Search
w/in this Title
for Titles
All Reviews
Computer Standards & Interfaces
Elsevier Science Publishers B. V.
Options:
Date Reviewed
Title
Author
Publisher
Published Date
Descending Order
Ascending Order
1-10 of 14 reviews
Date Reviewed
Securing business processes using security risk-oriented patterns
Ahmed N., Matulevičius R. Computer Standards & Interfaces 36(4): 723-733, 2014. Type: Article
This well-written and clearly illustrated academic paper was first published in 2013. It covers the important area of security in the early design phase of software development....
Jun 18 2015
XML privacy protection model based on cloud storage
Guo L., Wang J., Du H. Computer Standards & Interfaces 36(3): 454-464, 2014. Type: Article
Data security in the cloud remains an active area of research. This paper provides a novel approach to protecting data privacy by leveraging the separation of Extensible Markup Language (XML) document content from its document format. ...
Aug 5 2014
Extending document models to incorporate semantic information for complex standards
Clowes D., Dawson R., Probets S. Computer Standards & Interfaces 36(1): 97-109, 2013. Type: Article
Important documents, especially standards documents describing (software) requirements for critical industries, really ought to be precise. Unfortunately, most of these documents are written in English prose, which is woefully imprecis...
Mar 17 2014
Easing the development of healthcare architectures following RM-ODP principles and healthcare standards
Calvillo J., RomáN I., Rivas S., Roa L. Computer Standards & Interfaces 35(3): 329-337, 2013. Type: Article
The application of information and communication technologies in the healthcare industry is a complex undertaking. Various standards have evolved in recent years in an attempt to maintain consistency in the face of the ever-increasing ...
Jun 27 2013
Security enhancement for anonymous secure e-voting over a network
Lin I., Hwang M., Chang C. Computer Standards & Interfaces 25(2): 131-139, 2003. Type: Article
Mu and Varadharajan [1] have proposed two versions of an anonymous secure electronic voting scheme to be implemented over a network. These algorithms are based on the ElGamal digital signature algorithm. This paper considers the second...
Sep 30 2003
Evolvable concurrent processes
Murakami M. Computer Standards & Interfaces 25(3): 233-239, 2003. Type: Article
A relationship between concurrent processes and linear logic allows one to formulate evolvable concurrent processes. Modifications are possible during execution triggered via messages, the effect of which replaces a definition of a pro...
Sep 22 2003
An application of the reference model for open distributed processing to electronic brokerage
Blinov M., Patel A. Computer Standards & Interfaces 25(4): 411-425, 2003. Type: Article
The design of an architecture for an electronic brokerage system, able to serve a heterogeneous set of users, is described in this paper. (The term brokerage is used here to mean any intermediary between buyer and seller, not restricte...
Sep 19 2003
Incremental introduction of behaviors with static software architecture
Jokinen J., Järvinen H., Mikkonen T. Computer Standards & Interfaces 25(3): 215-222, 2003. Type: Article
Software architecture is critically important, but, in practice, it is one of the least understood and formalized areas of computer science. This paper presents a practical approach to software architecture that enables incremental dev...
Aug 25 2003
Enterprise application integration in the electronic commerce world
Erasala N., Yen D., Rajkumar T. Computer Standards & Interfaces 25(2): 69-82, 2003. Type: Article
Enterprise application integration (EAI) is a paradigm that addresses the need to encourage the unhindered flow of information within business organizations. This paper examines EAI in detail, including why EAI makes sense for typical ...
Aug 21 2003
ACASA: a framework for adaptable COTS-aware software architecting
Chung L., Cooper K., Lee S., Shafique F., Yi A. Computer Standards & Interfaces 25(3): 223-231, 2003. Type: Article
The software industry has attempted to incorporate code reuse for years, and many hoped that component-based architectures could help bring true reuse to reality. Commercial off-the-shelf (COTS) components have great potential to signi...
Jul 23 2003
Display
5
10
15
25
50
100
per column
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy