I think an important issue you are dealing with here, in terms of terminology for thinking about the problem, is "deep copy" versus "shallow copy". See
Copy of an anonymous hash for a discussion of this.
I am still not real knowledgeable in this area, but I believe that is your problem space. Hope this helps.