{"id":"https://openalex.org/W2011549379","doi":"https://doi.org/10.1109/icdim.2010.5664728","title":"Securing AJAX-enriched mobile environment for exchanging SVG-based learning materials","display_name":"Securing AJAX-enriched mobile environment for exchanging SVG-based learning materials","publication_year":2010,"publication_date":"2010-07-01","ids":{"openalex":"https://openalex.org/W2011549379","doi":"https://doi.org/10.1109/icdim.2010.5664728","mag":"2011549379"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2010.5664728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057095588","display_name":"Jinan Fiaidhi","orcid":"https://orcid.org/0000-0001-7063-6061"},"institutions":[{"id":"https://openalex.org/I72541430","display_name":"Lakehead University","ror":"https://ror.org/023p7mg82","country_code":"CA","type":"funder","lineage":["https://openalex.org/I72541430"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Jinan Fiaidhi","raw_affiliation_strings":["[Department of Computer Science, Lakehead University, Thunder Bay, Canada]"],"affiliations":[{"raw_affiliation_string":"[Department of Computer Science, Lakehead University, Thunder Bay, Canada]","institution_ids":["https://openalex.org/I72541430"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005050397","display_name":"Sabah Mohammed","orcid":"https://orcid.org/0000-0002-7639-0696"},"institutions":[{"id":"https://openalex.org/I72541430","display_name":"Lakehead University","ror":"https://ror.org/023p7mg82","country_code":"CA","type":"funder","lineage":["https://openalex.org/I72541430"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sabah Mohammed","raw_affiliation_strings":["[Department of Computer Science, Lakehead University, Thunder Bay, Canada]"],"affiliations":[{"raw_affiliation_string":"[Department of Computer Science, Lakehead University, Thunder Bay, Canada]","institution_ids":["https://openalex.org/I72541430"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040968198","display_name":"David A. J. Thomas","orcid":null},"institutions":[{"id":"https://openalex.org/I72541430","display_name":"Lakehead University","ror":"https://ror.org/023p7mg82","country_code":"CA","type":"funder","lineage":["https://openalex.org/I72541430"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"David A. J. Thomas","raw_affiliation_strings":["[Department of Computer Science, Lakehead University, Thunder Bay, Canada]"],"affiliations":[{"raw_affiliation_string":"[Department of Computer Science, Lakehead University, Thunder Bay, Canada]","institution_ids":["https://openalex.org/I72541430"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000798443","display_name":"Lyle F. Chamarette","orcid":null},"institutions":[{"id":"https://openalex.org/I72541430","display_name":"Lakehead University","ror":"https://ror.org/023p7mg82","country_code":"CA","type":"funder","lineage":["https://openalex.org/I72541430"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Lyle F. Chamarette","raw_affiliation_strings":["[Department of Computer Science, Lakehead University, Thunder Bay, Canada]"],"affiliations":[{"raw_affiliation_string":"[Department of Computer Science, Lakehead University, Thunder Bay, Canada]","institution_ids":["https://openalex.org/I72541430"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":64},"biblio":{"volume":null,"issue":null,"first_page":"472","last_page":"477"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9965,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10679","display_name":"Service-Oriented Architecture and Web Services","score":0.9965,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9942,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12601","display_name":"Web Applications and Data Management","score":0.9879,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalable-vector-graphics","display_name":"Scalable Vector Graphics","score":0.8421214},{"id":"https://openalex.org/keywords/soap","display_name":"SOAP","score":0.42477244}],"concepts":[{"id":"https://openalex.org/C504723692","wikidata":"https://www.wikidata.org/wiki/Q134471","display_name":"Ajax","level":3,"score":0.9523877},{"id":"https://openalex.org/C202629362","wikidata":"https://www.wikidata.org/wiki/Q2078","display_name":"Scalable Vector Graphics","level":2,"score":0.8421214},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.807189},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.6663043},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.61289406},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.43903202},{"id":"https://openalex.org/C17881449","wikidata":"https://www.wikidata.org/wiki/Q189620","display_name":"SOAP","level":2,"score":0.42477244},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.42002496},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.3993673},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.38414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20702147}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdim.2010.5664728","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.59}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":7,"referenced_works":["https://openalex.org/W1705476165","https://openalex.org/W2057991466","https://openalex.org/W2114507670","https://openalex.org/W2182219665","https://openalex.org/W2224414452","https://openalex.org/W2611767564","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W7843115","https://openalex.org/W2372773329","https://openalex.org/W2368248043","https://openalex.org/W2366987497","https://openalex.org/W2359570857","https://openalex.org/W2354762837","https://openalex.org/W2349787284","https://openalex.org/W2349583148","https://openalex.org/W2069570726","https://openalex.org/W2031196304"],"abstract_inverted_index":{"AJAX":[0,38,102,121],"applications":[1],"provide":[2],"new":[3,21],"learning":[4,112,166],"possibilities":[5],"through":[6],"its":[7],"support":[8],"to":[9,103,125],"dynamic":[10],"interaction,":[11],"knowledge":[12],"sharing,":[13],"and":[14,58,155],"collaboration.":[15],"Developers":[16],"should":[17],"be":[18,104,123],"weary":[19],"of":[20,37,40,66,96,110,138,157],"insecurities":[22],"introduced":[23],"by":[24,129,145],"these":[25],"capabilities.":[26],"The":[27,117],"mobile":[28,63,115,127,165],"industry":[29],"in":[30,84],"particular":[31],"has":[32],"not":[33],"made":[34],"better":[35],"use":[36],"because":[39,65],"the":[41,62,85,94,107,131,139,147,153],"complexities":[42],"involved":[43],"dealing":[44],"with":[45],"open":[46],"source":[47],"XMLized":[48],"documents":[49,54,113,161],"such":[50],"as":[51],"SVGs.":[52],"Such":[53],"are":[55,82],"becoming":[56],"more":[57,59],"popular":[60],"for":[61,76,106,152],"paradigm":[64],"their":[67,77],"ubiquity":[68],"nature.":[69],"However,":[70],"security":[71,141],"is":[72,143],"a":[73,87,97,126],"major":[74],"obstacle":[75],"wide":[78],"usage":[79],"since":[80],"SVGs":[81],"XML":[83,133,140],"end;":[86],"human":[88],"readable":[89],"text.":[90],"This":[91],"article":[92],"describes":[93],"development":[95],"prototype":[98,118],"that":[99],"enables":[100],"Mobile":[101],"used":[105],"secure":[108],"delivery":[109],"SVG-based":[111],"between":[114],"learners.":[116],"demonstrates":[119],"how":[120],"can":[122],"geared":[124],"environment":[128],"using":[130,146],"W3C":[132],"Security":[134],"standard.":[135],"Our":[136],"implementation":[137],"standard":[142],"achieved":[144],"lightweight":[148],"Bouncy":[149],"Castle":[150],"API":[151],"signing":[154],"authentication":[156],"SVG":[158],"Tiny":[159],"1.2":[160],"on":[162],"J2ME":[163],"CLDC":[164],"environment.":[167]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2011549379","counts_by_year":[],"updated_date":"2025-02-03T13:01:53.437427","created_date":"2016-06-24"}