M.","year":"2007","unstructured":"Ockerbloom , J. M. 2007 . Copyright and provenance: Some practical problems . Bull. Tech. Comm. Data Engin. 32 , 4, 51 -- 57 . Ockerbloom, J. M. 2007. Copyright and provenance: Some practical problems. Bull. Tech. Comm. Data Engin. 32, 4, 51--57.","journal-title":"Bull. Tech. Comm. Data Engin."},{"key":"e_1_2_2_52_1","volume-title":"Causality: Models, Reasoning, and Inference","author":"Pearl J.","year":"2000","unstructured":"Pearl , J. 2000 . Causality: Models, Reasoning, and Inference . Cambridge University Press . Pearl, J. 2000. Causality: Models, Reasoning, and Inference. Cambridge University Press."},{"key":"e_1_2_2_53_1","unstructured":"Philipsen K. 2008. Pix logging architecture. http:\/\/www.logging-architecture.net.  Philipsen K. 2008. Pix logging architecture. http:\/\/www.logging-architecture.net."},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2006.43"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151695.1151697"},{"key":"e_1_2_2_57_1","first-page":"4","article-title":"Provenance in databases: Past, current, and future","volume":"32","author":"Tan W.-C.","year":"2007","unstructured":"Tan , W.-C. 2007 . Provenance in databases: Past, current, and future . Bull. Tech. Comm. Data Eng. 32 , 4 (Dec.), 3--12. Tan, W.-C. 2007. Provenance in databases: Past, current, and future. Bull. Tech. Comm. Data Eng. 32, 4 (Dec.), 3--12.","journal-title":"Bull. Tech. Comm. Data Eng."},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178625.1178626"},{"key":"e_1_2_2_59_1","first-page":"4","article-title":"Recording provenance for SQL queries and updates","volume":"32","author":"Vansummeren S.","year":"2007","unstructured":"Vansummeren , S. and Cheney , J. 2007 . Recording provenance for SQL queries and updates . Bull. Tech. Comm. Data Eng. 32 , 4 (Dec.), 29--37. Vansummeren, S. and Cheney, J. 2007. Recording provenance for SQL queries and updates. Bull. Tech. Comm. Data Eng. 32, 4 (Dec.), 29--37.","journal-title":"Bull. Tech. Comm. Data Eng."},{"key":"e_1_2_2_60_1","unstructured":"Walden C. 2003. Windows-to-Linux roadmap: Part 5. Linux logging. Working with logs. Developerworks library IBM.  Walden C. 2003. Windows-to-Linux roadmap: Part 5. Linux logging. Working with logs. Developerworks library IBM."},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg224"},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/11574620_57"},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010071910869"},{"key":"e_1_2_2_64_1","unstructured":"Wootten I. Rajbhandari S. and Rana O. 2006. Provenance use case: BioDiversity informatics. Tech. rep. http:\/\/www.gridprovenance.org\/publications\/CardiffUseCase.pdf University of Cardiff.  Wootten I. Rajbhandari S. and Rana O. 2006. Provenance use case: BioDiversity informatics. Tech. rep. http:\/\/www.gridprovenance.org\/publications\/CardiffUseCase.pdf University of Cardiff."},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:5"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000791.2000792","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2000791.2000792","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:00:03Z","timestamp":1750244403000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2000791.2000792"}},"subtitle":["A methodology for developing provenance-aware applications"],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":64,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["10.1145\/2000791.2000792"],"URL":"https:\/\/doi.org\/10.1145\/2000791.2000792","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"type":"print","value":"1049-331X"},{"type":"electronic","value":"1557-7392"}],"subject":[],"published":{"date-parts":[[2011,8]]},"assertion":[{"value":"2007-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2009-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}