<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>10</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Badharudheen P.</style></author><author><style face="normal" font="default" size="100%">Chacko A.M.</style></author><author><style face="normal" font="default" size="100%">Madhukumar S.D.</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Making an Application Provenance-Aware through UML – A General Scheme</style></title><secondary-title><style face="normal" font="default" size="100%">Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2014. </style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2014</style></year></dates><publisher><style face="normal" font="default" size="100%">Communications in Computer and Information Science, vol 420. Springer, Berlin, Heidelberg</style></publisher><pages><style face="normal" font="default" size="100%">451-460</style></pages></record></records></xml>