A survey on semi-structured web data manipulations by non-expert users

Since the emergence of web 2.0, data started floating all over the web, through online and offline applications, and across all application domains. Web data (semi-structured data loaded through web browsers and applications communicating via internet protocols such as HTTP), in particular XML-based...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Computer science review Ročník 40; s. 100367
Hlavný autor: Tekli, Gilbert
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Elsevier Inc 01.05.2021
Predmet:
ISSN:1574-0137, 1876-7745
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract Since the emergence of web 2.0, data started floating all over the web, through online and offline applications, and across all application domains. Web data (semi-structured data loaded through web browsers and applications communicating via internet protocols such as HTTP), in particular XML-based data, is being used for simple commercial information display (i.e., XHTML/HTML in commercial websites), instant messaging (e.g., XMPP for messaging in Whatsapp, Skype, Gtalk etc.), financial transactions (i.e., CDF3 in ecommerce), medical record processing and storage (e.g., HL7 for electronic medical records), social media (e.g., XHTML/HTML in facebook, LinkedIn, Google Plus, etc.), and others. This phenomenon rendered web data manipulation (i.e., monitoring, modifying, controlling, etc.) by IT (information technology) experts, computer technicians and engineers utterly difficult seeing its exponential growth rate in volume and diversity. Not to mention the dynamicity of the data which is continuously changing on the clock and its heterogeneity (e.g., HTML/HTML5, XML, XHTML, RDF, OWL, etc.). Consequently, the manipulation of web data and in particular XML data (since XML has become one of the most essential data types used in computer communications) has shifted from the hands of computer scientists and programmers towards public computer users in all application domains. This has brought a new criterion into the web data manipulation research field, web data manipulation by non-experts. In this paper, we study and analyze existent techniques for manipulating semi-structured web data, particularly XML data, from a non-expert point of view while relating it to traditional manipulation techniques defined in the literature (i.e., filtering, adaptation, data extraction, transformation, access control, encryption, etc.). Web data manipulation techniques by non-experts were categorized under 3 major titles: (i) XML-oriented visual languages dealing with XML data extraction and transformations, (ii) Mashups tackling mainly XML restructuring with value manipulations, and (iii) Dataflow visual programming languages targeting non-expert manipulations and providing means to visually manipulate scientific data. A full analysis was conducted which allowed existent approaches/techniques to be compared and evaluated providing an overview of the current requirements on this subject.
AbstractList Since the emergence of web 2.0, data started floating all over the web, through online and offline applications, and across all application domains. Web data (semi-structured data loaded through web browsers and applications communicating via internet protocols such as HTTP), in particular XML-based data, is being used for simple commercial information display (i.e., XHTML/HTML in commercial websites), instant messaging (e.g., XMPP for messaging in Whatsapp, Skype, Gtalk etc.), financial transactions (i.e., CDF3 in ecommerce), medical record processing and storage (e.g., HL7 for electronic medical records), social media (e.g., XHTML/HTML in facebook, LinkedIn, Google Plus, etc.), and others. This phenomenon rendered web data manipulation (i.e., monitoring, modifying, controlling, etc.) by IT (information technology) experts, computer technicians and engineers utterly difficult seeing its exponential growth rate in volume and diversity. Not to mention the dynamicity of the data which is continuously changing on the clock and its heterogeneity (e.g., HTML/HTML5, XML, XHTML, RDF, OWL, etc.). Consequently, the manipulation of web data and in particular XML data (since XML has become one of the most essential data types used in computer communications) has shifted from the hands of computer scientists and programmers towards public computer users in all application domains. This has brought a new criterion into the web data manipulation research field, web data manipulation by non-experts. In this paper, we study and analyze existent techniques for manipulating semi-structured web data, particularly XML data, from a non-expert point of view while relating it to traditional manipulation techniques defined in the literature (i.e., filtering, adaptation, data extraction, transformation, access control, encryption, etc.). Web data manipulation techniques by non-experts were categorized under 3 major titles: (i) XML-oriented visual languages dealing with XML data extraction and transformations, (ii) Mashups tackling mainly XML restructuring with value manipulations, and (iii) Dataflow visual programming languages targeting non-expert manipulations and providing means to visually manipulate scientific data. A full analysis was conducted which allowed existent approaches/techniques to be compared and evaluated providing an overview of the current requirements on this subject.
ArticleNumber 100367
Author Tekli, Gilbert
Author_xml – sequence: 1
  givenname: Gilbert
  surname: Tekli
  fullname: Tekli, Gilbert
  email: gilbert.tekli@balamand.edu.lb
  organization: University of Balamand, Lebanon
BookMark eNqFkE1LAzEQhoNUsK3-Aw_5A6mT7Ed2PQilWBUKXvQc8jELKe1uSbLV_nu3ricPepph4Hl555mRSdu1SMgthwUHXt5tF7aLAY8LAYIPJ8hKeUGmvJIlkzIvJsNeyJwBz-QVmcW4BZAARTkl6yWNfTjiiXYtjbj3LKbQ29QHdPQDDXU6abrXrT_0O51810ZqTnQowPDzgCHRPmKI1-Sy0buINz9zTt7Xj2-rZ7Z5fXpZLTfMZlAmZqpCu6ZpQJQV5I5jJaDQJZrM2FpIoTnXubPI88qImmvB0dQ1AOaiqAyKbE7ux1wbuji83Cjr03etFLTfKQ7qbERt1WhEnY2o0cgA57_gQ_B7HU7_YQ8jhsNjR49BReuxteh8QJuU6_zfAV9_Zn_h
CitedBy_id crossref_primary_10_3390_math13111877
crossref_primary_10_21303_2461_4262_2023_003105
crossref_primary_10_3390_app12094778
Cites_doi 10.1145/1266840.1266868
10.1145/968559.968568
10.1145/1376616.1376734
10.1109/E-SCIENCE.2007.71
10.1007/978-0-387-35285-5_10
10.1504/IJSN.2008.020089
10.1007/978-3-540-73255-6_8
10.1145/1558334.1558343
10.1016/j.infsof.2012.10.004
10.1145/958942.958947
10.1145/276305.276330
10.1109/MMUL.2005.7
10.1016/j.scico.2007.03.002
10.1145/1013208.1013209
10.1016/j.cose.2004.03.003
10.1016/S1363-4127(04)00028-7
10.1145/1031171.1031273
10.1145/1144403.1144408
10.1016/0304-3975(95)00024-Q
10.1109/MC.2007.410
10.1145/1059524.1059549
10.1109/VL.2000.874349
10.1145/501978.501980
10.1145/1071610.1071613
10.1016/j.jvlc.2016.10.005
10.1145/360303.360333
10.1197/jamia.M1888
10.1145/505586.505590
10.1145/338407.338677
10.1007/11575771_16
10.1145/371920.372182
10.1007/3-540-46140-X_21
10.1145/984334.984339
10.1145/1410140.1410148
10.1002/cpe.993
10.1109/SMAP.2007.34
10.1109/VL.1997.626573
10.1145/502187.502189
10.1016/j.is.2007.09.002
10.1145/1247480.1247626
ContentType Journal Article
Copyright 2021 Elsevier Inc.
Copyright_xml – notice: 2021 Elsevier Inc.
DBID AAYXX
CITATION
DOI 10.1016/j.cosrev.2021.100367
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1876-7745
ExternalDocumentID 10_1016_j_cosrev_2021_100367
S1574013721000071
GroupedDBID --K
--M
.~1
0R~
1B1
1~.
1~5
4.4
457
4G.
5GY
5VS
6J9
7-5
71M
8P~
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AARIN
AAXUO
AAYFN
ABBOA
ABFRF
ABJNI
ABMAC
ABUCO
ABXDB
ABYKQ
ACDAQ
ACGFS
ACNNM
ACRLP
ACZNC
ADBBV
ADEZE
ADMUD
AEBSH
AEFWE
AEKER
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
APLSM
AXJTR
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
FDB
FEDTE
FIRID
FNPLU
FYGXN
GBLVA
GBOLZ
HAMUX
HVGLF
HZ~
IHE
J1W
KOM
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
PC.
Q38
RIG
ROL
RPZ
SDF
SDG
SES
SPC
SPCBC
SSB
SSD
SSV
SSZ
T5K
UNMZH
~G-
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
ID FETCH-LOGICAL-c306t-b85adfff026804d1e8205a6eb3bc9272a11a4dce148b291a21eb9900e4258be23
ISICitedReferencesCount 4
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000656789000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1574-0137
IngestDate Sat Nov 29 07:04:01 EST 2025
Tue Nov 18 22:33:34 EST 2025
Fri Feb 23 02:40:57 EST 2024
IsPeerReviewed false
IsScholarly true
Keywords Visual languages
Semi-structured data
Mashups
Visual language
XML
XML control
XML manipulation
Dataflow
Web data
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c306t-b85adfff026804d1e8205a6eb3bc9272a11a4dce148b291a21eb9900e4258be23
ParticipantIDs crossref_citationtrail_10_1016_j_cosrev_2021_100367
crossref_primary_10_1016_j_cosrev_2021_100367
elsevier_sciencedirect_doi_10_1016_j_cosrev_2021_100367
PublicationCentury 2000
PublicationDate May 2021
2021-05-00
PublicationDateYYYYMMDD 2021-05-01
PublicationDate_xml – month: 05
  year: 2021
  text: May 2021
PublicationDecade 2020
PublicationTitle Computer science review
PublicationYear 2021
Publisher Elsevier Inc
Publisher_xml – name: Elsevier Inc
References W3C (b26) 1999
D. Turi, P. Missier, C. Goble, D.D. Roure, T. Oinn, Taverna workflows: syntax and semantics, in: Proceedings of the Third IEEE International Conference on e-Science and Grid Computing, 2007, pp. 441–448.
I.B.M.-Group (b32) 2008
S. Pettifer, K. Wolstencroft, P. Alper, T. Attwood, A. Coletta, C. Goble, et al. myGrid and UTOPIA: an integrated approach to enacting and visualising in silico experiments in the life sciences, in: Proceedings of the 4th international conference on Data integration in the life sciences, Philadelphia, PA, USA, 2007, pp. 59–70.
MasterCard (b4) 2012
Loton (b29) 2008
K.S. Candan, W.-P. Hsiung, S. Chen, J. Tatemura, D. Agrawal, AFilter: adaptable XML filtering with prefix-caching suffix-clustering, in: Proceedings of the 32nd international conference on Very large data bases, Seoul, Korea, 2006, pp. 559–570.
D.E. Simmen, M. Altinel, V. Markl, S. Padmanabhan, A. Singh, Damia: data mashups for intranet applications, in: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada, 2008, pp. 1171–1182.
W3C (b23) 2010
Diao, Altinel, Franklin, Zhang, Fischer (b52) 2003; 28
Ferraiolo (b60) 2003
Adelberg (b55) 1998; 27
Heyman (b49) 2007; 40
Daniel, Matera (b14) 2014
J. Heasley, Securing XML data, in: Proceedings of the 1st annual conference on Information security curriculum development, Kennesaw, Georgia, 2004, pp. 112–114.
Pemberton (b2) 2002
B. Luo, D. Lee, W.-C. Lee, P. Liu, QFilter: fine-grained run-time XML access control via NFA-based query rewriting, in: Proceedings of the thirteenth ACM international conference on Information and knowledge management, Washington, D.C. USA, 2004, pp. 543–552.
Xu, Ayachit, Reddyreddy (b36) 2008; 3
Stolee, Elbaum, Sarma (b13) 2013; 55
Hwang, Chang (b31) 2004; 23
P. Buneman, S. Naqvi, V. Tannen, L. Wong, Principles of programming with complex objects and collection types, in: Selected papers of the fourth international conference on Database theory, Berlin, Germany, 1995, pp. 3–48.
Braga, Campi, Ceri (b8) 2005; 30
E. Pietriga, J.-Y. Vion-Dury, V. Quint, VXT: a visual approach to XML transformations, in: Proceedings of the 2001 ACM Symposium on Document engineering, Atlanta, Georgia, USA, 2001, pp. 1–10.
buildingSMART. ifcXML Overview. Available
.
Damiani, d. Vimercati, Paraboschi, Samarati (b42) 2002; 5
Hidders, Kwasnikowska, Sroka, Tyszkiewicz, d. Bussche (b19) 2008; 33
B. Zhao, R. Sandhu, X. Zhang, X. Qin, Towards a times-based usage control model, in: Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, Redondo Beach, CA, USA, 2007, pp. 227–242.
Timmerer, Hellwagner (b54) 2005; 12
Piatek (b47) 2004
B. Pellan, C. Concolato, Adaptation of scalable multimedia documents, in: Proceeding of the eighth ACM symposium on Document engineering, Sao Paulo, Brazil, 2008, pp. 32–41.
Takeshi Imamura, Ed Simon (b50) 2005
C.-H. Lim, S. Park, S.H. Son, Access control of XML documents considering update operations, in: Proceedings of the 2003 ACM workshop on XML security, Fairfax, Virginia, 2003, pp. 49–59.
Oinn, Greenwood, Addis, Alpdemir, Ferris, Glover (b65) 2006; 18
Yu, Chiueh (b46) 2004
Lorenzo, Hacid, Paik, Benatallah (b30) 2009; 38
Erwig, Smeltzer, Wang (b62) 2017; 38
Villard, Roisin, Layaıda (b61) 2000
T. Lemlouma, N. Layaıda, SMIL content adaptation for embedded devices, in: IN SMIL EUROPE 2003 CONFERENCE, 2003, pp. 12–14.
R.J. Ennals, M.N. Garofalakis, MashMaker: mashups for the masses, in: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, Beijing, China, 2007, pp. 1116–1118.
I. Fundulaki, S. Maneth, Formalizing XML access control for update operations, in: Proceedings of the 12th ACM symposium on Access control models and technologies, Sophia Antipolis, France, 2007, pp. 169–174.
Eastman, Eastman, Teicholz, Sacks (b7) 2011
Harrison, Ruzzo, Ullman (b38) 1976; 19
I. Kofler, C. Timmerer, H. Hellwagner, T. Ahmed, Towards MPEG-21-based cross-layer multimedia content adaptation, in: Proceedings of the Second International Workshop on Semantic Media Adaptation and Personalization, 2007, pp. 3–8.
S. Ceri, S. Comai, E. Damiani, P. Fraternali, L. Tanca, Complex queries in XML-GL, in: Proceedings of the 2000 ACM Symposium on Applied Computing, Vol. 2, Como, Italy, 2000, pp. 888–893.
Kay (b25) 2007
Bulterman (b59) 2005
W3C (b24) 1999
Lawson, Sharp (b1) 2011
Park, Sandhu (b45) 2004; 7
Zenel (b48) 1998
V. Crescenzi, G. Mecca, P. Merialdo, Automatic web information extraction in the ROADRUNNER system, in: Revised Papers from the HUMACS, DASWIS, ECOMO, and DAMA on ER 2001 Workshops, 2002, pp. 264–277.
J. Hidders, N. Kwasnikowska, J. Sroka, J. Tyszkiewicz, J.V. den Bussche, Petri net + nested relational calculus = dataflow, in: OTM Conferences, 1’05, ed, 2005, pp. 220–237.
R.K. Thomas, R.S. Sandhu, Task-Based Authorization Controls (TBAC): A family of models for active and enterprise-oriented autorization management, in: Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1998, pp. 166–181.
Dolin, Alschuler, Boyer, Beebe, Behlen, Biron (b5) 2006; 13
Auguston, Delgado (b20) 1996
C.-H. Chang, S.-C. Lui, IEPAD: information extraction based on pattern discovery, in: Proceedings of the 10th international conference on World Wide Web, Hong Kong, Hong Kong, 2001, pp. 681–688.
Byun, Lee, Park (b53) 2007
M. Auguston, A. Delgado, Iterative constructs in the visual data flow language, in: Proceedings of the 1997 IEEE Symposium on Visual Languages, VL ’97, 1997, pp. 152–159.
Ouyang, Verbeek, v. d. Aalst, Breutel, Dumas, t. Hofstede (b68) 2007; 67
M. Erwig, A visual language for XML, Visual Languages, in: IEEE Symposium on, 2000 pp. 47–54.
A.A.E. Kalam, S. Benferhat, A. Miuge, R.E. Baida, F. Cuppens, C. Saurel, et al. Organization based access control, in: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, 2003, pp. 120–131.
Johnston, Hanna, Millar (b22) 2004; 36
M. Altinel, M.J. Franklin, Efficient filtering of XML documents for selective dissemination of information, in: Proceedings of the 26th International Conference on Very Large Data Bases, 2000, pp. 53–64.
Foundation (b3) 2004
Wright (b35) 2004; 11
Ceri, Comai, Fraternali, Paraboschi, Tanca, Damiani (b10) 1999
Ferraiolo, Sandhu, Gavrila, Kuhn, Chandramouli (b39) 2001; 4
Lautenbach (b33) 2004; 9
Daniel (10.1016/j.cosrev.2021.100367_b14) 2014
10.1016/j.cosrev.2021.100367_b44
10.1016/j.cosrev.2021.100367_b43
Ferraiolo (10.1016/j.cosrev.2021.100367_b39) 2001; 4
Diao (10.1016/j.cosrev.2021.100367_b52) 2003; 28
10.1016/j.cosrev.2021.100367_b40
Xu (10.1016/j.cosrev.2021.100367_b36) 2008; 3
10.1016/j.cosrev.2021.100367_b41
Piatek (10.1016/j.cosrev.2021.100367_b47) 2004
Pemberton (10.1016/j.cosrev.2021.100367_b2) 2002
Park (10.1016/j.cosrev.2021.100367_b45) 2004; 7
Oinn (10.1016/j.cosrev.2021.100367_b65) 2006; 18
10.1016/j.cosrev.2021.100367_b6
Foundation (10.1016/j.cosrev.2021.100367_b3) 2004
Dolin (10.1016/j.cosrev.2021.100367_b5) 2006; 13
10.1016/j.cosrev.2021.100367_b9
Hidders (10.1016/j.cosrev.2021.100367_b19) 2008; 33
Lorenzo (10.1016/j.cosrev.2021.100367_b30) 2009; 38
Bulterman (10.1016/j.cosrev.2021.100367_b59) 2005
10.1016/j.cosrev.2021.100367_b18
W3C (10.1016/j.cosrev.2021.100367_b26) 1999
Heyman (10.1016/j.cosrev.2021.100367_b49) 2007; 40
10.1016/j.cosrev.2021.100367_b15
10.1016/j.cosrev.2021.100367_b58
10.1016/j.cosrev.2021.100367_b17
10.1016/j.cosrev.2021.100367_b16
Eastman (10.1016/j.cosrev.2021.100367_b7) 2011
10.1016/j.cosrev.2021.100367_b11
10.1016/j.cosrev.2021.100367_b57
10.1016/j.cosrev.2021.100367_b12
10.1016/j.cosrev.2021.100367_b56
10.1016/j.cosrev.2021.100367_b51
Auguston (10.1016/j.cosrev.2021.100367_b20) 1996
MasterCard (10.1016/j.cosrev.2021.100367_b4) 2012
Kay (10.1016/j.cosrev.2021.100367_b25) 2007
Erwig (10.1016/j.cosrev.2021.100367_b62) 2017; 38
Wright (10.1016/j.cosrev.2021.100367_b35) 2004; 11
Johnston (10.1016/j.cosrev.2021.100367_b22) 2004; 36
10.1016/j.cosrev.2021.100367_b28
10.1016/j.cosrev.2021.100367_b27
10.1016/j.cosrev.2021.100367_b66
10.1016/j.cosrev.2021.100367_b21
Lawson (10.1016/j.cosrev.2021.100367_b1) 2011
10.1016/j.cosrev.2021.100367_b67
I.B.M.-Group (10.1016/j.cosrev.2021.100367_b32) 2008
Takeshi Imamura (10.1016/j.cosrev.2021.100367_b50) 2005
10.1016/j.cosrev.2021.100367_b64
Loton (10.1016/j.cosrev.2021.100367_b29) 2008
Damiani (10.1016/j.cosrev.2021.100367_b42) 2002; 5
Yu (10.1016/j.cosrev.2021.100367_b46) 2004
10.1016/j.cosrev.2021.100367_b63
Timmerer (10.1016/j.cosrev.2021.100367_b54) 2005; 12
Ferraiolo (10.1016/j.cosrev.2021.100367_b60) 2003
Zenel (10.1016/j.cosrev.2021.100367_b48) 1998
10.1016/j.cosrev.2021.100367_b37
Villard (10.1016/j.cosrev.2021.100367_b61) 2000
Ouyang (10.1016/j.cosrev.2021.100367_b68) 2007; 67
Hwang (10.1016/j.cosrev.2021.100367_b31) 2004; 23
10.1016/j.cosrev.2021.100367_b34
W3C (10.1016/j.cosrev.2021.100367_b23) 2010
Braga (10.1016/j.cosrev.2021.100367_b8) 2005; 30
Stolee (10.1016/j.cosrev.2021.100367_b13) 2013; 55
Adelberg (10.1016/j.cosrev.2021.100367_b55) 1998; 27
Ceri (10.1016/j.cosrev.2021.100367_b10) 1999
Harrison (10.1016/j.cosrev.2021.100367_b38) 1976; 19
Byun (10.1016/j.cosrev.2021.100367_b53) 2007
W3C (10.1016/j.cosrev.2021.100367_b24) 1999
Lautenbach (10.1016/j.cosrev.2021.100367_b33) 2004; 9
References_xml – volume: 40
  start-page: 17
  year: 2007
  end-page: 19
  ident: b49
  article-title: A new virtual private network for today’s mobile world
  publication-title: Computer
– year: 2010
  ident: b23
  article-title: XQuery 1.0: An XML Query Language
– year: 2011
  ident: b7
  article-title: BIM Handbook: A Guide To Building Information Modeling for Owners, Managers, Designers, Engineers and Contractors
– start-page: 136
  year: 2007
  end-page: 143
  ident: b53
  article-title: A keyword-based filtering technique of document-centric XML using NFA representation
  publication-title: Int. J. Appl. Math. Comput. Sci.
– volume: 7
  start-page: 128
  year: 2004
  end-page: 174
  ident: b45
  article-title: The uconabc usage control model
  publication-title: ACM Trans. Inf. Syst. Secur.
– year: 1999
  ident: b26
  article-title: Extensible stylesheet language transformations -XSLT 1.0
– start-page: 8
  year: 2004
  ident: b47
  article-title: Distributed web proxy caching in a local network environment
  publication-title: The Student Research Competition
– volume: 5
  start-page: 169
  year: 2002
  end-page: 202
  ident: b42
  article-title: A fine-grained access control system for XML documents
  publication-title: ACM Trans. Inf. Syst. Secur.
– start-page: 2
  year: 2004
  end-page: 24
  ident: b46
  article-title: Enterprise digital rights management: Solutions against information theft by insiders
  publication-title: Research Proficiency Examination
– start-page: 104
  year: 2000
  end-page: 119
  ident: b61
  article-title: An XML-based multimedia document processing model for content adaptation
  publication-title: Digital Documents: Systems and Principles
– reference: B. Luo, D. Lee, W.-C. Lee, P. Liu, QFilter: fine-grained run-time XML access control via NFA-based query rewriting, in: Proceedings of the thirteenth ACM international conference on Information and knowledge management, Washington, D.C. USA, 2004, pp. 543–552.
– reference: B. Zhao, R. Sandhu, X. Zhang, X. Qin, Towards a times-based usage control model, in: Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, Redondo Beach, CA, USA, 2007, pp. 227–242.
– volume: 55
  start-page: 1289
  year: 2013
  end-page: 1303
  ident: b13
  article-title: Discovering how end-user programmers and their communities use public repositories: A study on Yahoo! pipes
  publication-title: Inf. Softw. Technol.
– volume: 38
  start-page: 59
  year: 2009
  end-page: 66
  ident: b30
  article-title: Data integration in mashups
  publication-title: SIGMOD Rec.
– start-page: 151
  year: 1999
  end-page: 165
  ident: b10
  article-title: XML-GL: A graphical language for querying and restructuring XML documents
  publication-title: SEBD
– reference: D.E. Simmen, M. Altinel, V. Markl, S. Padmanabhan, A. Singh, Damia: data mashups for intranet applications, in: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada, 2008, pp. 1171–1182.
– start-page: 2
  year: 2008
  end-page: 4
  ident: b32
  article-title: IBM websphere datapower XML security gateway XS40
– year: 2003
  ident: b60
  article-title: Scalable vector graphics (SVG) 1.1 specification
– reference: I. Fundulaki, S. Maneth, Formalizing XML access control for update operations, in: Proceedings of the 12th ACM symposium on Access control models and technologies, Sophia Antipolis, France, 2007, pp. 169–174.
– volume: 33
  start-page: 261
  year: 2008
  end-page: 284
  ident: b19
  article-title: DFL: A dataflow language based on Petri nets and nested relational calculus
  publication-title: Inf. Syst.
– year: 1999
  ident: b24
  article-title: XML path language (Xpath) version 1.0
– reference: S. Ceri, S. Comai, E. Damiani, P. Fraternali, L. Tanca, Complex queries in XML-GL, in: Proceedings of the 2000 ACM Symposium on Applied Computing, Vol. 2, Como, Italy, 2000, pp. 888–893.
– reference: M. Erwig, A visual language for XML, Visual Languages, in: IEEE Symposium on, 2000 pp. 47–54.
– start-page: 6
  year: 1996
  ident: b20
  article-title: The V Experimental Visual Programming Language
– reference: C.-H. Lim, S. Park, S.H. Son, Access control of XML documents considering update operations, in: Proceedings of the 2003 ACM workshop on XML security, Fairfax, Virginia, 2003, pp. 49–59.
– year: 2004
  ident: b3
  article-title: Extensible messaging and presence protocol (XMPP): Instant messaging and presence
– volume: 38
  start-page: 9
  year: 2017
  end-page: 17
  ident: b62
  article-title: What is a visual language?
  publication-title: J. Vis. Lang. Comput.
– year: 1998
  ident: b48
  article-title: A Proxy-Based Filtering Mechanism for the Mobile Environment
– reference: J. Heasley, Securing XML data, in: Proceedings of the 1st annual conference on Information security curriculum development, Kennesaw, Georgia, 2004, pp. 112–114.
– volume: 27
  start-page: 283
  year: 1998
  end-page: 294
  ident: b55
  article-title: Nodose-a tool for semi-automatically extracting structured and semistructured data from text documents
  publication-title: SIGMOD Rec.
– reference: S. Pettifer, K. Wolstencroft, P. Alper, T. Attwood, A. Coletta, C. Goble, et al. myGrid and UTOPIA: an integrated approach to enacting and visualising in silico experiments in the life sciences, in: Proceedings of the 4th international conference on Data integration in the life sciences, Philadelphia, PA, USA, 2007, pp. 59–70.
– reference: D. Turi, P. Missier, C. Goble, D.D. Roure, T. Oinn, Taverna workflows: syntax and semantics, in: Proceedings of the Third IEEE International Conference on e-Science and Grid Computing, 2007, pp. 441–448.
– volume: 9
  start-page: 6
  year: 2004
  end-page: 18
  ident: b33
  article-title: Introduction to XML encryption and XML signature
  publication-title: Inf. Secur. Tech. Rep.
– volume: 36
  start-page: 1
  year: 2004
  end-page: 34
  ident: b22
  article-title: Advances in dataflow programming languages
  publication-title: ACM Comput. Surv.
– reference: R.J. Ennals, M.N. Garofalakis, MashMaker: mashups for the masses, in: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, Beijing, China, 2007, pp. 1116–1118.
– volume: 11
  start-page: 5
  year: 2004
  ident: b35
  article-title: Security, privacy, and anonymity
  publication-title: Crossroads Mag.
– volume: 28
  start-page: 467
  year: 2003
  end-page: 516
  ident: b52
  article-title: Path sharing and predicate evaluation for high-performance XML filtering
  publication-title: ACM Trans. Database Syst.
– reference: M. Auguston, A. Delgado, Iterative constructs in the visual data flow language, in: Proceedings of the 1997 IEEE Symposium on Visual Languages, VL ’97, 1997, pp. 152–159.
– volume: 30
  start-page: 398
  year: 2005
  end-page: 443
  ident: b8
  article-title: XQBE (xquery by example): a visual interface to the standard XML query language
  publication-title: ACM Trans. Database Syst.
– reference: E. Pietriga, J.-Y. Vion-Dury, V. Quint, VXT: a visual approach to XML transformations, in: Proceedings of the 2001 ACM Symposium on Document engineering, Atlanta, Georgia, USA, 2001, pp. 1–10.
– year: 2011
  ident: b1
  article-title: Introducing Html5
– year: 2014
  ident: b14
  article-title: Mashups: Concepts, Models and Architectures
– volume: 12
  start-page: 74
  year: 2005
  end-page: 79
  ident: b54
  article-title: Interoperable adaptive multimedia communication
  publication-title: IEEE MultiMedia
– year: 2005
  ident: b59
  article-title: Synchronized multimedia integration language (SMIL 2.1) specification
– start-page: 128
  year: 2008
  ident: b29
  article-title: Introduction to microsoft popfly, no programming required
  publication-title: Bibliometrics
– reference: K.S. Candan, W.-P. Hsiung, S. Chen, J. Tatemura, D. Agrawal, AFilter: adaptable XML filtering with prefix-caching suffix-clustering, in: Proceedings of the 32nd international conference on Very large data bases, Seoul, Korea, 2006, pp. 559–570.
– reference: T. Lemlouma, N. Layaıda, SMIL content adaptation for embedded devices, in: IN SMIL EUROPE 2003 CONFERENCE, 2003, pp. 12–14.
– reference: M. Altinel, M.J. Franklin, Efficient filtering of XML documents for selective dissemination of information, in: Proceedings of the 26th International Conference on Very Large Data Bases, 2000, pp. 53–64.
– reference: A.A.E. Kalam, S. Benferhat, A. Miuge, R.E. Baida, F. Cuppens, C. Saurel, et al. Organization based access control, in: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, 2003, pp. 120–131.
– reference: C.-H. Chang, S.-C. Lui, IEPAD: information extraction based on pattern discovery, in: Proceedings of the 10th international conference on World Wide Web, Hong Kong, Hong Kong, 2001, pp. 681–688.
– reference: J. Hidders, N. Kwasnikowska, J. Sroka, J. Tyszkiewicz, J.V. den Bussche, Petri net + nested relational calculus = dataflow, in: OTM Conferences, 1’05, ed, 2005, pp. 220–237.
– reference: B. Pellan, C. Concolato, Adaptation of scalable multimedia documents, in: Proceeding of the eighth ACM symposium on Document engineering, Sao Paulo, Brazil, 2008, pp. 32–41.
– reference: R.K. Thomas, R.S. Sandhu, Task-Based Authorization Controls (TBAC): A family of models for active and enterprise-oriented autorization management, in: Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1998, pp. 166–181.
– reference: I. Kofler, C. Timmerer, H. Hellwagner, T. Ahmed, Towards MPEG-21-based cross-layer multimedia content adaptation, in: Proceedings of the Second International Workshop on Semantic Media Adaptation and Personalization, 2007, pp. 3–8.
– year: 2012
  ident: b4
  article-title: Common data format 3 overview—XML data format
– year: 2007
  ident: b25
  article-title: XSL transformations (XSLT) version 2.0
– volume: 23
  start-page: 498
  year: 2004
  end-page: 529
  ident: b31
  article-title: An operational model and language support for securing XML documents
  publication-title: Comput. Secur.
– reference: .
– reference: P. Buneman, S. Naqvi, V. Tannen, L. Wong, Principles of programming with complex objects and collection types, in: Selected papers of the fourth international conference on Database theory, Berlin, Germany, 1995, pp. 3–48.
– volume: 4
  start-page: 224
  year: 2001
  end-page: 274
  ident: b39
  article-title: Proposed NIST standard for role-based access control
  publication-title: ACM Trans. Inf. Syst. Secur.
– volume: 18
  start-page: 1067
  year: 2006
  end-page: 1100
  ident: b65
  article-title: , taverna: lessons in creating a workflow environment for the life sciences: Research articles
  publication-title: Concurr. Comput. : Pract. Exper.
– year: 2002
  ident: b2
  article-title: The extensible hypertext markup language: A reformulation of HTML 4.0 in XML 1.0
– reference: buildingSMART. ifcXML Overview. Available:
– reference: V. Crescenzi, G. Mecca, P. Merialdo, Automatic web information extraction in the ROADRUNNER system, in: Revised Papers from the HUMACS, DASWIS, ECOMO, and DAMA on ER 2001 Workshops, 2002, pp. 264–277.
– volume: 19
  start-page: 461
  year: 1976
  end-page: 471
  ident: b38
  article-title: Protection in operating systems
  publication-title: Commun. ACM
– volume: 67
  start-page: 162
  year: 2007
  end-page: 198
  ident: b68
  article-title: Formal semantics and analysis of control flow in WS-BPEL
  publication-title: Sci. Comput. Program.
– volume: 13
  start-page: 30
  year: 2006
  end-page: 39
  ident: b5
  article-title: HL7 clinical document architecture, release 2
  publication-title: J. Am. Med. Inf. Assoc.
– volume: 3
  start-page: 147
  year: 2008
  end-page: 160
  ident: b36
  article-title: Formal modelling and analysis of XML firewall for service-oriented systems
  publication-title: Int. J. Secur. Netw.
– year: 2005
  ident: b50
  article-title: Syntax XML encryption, W3C
– ident: 10.1016/j.cosrev.2021.100367_b44
  doi: 10.1145/1266840.1266868
– ident: 10.1016/j.cosrev.2021.100367_b34
  doi: 10.1145/968559.968568
– ident: 10.1016/j.cosrev.2021.100367_b12
  doi: 10.1145/1376616.1376734
– ident: 10.1016/j.cosrev.2021.100367_b21
  doi: 10.1109/E-SCIENCE.2007.71
– start-page: 6
  year: 1996
  ident: 10.1016/j.cosrev.2021.100367_b20
– year: 2005
  ident: 10.1016/j.cosrev.2021.100367_b50
– start-page: 128
  year: 2008
  ident: 10.1016/j.cosrev.2021.100367_b29
  article-title: Introduction to microsoft popfly, no programming required
– ident: 10.1016/j.cosrev.2021.100367_b58
– year: 2007
  ident: 10.1016/j.cosrev.2021.100367_b25
– ident: 10.1016/j.cosrev.2021.100367_b40
  doi: 10.1007/978-0-387-35285-5_10
– start-page: 2
  year: 2004
  ident: 10.1016/j.cosrev.2021.100367_b46
  article-title: Enterprise digital rights management: Solutions against information theft by insiders
– volume: 3
  start-page: 147
  year: 2008
  ident: 10.1016/j.cosrev.2021.100367_b36
  article-title: Formal modelling and analysis of XML firewall for service-oriented systems
  publication-title: Int. J. Secur. Netw.
  doi: 10.1504/IJSN.2008.020089
– year: 2005
  ident: 10.1016/j.cosrev.2021.100367_b59
– ident: 10.1016/j.cosrev.2021.100367_b66
  doi: 10.1007/978-3-540-73255-6_8
– volume: 38
  start-page: 59
  year: 2009
  ident: 10.1016/j.cosrev.2021.100367_b30
  article-title: Data integration in mashups
  publication-title: SIGMOD Rec.
  doi: 10.1145/1558334.1558343
– volume: 55
  start-page: 1289
  year: 2013
  ident: 10.1016/j.cosrev.2021.100367_b13
  article-title: Discovering how end-user programmers and their communities use public repositories: A study on Yahoo! pipes
  publication-title: Inf. Softw. Technol.
  doi: 10.1016/j.infsof.2012.10.004
– year: 2012
  ident: 10.1016/j.cosrev.2021.100367_b4
– year: 2004
  ident: 10.1016/j.cosrev.2021.100367_b3
– year: 2014
  ident: 10.1016/j.cosrev.2021.100367_b14
– volume: 28
  start-page: 467
  year: 2003
  ident: 10.1016/j.cosrev.2021.100367_b52
  article-title: Path sharing and predicate evaluation for high-performance XML filtering
  publication-title: ACM Trans. Database Syst.
  doi: 10.1145/958942.958947
– volume: 27
  start-page: 283
  year: 1998
  ident: 10.1016/j.cosrev.2021.100367_b55
  article-title: Nodose-a tool for semi-automatically extracting structured and semistructured data from text documents
  publication-title: SIGMOD Rec.
  doi: 10.1145/276305.276330
– volume: 12
  start-page: 74
  year: 2005
  ident: 10.1016/j.cosrev.2021.100367_b54
  article-title: Interoperable adaptive multimedia communication
  publication-title: IEEE MultiMedia
  doi: 10.1109/MMUL.2005.7
– volume: 67
  start-page: 162
  year: 2007
  ident: 10.1016/j.cosrev.2021.100367_b68
  article-title: Formal semantics and analysis of control flow in WS-BPEL
  publication-title: Sci. Comput. Program.
  doi: 10.1016/j.scico.2007.03.002
– volume: 36
  start-page: 1
  year: 2004
  ident: 10.1016/j.cosrev.2021.100367_b22
  article-title: Advances in dataflow programming languages
  publication-title: ACM Comput. Surv.
  doi: 10.1145/1013208.1013209
– volume: 23
  start-page: 498
  year: 2004
  ident: 10.1016/j.cosrev.2021.100367_b31
  article-title: An operational model and language support for securing XML documents
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2004.03.003
– volume: 9
  start-page: 6
  year: 2004
  ident: 10.1016/j.cosrev.2021.100367_b33
  article-title: Introduction to XML encryption and XML signature
  publication-title: Inf. Secur. Tech. Rep.
  doi: 10.1016/S1363-4127(04)00028-7
– ident: 10.1016/j.cosrev.2021.100367_b43
  doi: 10.1145/1031171.1031273
– volume: 11
  start-page: 5
  year: 2004
  ident: 10.1016/j.cosrev.2021.100367_b35
  article-title: Security, privacy, and anonymity
  publication-title: Crossroads Mag.
  doi: 10.1145/1144403.1144408
– start-page: 151
  year: 1999
  ident: 10.1016/j.cosrev.2021.100367_b10
  article-title: XML-GL: A graphical language for querying and restructuring XML documents
– ident: 10.1016/j.cosrev.2021.100367_b67
  doi: 10.1016/0304-3975(95)00024-Q
– year: 2002
  ident: 10.1016/j.cosrev.2021.100367_b2
– volume: 40
  start-page: 17
  year: 2007
  ident: 10.1016/j.cosrev.2021.100367_b49
  article-title: A new virtual private network for today’s mobile world
  publication-title: Computer
  doi: 10.1109/MC.2007.410
– ident: 10.1016/j.cosrev.2021.100367_b6
– year: 2011
  ident: 10.1016/j.cosrev.2021.100367_b7
– start-page: 2
  year: 2008
  ident: 10.1016/j.cosrev.2021.100367_b32
  article-title: IBM websphere datapower XML security gateway XS40
– ident: 10.1016/j.cosrev.2021.100367_b15
  doi: 10.1145/1059524.1059549
– year: 2011
  ident: 10.1016/j.cosrev.2021.100367_b1
– year: 2010
  ident: 10.1016/j.cosrev.2021.100367_b23
– ident: 10.1016/j.cosrev.2021.100367_b9
  doi: 10.1109/VL.2000.874349
– year: 1999
  ident: 10.1016/j.cosrev.2021.100367_b26
– start-page: 8
  year: 2004
  ident: 10.1016/j.cosrev.2021.100367_b47
  article-title: Distributed web proxy caching in a local network environment
– ident: 10.1016/j.cosrev.2021.100367_b37
– volume: 4
  start-page: 224
  year: 2001
  ident: 10.1016/j.cosrev.2021.100367_b39
  article-title: Proposed NIST standard for role-based access control
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/501978.501980
– volume: 30
  start-page: 398
  year: 2005
  ident: 10.1016/j.cosrev.2021.100367_b8
  article-title: XQBE (xquery by example): a visual interface to the standard XML query language
  publication-title: ACM Trans. Database Syst.
  doi: 10.1145/1071610.1071613
– volume: 38
  start-page: 9
  year: 2017
  ident: 10.1016/j.cosrev.2021.100367_b62
  article-title: What is a visual language?
  publication-title: J. Vis. Lang. Comput.
  doi: 10.1016/j.jvlc.2016.10.005
– volume: 19
  start-page: 461
  year: 1976
  ident: 10.1016/j.cosrev.2021.100367_b38
  article-title: Protection in operating systems
  publication-title: Commun. ACM
  doi: 10.1145/360303.360333
– volume: 13
  start-page: 30
  year: 2006
  ident: 10.1016/j.cosrev.2021.100367_b5
  article-title: HL7 clinical document architecture, release 2
  publication-title: J. Am. Med. Inf. Assoc.
  doi: 10.1197/jamia.M1888
– volume: 5
  start-page: 169
  year: 2002
  ident: 10.1016/j.cosrev.2021.100367_b42
  article-title: A fine-grained access control system for XML documents
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/505586.505590
– year: 1999
  ident: 10.1016/j.cosrev.2021.100367_b24
– ident: 10.1016/j.cosrev.2021.100367_b27
  doi: 10.1145/338407.338677
– year: 1998
  ident: 10.1016/j.cosrev.2021.100367_b48
– ident: 10.1016/j.cosrev.2021.100367_b63
  doi: 10.1007/11575771_16
– ident: 10.1016/j.cosrev.2021.100367_b56
  doi: 10.1145/371920.372182
– ident: 10.1016/j.cosrev.2021.100367_b57
  doi: 10.1007/3-540-46140-X_21
– volume: 7
  start-page: 128
  year: 2004
  ident: 10.1016/j.cosrev.2021.100367_b45
  article-title: The uconabc usage control model
  publication-title: ACM Trans. Inf. Syst. Secur.
  doi: 10.1145/984334.984339
– ident: 10.1016/j.cosrev.2021.100367_b18
  doi: 10.1145/1410140.1410148
– ident: 10.1016/j.cosrev.2021.100367_b41
– volume: 18
  start-page: 1067
  year: 2006
  ident: 10.1016/j.cosrev.2021.100367_b65
  article-title: , taverna: lessons in creating a workflow environment for the life sciences: Research articles
  publication-title: Concurr. Comput. : Pract. Exper.
  doi: 10.1002/cpe.993
– ident: 10.1016/j.cosrev.2021.100367_b16
  doi: 10.1109/SMAP.2007.34
– ident: 10.1016/j.cosrev.2021.100367_b64
  doi: 10.1109/VL.1997.626573
– start-page: 136
  year: 2007
  ident: 10.1016/j.cosrev.2021.100367_b53
  article-title: A keyword-based filtering technique of document-centric XML using NFA representation
  publication-title: Int. J. Appl. Math. Comput. Sci.
– ident: 10.1016/j.cosrev.2021.100367_b11
  doi: 10.1145/502187.502189
– year: 2003
  ident: 10.1016/j.cosrev.2021.100367_b60
– volume: 33
  start-page: 261
  year: 2008
  ident: 10.1016/j.cosrev.2021.100367_b19
  article-title: DFL: A dataflow language based on Petri nets and nested relational calculus
  publication-title: Inf. Syst.
  doi: 10.1016/j.is.2007.09.002
– start-page: 104
  year: 2000
  ident: 10.1016/j.cosrev.2021.100367_b61
  article-title: An XML-based multimedia document processing model for content adaptation
– ident: 10.1016/j.cosrev.2021.100367_b17
– ident: 10.1016/j.cosrev.2021.100367_b51
– ident: 10.1016/j.cosrev.2021.100367_b28
  doi: 10.1145/1247480.1247626
SSID ssj0070056
Score 2.2296183
SecondaryResourceType review_article
Snippet Since the emergence of web 2.0, data started floating all over the web, through online and offline applications, and across all application domains. Web data...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 100367
SubjectTerms Dataflow
Mashups
Semi-structured data
Visual language
Visual languages
Web data
XML
XML control
XML manipulation
Title A survey on semi-structured web data manipulations by non-expert users
URI https://dx.doi.org/10.1016/j.cosrev.2021.100367
Volume 40
WOSCitedRecordID wos000656789000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: ScienceDirect Freedom Collection - Elsevier
  customDbUrl:
  eissn: 1876-7745
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0070056
  issn: 1574-0137
  databaseCode: AIEXJ
  dateStart: 20070801
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1JT8QgFCZuBy_uxj0cvE0wpWWGcpwY14PxMCZza4DSZFyqmVaj_95HgVnUuBy8NA0prw0ffX3Q974PoUNuOeG4FoTSIiZMSEZEJHLSYTziiuZFnuhGbIJfXaX9vrj2knVVIyfAyzJ9fRVP_wo1tAHYtnT2D3CPjEIDnAPocATY4fgr4Lut6nn4Aq864FqZhwFxFLHPTaK5LUyUtbRJq4Og3FXZELR8LEnD9l-37L5FNRm0BuWHVqgBGk79UOiZO1djfTawhFn15EZCTMdpe8H3cZuQ4jhYgnN0XEreu1HLXsO_dLxuD-AWxq2y2jnW_tH48mme6w_fn1FWYEg4u82clcxayZyVWTQf87YAvzXfvTjpX4avLbdcpg0nrn_4UB7Z5PB9fpqvw4-JkKK3gpb8WgB3HYaraMaUa2g5jDb2bncdnXaxgxQ_lvgDpBggxRZSPAUpVm94DCluIN1AN6cnveNz4vUviIaFXE1U2pZ5URSwTE4jllMD0VpbdoxKlBYxjyWlkuXawIpWxYLKmBoFwUVkwA-nysTJJpqDW5kthMGM6qRJYhU6GVdaskJ3WF6whEc0l3IbJWFYMu3J4a1GyX32HSjbiIx6PTlylB-u52HEMz9jXeCWwTT6tufOH--0ixbHU3wPzQEqZh8t6Jd6UA0P_Bx6B82Jc_Y
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+survey+on+semi-structured+web+data+manipulations+by+non-expert+users&rft.jtitle=Computer+science+review&rft.au=Tekli%2C+Gilbert&rft.date=2021-05-01&rft.issn=1574-0137&rft.volume=40&rft.spage=100367&rft_id=info:doi/10.1016%2Fj.cosrev.2021.100367&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cosrev_2021_100367
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-0137&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-0137&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-0137&client=summon