A survey on semi-structured web data manipulations by non-expert users
Since the emergence of web 2.0, data started floating all over the web, through online and offline applications, and across all application domains. Web data (semi-structured data loaded through web browsers and applications communicating via internet protocols such as HTTP), in particular XML-based...
Uložené v:
| Vydané v: | Computer science review Ročník 40; s. 100367 |
|---|---|
| Hlavný autor: | |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
Elsevier Inc
01.05.2021
|
| Predmet: | |
| ISSN: | 1574-0137, 1876-7745 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | Since the emergence of web 2.0, data started floating all over the web, through online and offline applications, and across all application domains. Web data (semi-structured data loaded through web browsers and applications communicating via internet protocols such as HTTP), in particular XML-based data, is being used for simple commercial information display (i.e., XHTML/HTML in commercial websites), instant messaging (e.g., XMPP for messaging in Whatsapp, Skype, Gtalk etc.), financial transactions (i.e., CDF3 in ecommerce), medical record processing and storage (e.g., HL7 for electronic medical records), social media (e.g., XHTML/HTML in facebook, LinkedIn, Google Plus, etc.), and others. This phenomenon rendered web data manipulation (i.e., monitoring, modifying, controlling, etc.) by IT (information technology) experts, computer technicians and engineers utterly difficult seeing its exponential growth rate in volume and diversity. Not to mention the dynamicity of the data which is continuously changing on the clock and its heterogeneity (e.g., HTML/HTML5, XML, XHTML, RDF, OWL, etc.).
Consequently, the manipulation of web data and in particular XML data (since XML has become one of the most essential data types used in computer communications) has shifted from the hands of computer scientists and programmers towards public computer users in all application domains.
This has brought a new criterion into the web data manipulation research field, web data manipulation by non-experts. In this paper, we study and analyze existent techniques for manipulating semi-structured web data, particularly XML data, from a non-expert point of view while relating it to traditional manipulation techniques defined in the literature (i.e., filtering, adaptation, data extraction, transformation, access control, encryption, etc.). Web data manipulation techniques by non-experts were categorized under 3 major titles: (i) XML-oriented visual languages dealing with XML data extraction and transformations, (ii) Mashups tackling mainly XML restructuring with value manipulations, and (iii) Dataflow visual programming languages targeting non-expert manipulations and providing means to visually manipulate scientific data. A full analysis was conducted which allowed existent approaches/techniques to be compared and evaluated providing an overview of the current requirements on this subject. |
|---|---|
| AbstractList | Since the emergence of web 2.0, data started floating all over the web, through online and offline applications, and across all application domains. Web data (semi-structured data loaded through web browsers and applications communicating via internet protocols such as HTTP), in particular XML-based data, is being used for simple commercial information display (i.e., XHTML/HTML in commercial websites), instant messaging (e.g., XMPP for messaging in Whatsapp, Skype, Gtalk etc.), financial transactions (i.e., CDF3 in ecommerce), medical record processing and storage (e.g., HL7 for electronic medical records), social media (e.g., XHTML/HTML in facebook, LinkedIn, Google Plus, etc.), and others. This phenomenon rendered web data manipulation (i.e., monitoring, modifying, controlling, etc.) by IT (information technology) experts, computer technicians and engineers utterly difficult seeing its exponential growth rate in volume and diversity. Not to mention the dynamicity of the data which is continuously changing on the clock and its heterogeneity (e.g., HTML/HTML5, XML, XHTML, RDF, OWL, etc.).
Consequently, the manipulation of web data and in particular XML data (since XML has become one of the most essential data types used in computer communications) has shifted from the hands of computer scientists and programmers towards public computer users in all application domains.
This has brought a new criterion into the web data manipulation research field, web data manipulation by non-experts. In this paper, we study and analyze existent techniques for manipulating semi-structured web data, particularly XML data, from a non-expert point of view while relating it to traditional manipulation techniques defined in the literature (i.e., filtering, adaptation, data extraction, transformation, access control, encryption, etc.). Web data manipulation techniques by non-experts were categorized under 3 major titles: (i) XML-oriented visual languages dealing with XML data extraction and transformations, (ii) Mashups tackling mainly XML restructuring with value manipulations, and (iii) Dataflow visual programming languages targeting non-expert manipulations and providing means to visually manipulate scientific data. A full analysis was conducted which allowed existent approaches/techniques to be compared and evaluated providing an overview of the current requirements on this subject. |
| ArticleNumber | 100367 |
| Author | Tekli, Gilbert |
| Author_xml | – sequence: 1 givenname: Gilbert surname: Tekli fullname: Tekli, Gilbert email: gilbert.tekli@balamand.edu.lb organization: University of Balamand, Lebanon |
| BookMark | eNqFkE1LAzEQhoNUsK3-Aw_5A6mT7Ed2PQilWBUKXvQc8jELKe1uSbLV_nu3ricPepph4Hl555mRSdu1SMgthwUHXt5tF7aLAY8LAYIPJ8hKeUGmvJIlkzIvJsNeyJwBz-QVmcW4BZAARTkl6yWNfTjiiXYtjbj3LKbQ29QHdPQDDXU6abrXrT_0O51810ZqTnQowPDzgCHRPmKI1-Sy0buINz9zTt7Xj2-rZ7Z5fXpZLTfMZlAmZqpCu6ZpQJQV5I5jJaDQJZrM2FpIoTnXubPI88qImmvB0dQ1AOaiqAyKbE7ux1wbuji83Cjr03etFLTfKQ7qbERt1WhEnY2o0cgA57_gQ_B7HU7_YQ8jhsNjR49BReuxteh8QJuU6_zfAV9_Zn_h |
| CitedBy_id | crossref_primary_10_3390_math13111877 crossref_primary_10_21303_2461_4262_2023_003105 crossref_primary_10_3390_app12094778 |
| Cites_doi | 10.1145/1266840.1266868 10.1145/968559.968568 10.1145/1376616.1376734 10.1109/E-SCIENCE.2007.71 10.1007/978-0-387-35285-5_10 10.1504/IJSN.2008.020089 10.1007/978-3-540-73255-6_8 10.1145/1558334.1558343 10.1016/j.infsof.2012.10.004 10.1145/958942.958947 10.1145/276305.276330 10.1109/MMUL.2005.7 10.1016/j.scico.2007.03.002 10.1145/1013208.1013209 10.1016/j.cose.2004.03.003 10.1016/S1363-4127(04)00028-7 10.1145/1031171.1031273 10.1145/1144403.1144408 10.1016/0304-3975(95)00024-Q 10.1109/MC.2007.410 10.1145/1059524.1059549 10.1109/VL.2000.874349 10.1145/501978.501980 10.1145/1071610.1071613 10.1016/j.jvlc.2016.10.005 10.1145/360303.360333 10.1197/jamia.M1888 10.1145/505586.505590 10.1145/338407.338677 10.1007/11575771_16 10.1145/371920.372182 10.1007/3-540-46140-X_21 10.1145/984334.984339 10.1145/1410140.1410148 10.1002/cpe.993 10.1109/SMAP.2007.34 10.1109/VL.1997.626573 10.1145/502187.502189 10.1016/j.is.2007.09.002 10.1145/1247480.1247626 |
| ContentType | Journal Article |
| Copyright | 2021 Elsevier Inc. |
| Copyright_xml | – notice: 2021 Elsevier Inc. |
| DBID | AAYXX CITATION |
| DOI | 10.1016/j.cosrev.2021.100367 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 1876-7745 |
| ExternalDocumentID | 10_1016_j_cosrev_2021_100367 S1574013721000071 |
| GroupedDBID | --K --M .~1 0R~ 1B1 1~. 1~5 4.4 457 4G. 5GY 5VS 6J9 7-5 71M 8P~ AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AARIN AAXUO AAYFN ABBOA ABFRF ABJNI ABMAC ABUCO ABXDB ABYKQ ACDAQ ACGFS ACNNM ACRLP ACZNC ADBBV ADEZE ADMUD AEBSH AEFWE AEKER AFKWA AFTJW AGHFR AGUBO AGYEJ AHZHX AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD APLSM AXJTR BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FIRID FNPLU FYGXN GBLVA GBOLZ HAMUX HVGLF HZ~ IHE J1W KOM M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 PC. Q38 RIG ROL RPZ SDF SDG SES SPC SPCBC SSB SSD SSV SSZ T5K UNMZH ~G- 9DU AATTM AAXKI AAYWO AAYXX ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD |
| ID | FETCH-LOGICAL-c306t-b85adfff026804d1e8205a6eb3bc9272a11a4dce148b291a21eb9900e4258be23 |
| ISICitedReferencesCount | 4 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000656789000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1574-0137 |
| IngestDate | Sat Nov 29 07:04:01 EST 2025 Tue Nov 18 22:33:34 EST 2025 Fri Feb 23 02:40:57 EST 2024 |
| IsPeerReviewed | false |
| IsScholarly | true |
| Keywords | Visual languages Semi-structured data Mashups Visual language XML XML control XML manipulation Dataflow Web data |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c306t-b85adfff026804d1e8205a6eb3bc9272a11a4dce148b291a21eb9900e4258be23 |
| ParticipantIDs | crossref_citationtrail_10_1016_j_cosrev_2021_100367 crossref_primary_10_1016_j_cosrev_2021_100367 elsevier_sciencedirect_doi_10_1016_j_cosrev_2021_100367 |
| PublicationCentury | 2000 |
| PublicationDate | May 2021 2021-05-00 |
| PublicationDateYYYYMMDD | 2021-05-01 |
| PublicationDate_xml | – month: 05 year: 2021 text: May 2021 |
| PublicationDecade | 2020 |
| PublicationTitle | Computer science review |
| PublicationYear | 2021 |
| Publisher | Elsevier Inc |
| Publisher_xml | – name: Elsevier Inc |
| References | W3C (b26) 1999 D. Turi, P. Missier, C. Goble, D.D. Roure, T. Oinn, Taverna workflows: syntax and semantics, in: Proceedings of the Third IEEE International Conference on e-Science and Grid Computing, 2007, pp. 441–448. I.B.M.-Group (b32) 2008 S. Pettifer, K. Wolstencroft, P. Alper, T. Attwood, A. Coletta, C. Goble, et al. myGrid and UTOPIA: an integrated approach to enacting and visualising in silico experiments in the life sciences, in: Proceedings of the 4th international conference on Data integration in the life sciences, Philadelphia, PA, USA, 2007, pp. 59–70. MasterCard (b4) 2012 Loton (b29) 2008 K.S. Candan, W.-P. Hsiung, S. Chen, J. Tatemura, D. Agrawal, AFilter: adaptable XML filtering with prefix-caching suffix-clustering, in: Proceedings of the 32nd international conference on Very large data bases, Seoul, Korea, 2006, pp. 559–570. D.E. Simmen, M. Altinel, V. Markl, S. Padmanabhan, A. Singh, Damia: data mashups for intranet applications, in: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada, 2008, pp. 1171–1182. W3C (b23) 2010 Diao, Altinel, Franklin, Zhang, Fischer (b52) 2003; 28 Ferraiolo (b60) 2003 Adelberg (b55) 1998; 27 Heyman (b49) 2007; 40 Daniel, Matera (b14) 2014 J. Heasley, Securing XML data, in: Proceedings of the 1st annual conference on Information security curriculum development, Kennesaw, Georgia, 2004, pp. 112–114. Pemberton (b2) 2002 B. Luo, D. Lee, W.-C. Lee, P. Liu, QFilter: fine-grained run-time XML access control via NFA-based query rewriting, in: Proceedings of the thirteenth ACM international conference on Information and knowledge management, Washington, D.C. USA, 2004, pp. 543–552. Xu, Ayachit, Reddyreddy (b36) 2008; 3 Stolee, Elbaum, Sarma (b13) 2013; 55 Hwang, Chang (b31) 2004; 23 P. Buneman, S. Naqvi, V. Tannen, L. Wong, Principles of programming with complex objects and collection types, in: Selected papers of the fourth international conference on Database theory, Berlin, Germany, 1995, pp. 3–48. Braga, Campi, Ceri (b8) 2005; 30 E. Pietriga, J.-Y. Vion-Dury, V. Quint, VXT: a visual approach to XML transformations, in: Proceedings of the 2001 ACM Symposium on Document engineering, Atlanta, Georgia, USA, 2001, pp. 1–10. buildingSMART. ifcXML Overview. Available . Damiani, d. Vimercati, Paraboschi, Samarati (b42) 2002; 5 Hidders, Kwasnikowska, Sroka, Tyszkiewicz, d. Bussche (b19) 2008; 33 B. Zhao, R. Sandhu, X. Zhang, X. Qin, Towards a times-based usage control model, in: Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, Redondo Beach, CA, USA, 2007, pp. 227–242. Timmerer, Hellwagner (b54) 2005; 12 Piatek (b47) 2004 B. Pellan, C. Concolato, Adaptation of scalable multimedia documents, in: Proceeding of the eighth ACM symposium on Document engineering, Sao Paulo, Brazil, 2008, pp. 32–41. Takeshi Imamura, Ed Simon (b50) 2005 C.-H. Lim, S. Park, S.H. Son, Access control of XML documents considering update operations, in: Proceedings of the 2003 ACM workshop on XML security, Fairfax, Virginia, 2003, pp. 49–59. Oinn, Greenwood, Addis, Alpdemir, Ferris, Glover (b65) 2006; 18 Yu, Chiueh (b46) 2004 Lorenzo, Hacid, Paik, Benatallah (b30) 2009; 38 Erwig, Smeltzer, Wang (b62) 2017; 38 Villard, Roisin, Layaıda (b61) 2000 T. Lemlouma, N. Layaıda, SMIL content adaptation for embedded devices, in: IN SMIL EUROPE 2003 CONFERENCE, 2003, pp. 12–14. R.J. Ennals, M.N. Garofalakis, MashMaker: mashups for the masses, in: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, Beijing, China, 2007, pp. 1116–1118. I. Fundulaki, S. Maneth, Formalizing XML access control for update operations, in: Proceedings of the 12th ACM symposium on Access control models and technologies, Sophia Antipolis, France, 2007, pp. 169–174. Eastman, Eastman, Teicholz, Sacks (b7) 2011 Harrison, Ruzzo, Ullman (b38) 1976; 19 I. Kofler, C. Timmerer, H. Hellwagner, T. Ahmed, Towards MPEG-21-based cross-layer multimedia content adaptation, in: Proceedings of the Second International Workshop on Semantic Media Adaptation and Personalization, 2007, pp. 3–8. S. Ceri, S. Comai, E. Damiani, P. Fraternali, L. Tanca, Complex queries in XML-GL, in: Proceedings of the 2000 ACM Symposium on Applied Computing, Vol. 2, Como, Italy, 2000, pp. 888–893. Kay (b25) 2007 Bulterman (b59) 2005 W3C (b24) 1999 Lawson, Sharp (b1) 2011 Park, Sandhu (b45) 2004; 7 Zenel (b48) 1998 V. Crescenzi, G. Mecca, P. Merialdo, Automatic web information extraction in the ROADRUNNER system, in: Revised Papers from the HUMACS, DASWIS, ECOMO, and DAMA on ER 2001 Workshops, 2002, pp. 264–277. J. Hidders, N. Kwasnikowska, J. Sroka, J. Tyszkiewicz, J.V. den Bussche, Petri net + nested relational calculus = dataflow, in: OTM Conferences, 1’05, ed, 2005, pp. 220–237. R.K. Thomas, R.S. Sandhu, Task-Based Authorization Controls (TBAC): A family of models for active and enterprise-oriented autorization management, in: Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1998, pp. 166–181. Dolin, Alschuler, Boyer, Beebe, Behlen, Biron (b5) 2006; 13 Auguston, Delgado (b20) 1996 C.-H. Chang, S.-C. Lui, IEPAD: information extraction based on pattern discovery, in: Proceedings of the 10th international conference on World Wide Web, Hong Kong, Hong Kong, 2001, pp. 681–688. Byun, Lee, Park (b53) 2007 M. Auguston, A. Delgado, Iterative constructs in the visual data flow language, in: Proceedings of the 1997 IEEE Symposium on Visual Languages, VL ’97, 1997, pp. 152–159. Ouyang, Verbeek, v. d. Aalst, Breutel, Dumas, t. Hofstede (b68) 2007; 67 M. Erwig, A visual language for XML, Visual Languages, in: IEEE Symposium on, 2000 pp. 47–54. A.A.E. Kalam, S. Benferhat, A. Miuge, R.E. Baida, F. Cuppens, C. Saurel, et al. Organization based access control, in: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, 2003, pp. 120–131. Johnston, Hanna, Millar (b22) 2004; 36 M. Altinel, M.J. Franklin, Efficient filtering of XML documents for selective dissemination of information, in: Proceedings of the 26th International Conference on Very Large Data Bases, 2000, pp. 53–64. Foundation (b3) 2004 Wright (b35) 2004; 11 Ceri, Comai, Fraternali, Paraboschi, Tanca, Damiani (b10) 1999 Ferraiolo, Sandhu, Gavrila, Kuhn, Chandramouli (b39) 2001; 4 Lautenbach (b33) 2004; 9 Daniel (10.1016/j.cosrev.2021.100367_b14) 2014 10.1016/j.cosrev.2021.100367_b44 10.1016/j.cosrev.2021.100367_b43 Ferraiolo (10.1016/j.cosrev.2021.100367_b39) 2001; 4 Diao (10.1016/j.cosrev.2021.100367_b52) 2003; 28 10.1016/j.cosrev.2021.100367_b40 Xu (10.1016/j.cosrev.2021.100367_b36) 2008; 3 10.1016/j.cosrev.2021.100367_b41 Piatek (10.1016/j.cosrev.2021.100367_b47) 2004 Pemberton (10.1016/j.cosrev.2021.100367_b2) 2002 Park (10.1016/j.cosrev.2021.100367_b45) 2004; 7 Oinn (10.1016/j.cosrev.2021.100367_b65) 2006; 18 10.1016/j.cosrev.2021.100367_b6 Foundation (10.1016/j.cosrev.2021.100367_b3) 2004 Dolin (10.1016/j.cosrev.2021.100367_b5) 2006; 13 10.1016/j.cosrev.2021.100367_b9 Hidders (10.1016/j.cosrev.2021.100367_b19) 2008; 33 Lorenzo (10.1016/j.cosrev.2021.100367_b30) 2009; 38 Bulterman (10.1016/j.cosrev.2021.100367_b59) 2005 10.1016/j.cosrev.2021.100367_b18 W3C (10.1016/j.cosrev.2021.100367_b26) 1999 Heyman (10.1016/j.cosrev.2021.100367_b49) 2007; 40 10.1016/j.cosrev.2021.100367_b15 10.1016/j.cosrev.2021.100367_b58 10.1016/j.cosrev.2021.100367_b17 10.1016/j.cosrev.2021.100367_b16 Eastman (10.1016/j.cosrev.2021.100367_b7) 2011 10.1016/j.cosrev.2021.100367_b11 10.1016/j.cosrev.2021.100367_b57 10.1016/j.cosrev.2021.100367_b12 10.1016/j.cosrev.2021.100367_b56 10.1016/j.cosrev.2021.100367_b51 Auguston (10.1016/j.cosrev.2021.100367_b20) 1996 MasterCard (10.1016/j.cosrev.2021.100367_b4) 2012 Kay (10.1016/j.cosrev.2021.100367_b25) 2007 Erwig (10.1016/j.cosrev.2021.100367_b62) 2017; 38 Wright (10.1016/j.cosrev.2021.100367_b35) 2004; 11 Johnston (10.1016/j.cosrev.2021.100367_b22) 2004; 36 10.1016/j.cosrev.2021.100367_b28 10.1016/j.cosrev.2021.100367_b27 10.1016/j.cosrev.2021.100367_b66 10.1016/j.cosrev.2021.100367_b21 Lawson (10.1016/j.cosrev.2021.100367_b1) 2011 10.1016/j.cosrev.2021.100367_b67 I.B.M.-Group (10.1016/j.cosrev.2021.100367_b32) 2008 Takeshi Imamura (10.1016/j.cosrev.2021.100367_b50) 2005 10.1016/j.cosrev.2021.100367_b64 Loton (10.1016/j.cosrev.2021.100367_b29) 2008 Damiani (10.1016/j.cosrev.2021.100367_b42) 2002; 5 Yu (10.1016/j.cosrev.2021.100367_b46) 2004 10.1016/j.cosrev.2021.100367_b63 Timmerer (10.1016/j.cosrev.2021.100367_b54) 2005; 12 Ferraiolo (10.1016/j.cosrev.2021.100367_b60) 2003 Zenel (10.1016/j.cosrev.2021.100367_b48) 1998 10.1016/j.cosrev.2021.100367_b37 Villard (10.1016/j.cosrev.2021.100367_b61) 2000 Ouyang (10.1016/j.cosrev.2021.100367_b68) 2007; 67 Hwang (10.1016/j.cosrev.2021.100367_b31) 2004; 23 10.1016/j.cosrev.2021.100367_b34 W3C (10.1016/j.cosrev.2021.100367_b23) 2010 Braga (10.1016/j.cosrev.2021.100367_b8) 2005; 30 Stolee (10.1016/j.cosrev.2021.100367_b13) 2013; 55 Adelberg (10.1016/j.cosrev.2021.100367_b55) 1998; 27 Ceri (10.1016/j.cosrev.2021.100367_b10) 1999 Harrison (10.1016/j.cosrev.2021.100367_b38) 1976; 19 Byun (10.1016/j.cosrev.2021.100367_b53) 2007 W3C (10.1016/j.cosrev.2021.100367_b24) 1999 Lautenbach (10.1016/j.cosrev.2021.100367_b33) 2004; 9 |
| References_xml | – volume: 40 start-page: 17 year: 2007 end-page: 19 ident: b49 article-title: A new virtual private network for today’s mobile world publication-title: Computer – year: 2010 ident: b23 article-title: XQuery 1.0: An XML Query Language – year: 2011 ident: b7 article-title: BIM Handbook: A Guide To Building Information Modeling for Owners, Managers, Designers, Engineers and Contractors – start-page: 136 year: 2007 end-page: 143 ident: b53 article-title: A keyword-based filtering technique of document-centric XML using NFA representation publication-title: Int. J. Appl. Math. Comput. Sci. – volume: 7 start-page: 128 year: 2004 end-page: 174 ident: b45 article-title: The uconabc usage control model publication-title: ACM Trans. Inf. Syst. Secur. – year: 1999 ident: b26 article-title: Extensible stylesheet language transformations -XSLT 1.0 – start-page: 8 year: 2004 ident: b47 article-title: Distributed web proxy caching in a local network environment publication-title: The Student Research Competition – volume: 5 start-page: 169 year: 2002 end-page: 202 ident: b42 article-title: A fine-grained access control system for XML documents publication-title: ACM Trans. Inf. Syst. Secur. – start-page: 2 year: 2004 end-page: 24 ident: b46 article-title: Enterprise digital rights management: Solutions against information theft by insiders publication-title: Research Proficiency Examination – start-page: 104 year: 2000 end-page: 119 ident: b61 article-title: An XML-based multimedia document processing model for content adaptation publication-title: Digital Documents: Systems and Principles – reference: B. Luo, D. Lee, W.-C. Lee, P. Liu, QFilter: fine-grained run-time XML access control via NFA-based query rewriting, in: Proceedings of the thirteenth ACM international conference on Information and knowledge management, Washington, D.C. USA, 2004, pp. 543–552. – reference: B. Zhao, R. Sandhu, X. Zhang, X. Qin, Towards a times-based usage control model, in: Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security, Redondo Beach, CA, USA, 2007, pp. 227–242. – volume: 55 start-page: 1289 year: 2013 end-page: 1303 ident: b13 article-title: Discovering how end-user programmers and their communities use public repositories: A study on Yahoo! pipes publication-title: Inf. Softw. Technol. – volume: 38 start-page: 59 year: 2009 end-page: 66 ident: b30 article-title: Data integration in mashups publication-title: SIGMOD Rec. – start-page: 151 year: 1999 end-page: 165 ident: b10 article-title: XML-GL: A graphical language for querying and restructuring XML documents publication-title: SEBD – reference: D.E. Simmen, M. Altinel, V. Markl, S. Padmanabhan, A. Singh, Damia: data mashups for intranet applications, in: Proceedings of the 2008 ACM SIGMOD international conference on Management of data, Vancouver, Canada, 2008, pp. 1171–1182. – start-page: 2 year: 2008 end-page: 4 ident: b32 article-title: IBM websphere datapower XML security gateway XS40 – year: 2003 ident: b60 article-title: Scalable vector graphics (SVG) 1.1 specification – reference: I. Fundulaki, S. Maneth, Formalizing XML access control for update operations, in: Proceedings of the 12th ACM symposium on Access control models and technologies, Sophia Antipolis, France, 2007, pp. 169–174. – volume: 33 start-page: 261 year: 2008 end-page: 284 ident: b19 article-title: DFL: A dataflow language based on Petri nets and nested relational calculus publication-title: Inf. Syst. – year: 1999 ident: b24 article-title: XML path language (Xpath) version 1.0 – reference: S. Ceri, S. Comai, E. Damiani, P. Fraternali, L. Tanca, Complex queries in XML-GL, in: Proceedings of the 2000 ACM Symposium on Applied Computing, Vol. 2, Como, Italy, 2000, pp. 888–893. – reference: M. Erwig, A visual language for XML, Visual Languages, in: IEEE Symposium on, 2000 pp. 47–54. – start-page: 6 year: 1996 ident: b20 article-title: The V Experimental Visual Programming Language – reference: C.-H. Lim, S. Park, S.H. Son, Access control of XML documents considering update operations, in: Proceedings of the 2003 ACM workshop on XML security, Fairfax, Virginia, 2003, pp. 49–59. – year: 2004 ident: b3 article-title: Extensible messaging and presence protocol (XMPP): Instant messaging and presence – volume: 38 start-page: 9 year: 2017 end-page: 17 ident: b62 article-title: What is a visual language? publication-title: J. Vis. Lang. Comput. – year: 1998 ident: b48 article-title: A Proxy-Based Filtering Mechanism for the Mobile Environment – reference: J. Heasley, Securing XML data, in: Proceedings of the 1st annual conference on Information security curriculum development, Kennesaw, Georgia, 2004, pp. 112–114. – volume: 27 start-page: 283 year: 1998 end-page: 294 ident: b55 article-title: Nodose-a tool for semi-automatically extracting structured and semistructured data from text documents publication-title: SIGMOD Rec. – reference: S. Pettifer, K. Wolstencroft, P. Alper, T. Attwood, A. Coletta, C. Goble, et al. myGrid and UTOPIA: an integrated approach to enacting and visualising in silico experiments in the life sciences, in: Proceedings of the 4th international conference on Data integration in the life sciences, Philadelphia, PA, USA, 2007, pp. 59–70. – reference: D. Turi, P. Missier, C. Goble, D.D. Roure, T. Oinn, Taverna workflows: syntax and semantics, in: Proceedings of the Third IEEE International Conference on e-Science and Grid Computing, 2007, pp. 441–448. – volume: 9 start-page: 6 year: 2004 end-page: 18 ident: b33 article-title: Introduction to XML encryption and XML signature publication-title: Inf. Secur. Tech. Rep. – volume: 36 start-page: 1 year: 2004 end-page: 34 ident: b22 article-title: Advances in dataflow programming languages publication-title: ACM Comput. Surv. – reference: R.J. Ennals, M.N. Garofalakis, MashMaker: mashups for the masses, in: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, Beijing, China, 2007, pp. 1116–1118. – volume: 11 start-page: 5 year: 2004 ident: b35 article-title: Security, privacy, and anonymity publication-title: Crossroads Mag. – volume: 28 start-page: 467 year: 2003 end-page: 516 ident: b52 article-title: Path sharing and predicate evaluation for high-performance XML filtering publication-title: ACM Trans. Database Syst. – reference: M. Auguston, A. Delgado, Iterative constructs in the visual data flow language, in: Proceedings of the 1997 IEEE Symposium on Visual Languages, VL ’97, 1997, pp. 152–159. – volume: 30 start-page: 398 year: 2005 end-page: 443 ident: b8 article-title: XQBE (xquery by example): a visual interface to the standard XML query language publication-title: ACM Trans. Database Syst. – reference: E. Pietriga, J.-Y. Vion-Dury, V. Quint, VXT: a visual approach to XML transformations, in: Proceedings of the 2001 ACM Symposium on Document engineering, Atlanta, Georgia, USA, 2001, pp. 1–10. – year: 2011 ident: b1 article-title: Introducing Html5 – year: 2014 ident: b14 article-title: Mashups: Concepts, Models and Architectures – volume: 12 start-page: 74 year: 2005 end-page: 79 ident: b54 article-title: Interoperable adaptive multimedia communication publication-title: IEEE MultiMedia – year: 2005 ident: b59 article-title: Synchronized multimedia integration language (SMIL 2.1) specification – start-page: 128 year: 2008 ident: b29 article-title: Introduction to microsoft popfly, no programming required publication-title: Bibliometrics – reference: K.S. Candan, W.-P. Hsiung, S. Chen, J. Tatemura, D. Agrawal, AFilter: adaptable XML filtering with prefix-caching suffix-clustering, in: Proceedings of the 32nd international conference on Very large data bases, Seoul, Korea, 2006, pp. 559–570. – reference: T. Lemlouma, N. Layaıda, SMIL content adaptation for embedded devices, in: IN SMIL EUROPE 2003 CONFERENCE, 2003, pp. 12–14. – reference: M. Altinel, M.J. Franklin, Efficient filtering of XML documents for selective dissemination of information, in: Proceedings of the 26th International Conference on Very Large Data Bases, 2000, pp. 53–64. – reference: A.A.E. Kalam, S. Benferhat, A. Miuge, R.E. Baida, F. Cuppens, C. Saurel, et al. Organization based access control, in: Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks, 2003, pp. 120–131. – reference: C.-H. Chang, S.-C. Lui, IEPAD: information extraction based on pattern discovery, in: Proceedings of the 10th international conference on World Wide Web, Hong Kong, Hong Kong, 2001, pp. 681–688. – reference: J. Hidders, N. Kwasnikowska, J. Sroka, J. Tyszkiewicz, J.V. den Bussche, Petri net + nested relational calculus = dataflow, in: OTM Conferences, 1’05, ed, 2005, pp. 220–237. – reference: B. Pellan, C. Concolato, Adaptation of scalable multimedia documents, in: Proceeding of the eighth ACM symposium on Document engineering, Sao Paulo, Brazil, 2008, pp. 32–41. – reference: R.K. Thomas, R.S. Sandhu, Task-Based Authorization Controls (TBAC): A family of models for active and enterprise-oriented autorization management, in: Proceedings of the IFIP TC11 WG11.3 Eleventh International Conference on Database Securty XI: Status and Prospects, 1998, pp. 166–181. – reference: I. Kofler, C. Timmerer, H. Hellwagner, T. Ahmed, Towards MPEG-21-based cross-layer multimedia content adaptation, in: Proceedings of the Second International Workshop on Semantic Media Adaptation and Personalization, 2007, pp. 3–8. – year: 2012 ident: b4 article-title: Common data format 3 overview—XML data format – year: 2007 ident: b25 article-title: XSL transformations (XSLT) version 2.0 – volume: 23 start-page: 498 year: 2004 end-page: 529 ident: b31 article-title: An operational model and language support for securing XML documents publication-title: Comput. Secur. – reference: . – reference: P. Buneman, S. Naqvi, V. Tannen, L. Wong, Principles of programming with complex objects and collection types, in: Selected papers of the fourth international conference on Database theory, Berlin, Germany, 1995, pp. 3–48. – volume: 4 start-page: 224 year: 2001 end-page: 274 ident: b39 article-title: Proposed NIST standard for role-based access control publication-title: ACM Trans. Inf. Syst. Secur. – volume: 18 start-page: 1067 year: 2006 end-page: 1100 ident: b65 article-title: , taverna: lessons in creating a workflow environment for the life sciences: Research articles publication-title: Concurr. Comput. : Pract. Exper. – year: 2002 ident: b2 article-title: The extensible hypertext markup language: A reformulation of HTML 4.0 in XML 1.0 – reference: buildingSMART. ifcXML Overview. Available: – reference: V. Crescenzi, G. Mecca, P. Merialdo, Automatic web information extraction in the ROADRUNNER system, in: Revised Papers from the HUMACS, DASWIS, ECOMO, and DAMA on ER 2001 Workshops, 2002, pp. 264–277. – volume: 19 start-page: 461 year: 1976 end-page: 471 ident: b38 article-title: Protection in operating systems publication-title: Commun. ACM – volume: 67 start-page: 162 year: 2007 end-page: 198 ident: b68 article-title: Formal semantics and analysis of control flow in WS-BPEL publication-title: Sci. Comput. Program. – volume: 13 start-page: 30 year: 2006 end-page: 39 ident: b5 article-title: HL7 clinical document architecture, release 2 publication-title: J. Am. Med. Inf. Assoc. – volume: 3 start-page: 147 year: 2008 end-page: 160 ident: b36 article-title: Formal modelling and analysis of XML firewall for service-oriented systems publication-title: Int. J. Secur. Netw. – year: 2005 ident: b50 article-title: Syntax XML encryption, W3C – ident: 10.1016/j.cosrev.2021.100367_b44 doi: 10.1145/1266840.1266868 – ident: 10.1016/j.cosrev.2021.100367_b34 doi: 10.1145/968559.968568 – ident: 10.1016/j.cosrev.2021.100367_b12 doi: 10.1145/1376616.1376734 – ident: 10.1016/j.cosrev.2021.100367_b21 doi: 10.1109/E-SCIENCE.2007.71 – start-page: 6 year: 1996 ident: 10.1016/j.cosrev.2021.100367_b20 – year: 2005 ident: 10.1016/j.cosrev.2021.100367_b50 – start-page: 128 year: 2008 ident: 10.1016/j.cosrev.2021.100367_b29 article-title: Introduction to microsoft popfly, no programming required – ident: 10.1016/j.cosrev.2021.100367_b58 – year: 2007 ident: 10.1016/j.cosrev.2021.100367_b25 – ident: 10.1016/j.cosrev.2021.100367_b40 doi: 10.1007/978-0-387-35285-5_10 – start-page: 2 year: 2004 ident: 10.1016/j.cosrev.2021.100367_b46 article-title: Enterprise digital rights management: Solutions against information theft by insiders – volume: 3 start-page: 147 year: 2008 ident: 10.1016/j.cosrev.2021.100367_b36 article-title: Formal modelling and analysis of XML firewall for service-oriented systems publication-title: Int. J. Secur. Netw. doi: 10.1504/IJSN.2008.020089 – year: 2005 ident: 10.1016/j.cosrev.2021.100367_b59 – ident: 10.1016/j.cosrev.2021.100367_b66 doi: 10.1007/978-3-540-73255-6_8 – volume: 38 start-page: 59 year: 2009 ident: 10.1016/j.cosrev.2021.100367_b30 article-title: Data integration in mashups publication-title: SIGMOD Rec. doi: 10.1145/1558334.1558343 – volume: 55 start-page: 1289 year: 2013 ident: 10.1016/j.cosrev.2021.100367_b13 article-title: Discovering how end-user programmers and their communities use public repositories: A study on Yahoo! pipes publication-title: Inf. Softw. Technol. doi: 10.1016/j.infsof.2012.10.004 – year: 2012 ident: 10.1016/j.cosrev.2021.100367_b4 – year: 2004 ident: 10.1016/j.cosrev.2021.100367_b3 – year: 2014 ident: 10.1016/j.cosrev.2021.100367_b14 – volume: 28 start-page: 467 year: 2003 ident: 10.1016/j.cosrev.2021.100367_b52 article-title: Path sharing and predicate evaluation for high-performance XML filtering publication-title: ACM Trans. Database Syst. doi: 10.1145/958942.958947 – volume: 27 start-page: 283 year: 1998 ident: 10.1016/j.cosrev.2021.100367_b55 article-title: Nodose-a tool for semi-automatically extracting structured and semistructured data from text documents publication-title: SIGMOD Rec. doi: 10.1145/276305.276330 – volume: 12 start-page: 74 year: 2005 ident: 10.1016/j.cosrev.2021.100367_b54 article-title: Interoperable adaptive multimedia communication publication-title: IEEE MultiMedia doi: 10.1109/MMUL.2005.7 – volume: 67 start-page: 162 year: 2007 ident: 10.1016/j.cosrev.2021.100367_b68 article-title: Formal semantics and analysis of control flow in WS-BPEL publication-title: Sci. Comput. Program. doi: 10.1016/j.scico.2007.03.002 – volume: 36 start-page: 1 year: 2004 ident: 10.1016/j.cosrev.2021.100367_b22 article-title: Advances in dataflow programming languages publication-title: ACM Comput. Surv. doi: 10.1145/1013208.1013209 – volume: 23 start-page: 498 year: 2004 ident: 10.1016/j.cosrev.2021.100367_b31 article-title: An operational model and language support for securing XML documents publication-title: Comput. Secur. doi: 10.1016/j.cose.2004.03.003 – volume: 9 start-page: 6 year: 2004 ident: 10.1016/j.cosrev.2021.100367_b33 article-title: Introduction to XML encryption and XML signature publication-title: Inf. Secur. Tech. Rep. doi: 10.1016/S1363-4127(04)00028-7 – ident: 10.1016/j.cosrev.2021.100367_b43 doi: 10.1145/1031171.1031273 – volume: 11 start-page: 5 year: 2004 ident: 10.1016/j.cosrev.2021.100367_b35 article-title: Security, privacy, and anonymity publication-title: Crossroads Mag. doi: 10.1145/1144403.1144408 – start-page: 151 year: 1999 ident: 10.1016/j.cosrev.2021.100367_b10 article-title: XML-GL: A graphical language for querying and restructuring XML documents – ident: 10.1016/j.cosrev.2021.100367_b67 doi: 10.1016/0304-3975(95)00024-Q – year: 2002 ident: 10.1016/j.cosrev.2021.100367_b2 – volume: 40 start-page: 17 year: 2007 ident: 10.1016/j.cosrev.2021.100367_b49 article-title: A new virtual private network for today’s mobile world publication-title: Computer doi: 10.1109/MC.2007.410 – ident: 10.1016/j.cosrev.2021.100367_b6 – year: 2011 ident: 10.1016/j.cosrev.2021.100367_b7 – start-page: 2 year: 2008 ident: 10.1016/j.cosrev.2021.100367_b32 article-title: IBM websphere datapower XML security gateway XS40 – ident: 10.1016/j.cosrev.2021.100367_b15 doi: 10.1145/1059524.1059549 – year: 2011 ident: 10.1016/j.cosrev.2021.100367_b1 – year: 2010 ident: 10.1016/j.cosrev.2021.100367_b23 – ident: 10.1016/j.cosrev.2021.100367_b9 doi: 10.1109/VL.2000.874349 – year: 1999 ident: 10.1016/j.cosrev.2021.100367_b26 – start-page: 8 year: 2004 ident: 10.1016/j.cosrev.2021.100367_b47 article-title: Distributed web proxy caching in a local network environment – ident: 10.1016/j.cosrev.2021.100367_b37 – volume: 4 start-page: 224 year: 2001 ident: 10.1016/j.cosrev.2021.100367_b39 article-title: Proposed NIST standard for role-based access control publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/501978.501980 – volume: 30 start-page: 398 year: 2005 ident: 10.1016/j.cosrev.2021.100367_b8 article-title: XQBE (xquery by example): a visual interface to the standard XML query language publication-title: ACM Trans. Database Syst. doi: 10.1145/1071610.1071613 – volume: 38 start-page: 9 year: 2017 ident: 10.1016/j.cosrev.2021.100367_b62 article-title: What is a visual language? publication-title: J. Vis. Lang. Comput. doi: 10.1016/j.jvlc.2016.10.005 – volume: 19 start-page: 461 year: 1976 ident: 10.1016/j.cosrev.2021.100367_b38 article-title: Protection in operating systems publication-title: Commun. ACM doi: 10.1145/360303.360333 – volume: 13 start-page: 30 year: 2006 ident: 10.1016/j.cosrev.2021.100367_b5 article-title: HL7 clinical document architecture, release 2 publication-title: J. Am. Med. Inf. Assoc. doi: 10.1197/jamia.M1888 – volume: 5 start-page: 169 year: 2002 ident: 10.1016/j.cosrev.2021.100367_b42 article-title: A fine-grained access control system for XML documents publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/505586.505590 – year: 1999 ident: 10.1016/j.cosrev.2021.100367_b24 – ident: 10.1016/j.cosrev.2021.100367_b27 doi: 10.1145/338407.338677 – year: 1998 ident: 10.1016/j.cosrev.2021.100367_b48 – ident: 10.1016/j.cosrev.2021.100367_b63 doi: 10.1007/11575771_16 – ident: 10.1016/j.cosrev.2021.100367_b56 doi: 10.1145/371920.372182 – ident: 10.1016/j.cosrev.2021.100367_b57 doi: 10.1007/3-540-46140-X_21 – volume: 7 start-page: 128 year: 2004 ident: 10.1016/j.cosrev.2021.100367_b45 article-title: The uconabc usage control model publication-title: ACM Trans. Inf. Syst. Secur. doi: 10.1145/984334.984339 – ident: 10.1016/j.cosrev.2021.100367_b18 doi: 10.1145/1410140.1410148 – ident: 10.1016/j.cosrev.2021.100367_b41 – volume: 18 start-page: 1067 year: 2006 ident: 10.1016/j.cosrev.2021.100367_b65 article-title: , taverna: lessons in creating a workflow environment for the life sciences: Research articles publication-title: Concurr. Comput. : Pract. Exper. doi: 10.1002/cpe.993 – ident: 10.1016/j.cosrev.2021.100367_b16 doi: 10.1109/SMAP.2007.34 – ident: 10.1016/j.cosrev.2021.100367_b64 doi: 10.1109/VL.1997.626573 – start-page: 136 year: 2007 ident: 10.1016/j.cosrev.2021.100367_b53 article-title: A keyword-based filtering technique of document-centric XML using NFA representation publication-title: Int. J. Appl. Math. Comput. Sci. – ident: 10.1016/j.cosrev.2021.100367_b11 doi: 10.1145/502187.502189 – year: 2003 ident: 10.1016/j.cosrev.2021.100367_b60 – volume: 33 start-page: 261 year: 2008 ident: 10.1016/j.cosrev.2021.100367_b19 article-title: DFL: A dataflow language based on Petri nets and nested relational calculus publication-title: Inf. Syst. doi: 10.1016/j.is.2007.09.002 – start-page: 104 year: 2000 ident: 10.1016/j.cosrev.2021.100367_b61 article-title: An XML-based multimedia document processing model for content adaptation – ident: 10.1016/j.cosrev.2021.100367_b17 – ident: 10.1016/j.cosrev.2021.100367_b51 – ident: 10.1016/j.cosrev.2021.100367_b28 doi: 10.1145/1247480.1247626 |
| SSID | ssj0070056 |
| Score | 2.2296183 |
| SecondaryResourceType | review_article |
| Snippet | Since the emergence of web 2.0, data started floating all over the web, through online and offline applications, and across all application domains. Web data... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 100367 |
| SubjectTerms | Dataflow Mashups Semi-structured data Visual language Visual languages Web data XML XML control XML manipulation |
| Title | A survey on semi-structured web data manipulations by non-expert users |
| URI | https://dx.doi.org/10.1016/j.cosrev.2021.100367 |
| Volume | 40 |
| WOSCitedRecordID | wos000656789000002&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: ScienceDirect Freedom Collection - Elsevier customDbUrl: eissn: 1876-7745 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0070056 issn: 1574-0137 databaseCode: AIEXJ dateStart: 20070801 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1JT8QgFCZuBy_uxj0cvE0wpWWGcpwY14PxMCZza4DSZFyqmVaj_95HgVnUuBy8NA0prw0ffX3Q974PoUNuOeG4FoTSIiZMSEZEJHLSYTziiuZFnuhGbIJfXaX9vrj2knVVIyfAyzJ9fRVP_wo1tAHYtnT2D3CPjEIDnAPocATY4fgr4Lut6nn4Aq864FqZhwFxFLHPTaK5LUyUtbRJq4Og3FXZELR8LEnD9l-37L5FNRm0BuWHVqgBGk79UOiZO1djfTawhFn15EZCTMdpe8H3cZuQ4jhYgnN0XEreu1HLXsO_dLxuD-AWxq2y2jnW_tH48mme6w_fn1FWYEg4u82clcxayZyVWTQf87YAvzXfvTjpX4avLbdcpg0nrn_4UB7Z5PB9fpqvw4-JkKK3gpb8WgB3HYaraMaUa2g5jDb2bncdnXaxgxQ_lvgDpBggxRZSPAUpVm94DCluIN1AN6cnveNz4vUviIaFXE1U2pZ5URSwTE4jllMD0VpbdoxKlBYxjyWlkuXawIpWxYLKmBoFwUVkwA-nysTJJpqDW5kthMGM6qRJYhU6GVdaskJ3WF6whEc0l3IbJWFYMu3J4a1GyX32HSjbiIx6PTlylB-u52HEMz9jXeCWwTT6tufOH--0ixbHU3wPzQEqZh8t6Jd6UA0P_Bx6B82Jc_Y |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+survey+on+semi-structured+web+data+manipulations+by+non-expert+users&rft.jtitle=Computer+science+review&rft.au=Tekli%2C+Gilbert&rft.date=2021-05-01&rft.issn=1574-0137&rft.volume=40&rft.spage=100367&rft_id=info:doi/10.1016%2Fj.cosrev.2021.100367&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_cosrev_2021_100367 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1574-0137&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1574-0137&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1574-0137&client=summon |