Computer Standards & Interfaces最新文献

筛选
英文 中文
Delta GUI change detection using inferred models 使用推断模型检测三角洲图形用户界面的变化
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-09-03 DOI: 10.1016/j.csi.2024.103925
Fernando Pastor Ricós , Beatriz Marín , Tanja E.J. Vos , Rick Neeft , Pekka Aho
{"title":"Delta GUI change detection using inferred models","authors":"Fernando Pastor Ricós ,&nbsp;Beatriz Marín ,&nbsp;Tanja E.J. Vos ,&nbsp;Rick Neeft ,&nbsp;Pekka Aho","doi":"10.1016/j.csi.2024.103925","DOIUrl":"10.1016/j.csi.2024.103925","url":null,"abstract":"<div><p>Recent software development methodologies emphasize iterative and incremental evolution to align with stakeholders’ needs. This perpetual and rapid software evolution demands ongoing research into verification practices and technologies that ensure swift responsiveness and effective management of software delta increments. Strategies such as code review have been widely adopted for development and verification, ensuring readability and consistency in the delta increments of software projects. However, the integration of techniques to detect and visually report delta changes within the Graphical User Interface (GUI) software applications remains an underutilized process. In this paper, we set out to achieve two objectives. First, we aim to conduct a comprehensive review of existing studies concerning GUI change detection in desktop, web, and mobile applications to recognize common practices. Second, we introduce a novel change detection tool capable of highlighting delta GUI changes for this diverse range of applications. To accomplish our first objective, we performed a systematic mapping of the literature using the Scopus database. To address the second objective, we designed and developed a GUI change detection tool. This tool simultaneously transits and compares state models inferred by a scriptless testing tool, enabling the detection and highlighting of GUI changes to detect the widgets or functionalities that have been added, removed, or modified. Our study reveals the existence of a multitude of techniques for change detection in specific GUI systems with different objectives. However, there is no widely adopted technique suitable for the diverse range of existing desktop, web, and mobile applications. Our tool and findings demonstrate the effectiveness of using inferred state models to highlight between 8 and 20 GUI changes in software delta increments containing a large number of changes over months and between 4 and 6 GUI changes in delta increments of small iterations performed over multiple weeks. Moreover, some of these changes were recognized by the software developers as GUI failures that required a fix. Finally, we expose the motivation for using this technique to help developers and testers analyze GUI changes to validate delta increments and detect potential GUI failures, thereby fostering knowledge dissemination and paving the way to standard practices.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103925"},"PeriodicalIF":4.1,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000941/pdfft?md5=27a9fbf4beea136b7a89fef0ed16bc0d&pid=1-s2.0-S0920548924000941-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web accessibility barriers and their cross-disability impact in eSystems: A scoping review 电子系统中的网络无障碍障碍及其跨残疾影响:范围审查
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-09-01 DOI: 10.1016/j.csi.2024.103923
Nikolaos Droutsas, Fotios Spyridonis, Damon Daylamani-Zad, Gheorghita Ghinea
{"title":"Web accessibility barriers and their cross-disability impact in eSystems: A scoping review","authors":"Nikolaos Droutsas,&nbsp;Fotios Spyridonis,&nbsp;Damon Daylamani-Zad,&nbsp;Gheorghita Ghinea","doi":"10.1016/j.csi.2024.103923","DOIUrl":"10.1016/j.csi.2024.103923","url":null,"abstract":"<div><p>Accessibility is an important component in the implementation of Web systems to ensure that these are usable, engaging, and enjoyable by all regardless of the level of ability, condition, or circumstances. Despite manifold efforts, the Web is still largely inaccessible for a plurality of reasons (<em>e.g.</em> poor navigation, lack of/unsuitable alternative text, complex Web forms) with significant impact on disabled users. The impact of Web accessibility barriers varies per disability, but current measures for the impact of barriers treat disabilities as a homogeneous group. In this work, we present a scoping review of the Web accessibility research landscape. Following a structured approach, 112 studies were reviewed, and findings are reported on common Web accessibility barriers and practices within the Web Accessibility Lifecycle. An assessment framework is further proposed to measure the impact of such barriers across disabled groups. Finally, the need for extensive qualitative research into organizational change and multinational studies on Web activity and disturbance by barriers per disabled user group are discussed as future avenues for accessibility research.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103923"},"PeriodicalIF":4.1,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000928/pdfft?md5=f921d53ae3864451cd5b1e92e1a7c0f1&pid=1-s2.0-S0920548924000928-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142229628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism GSParLib:统一 OpenCL 和 CUDA 的多级编程接口,用于表达流和数据并行性
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-08-30 DOI: 10.1016/j.csi.2024.103922
Dinei A. Rockenbach , Gabriell Araujo , Dalvan Griebler, Luiz Gustavo Fernandes
{"title":"GSParLib: A multi-level programming interface unifying OpenCL and CUDA for expressing stream and data parallelism","authors":"Dinei A. Rockenbach ,&nbsp;Gabriell Araujo ,&nbsp;Dalvan Griebler,&nbsp;Luiz Gustavo Fernandes","doi":"10.1016/j.csi.2024.103922","DOIUrl":"10.1016/j.csi.2024.103922","url":null,"abstract":"<div><p>The evolution of Graphics Processing Units (GPUs) has allowed the industry to overcome long-lasting problems and challenges. Many belong to the stream processing domain, whose central aspect is continuously receiving and processing data from streaming data producers such as cameras and sensors. Nonetheless, programming GPUs is challenging because it requires deep knowledge of many-core programming, mechanisms and optimizations for GPUs. Current GPU programming standards do not target stream processing and present programmability and code portability limitations. Among our main scientific contributions resides <span><span>GSParLib</span></span>, a C++ multi-level programming interface unifying <span>CUDA</span> and <span>OpenCL</span> for GPU processing on stream and data parallelism with negligible performance losses compared to manual implementations; <span><span>GSParLib</span></span> is organized in two layers: one for general-purpose computing and another for high-level structured programming based on parallel patterns; a methodology to provide unified and driver agnostic interfaces minimizing performance losses; a set of parallelism strategies and optimizations for GPU processing targeting stream and data parallelism; and new experiments covering GPU performance on applications exposing stream and data parallelism.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103922"},"PeriodicalIF":4.1,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142122719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms TDBAMLA:利用 LSTM 和注意力机制对安卓恶意软件进行时态和动态行为分析
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-08-30 DOI: 10.1016/j.csi.2024.103920
Harshal Devidas Misalkar , Pon Harshavardhanan
{"title":"TDBAMLA: Temporal and dynamic behavior analysis in Android malware using LSTM and attention mechanisms","authors":"Harshal Devidas Misalkar ,&nbsp;Pon Harshavardhanan","doi":"10.1016/j.csi.2024.103920","DOIUrl":"10.1016/j.csi.2024.103920","url":null,"abstract":"<div><p>The increasing ubiquity of Android devices has precipitated a concomitant surge in sophisticated malware attacks, posing critical challenges to cybersecurity infrastructures worldwide. Existing models have achieved significant strides in malware detection but often suffer from high false-positive rates, lower recall, and computational delays, thus demanding a more efficient and accurate system. Current techniques primarily rely on static features and simplistic learning models, leading to inadequate handling of temporal aspects and dynamic behaviors exhibited by advanced malware. These limitations compromise the detection of modern, evasive malware, and impede real-time analysis. This paper introduces a novel framework for Android malware detection that incorporates Temporal and Dynamic Behavior Analysis using Long Short-Term Memory (LSTM) networks and Attention Mechanisms. We further propose development of an efficient Grey Wolf Optimized (GWO) Decision Trees to find the most salient API call patterns associated with malwares. An Iterative Fuzzy Logic (IFL) layer is also deployed before classification to assess the \"trustworthiness\" of app metadata samples. For Ongoing Learning, we propose use of Deep Q-Networks (DQNs), which helps the reinforcement learning model to adapt more quickly to changes in the threat landscapes. By focusing on crucial system calls and behavioral characteristics in real-time, our model captures the nuanced temporal patterns often exhibited by advanced malwares. Empirical evaluations demonstrate remarkable improvements across multiple performance metrics. Compared to existing models, our approach enhances the precision of malware identification by 8.5 %, accuracy by 5.5 %, and recall by 4.9 %, while also achieving an 8.3 % improvement in the Area Under the Receiver Operating Characteristic Curve (AUC), with higher specificity and a 4.5 % reduction in identification delay. In malware pre-emption tasks, our model outperforms by improving precision by 4.3 %, accuracy by 3.9 %, recall by 4.9 %, AUC by 3.5 %, and increasing specificity by 2.9 %. These gains make our framework highly applicable for real-time detection systems, cloud-based security solutions, and threat intelligence services, thereby contributing to a safer Android ecosystem.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103920"},"PeriodicalIF":4.1,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods 谁是最佳贡献者?基于 ECM、TAM 和田口方法设计多模式科学传播界面
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-08-29 DOI: 10.1016/j.csi.2024.103921
Mengjun Huang , Yue Luo , Jiwei He , Ling Zhen , Lianfan Wu , Yang Zhang
{"title":"Who are the best contributors? Designing a multimodal science communication interface based on the ECM, TAM and the Taguchi methods","authors":"Mengjun Huang ,&nbsp;Yue Luo ,&nbsp;Jiwei He ,&nbsp;Ling Zhen ,&nbsp;Lianfan Wu ,&nbsp;Yang Zhang","doi":"10.1016/j.csi.2024.103921","DOIUrl":"10.1016/j.csi.2024.103921","url":null,"abstract":"<div><p>Science communication conducted through mobile devices and mobile applications is an efficient and widespread phenomenon that requires communicators and design practitioners to further develop suitable design elements and strategies for such platforms. The effective application of multimodal or multisensory design in interfaces provides users with rich experiences. However, there is a lack of guiding recommendations for user interface design in the citizen science community. This study investigated factors affecting users’ perceptions and behavioral intentions toward multimodal scientific communication interface designs and identified the optimal combinations of such factors for such designs. Through a focus group, we defined three design dimensions of a science communication interface: visual, auditory, and haptic. An online experiment involving 916 participants was then conducted and integrated the technology acceptance model, expectation–confirmation model, and Taguchi method to examine the hierarchical combinations with the greatest influence in each dimension. The results indicated that interface design combinations primarily focusing on visual elements, with auditory and haptic as secondary elements, can serve as effective tools for science communication. Moreover, layout, color tones, vibration intensity, and sound volume significantly affected users’ perceptions and behavioral intentions. As one of the few studies using the Taguchi method to explore the design of science communication interfaces, the present findings enrich the multimodal theory from the perspectives of design and communication, highlighting its value in science communication. This paper simultaneously provides insights into how to select and combine multimodal design elements in science communication interfaces, demonstrating the potential of such designs to affect a user perception, satisfaction, confirmation, and continued usage intention.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103921"},"PeriodicalIF":4.1,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142151244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique 基于蜂窝自动机的双图像安全可逆数据隐藏方案(使用比特反向置换技术
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-08-26 DOI: 10.1016/j.csi.2024.103919
Kankana Datta , Biswapati Jana , Mamata Dalui Chakraborty
{"title":"A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique","authors":"Kankana Datta ,&nbsp;Biswapati Jana ,&nbsp;Mamata Dalui Chakraborty","doi":"10.1016/j.csi.2024.103919","DOIUrl":"10.1016/j.csi.2024.103919","url":null,"abstract":"<div><p>With the rapid development of advanced communication technology, protection of confidential data during transmission through public channel has become a challenging issue. In this context, the design of a data hiding scheme needs to ensure reversibility, robustness against various malicious attacks, and unaltered visual quality even after embedding high amount of secret data. To meet the above requirements, Cellular Automata along with Bit-Reversal Permutation technique have been utilized on dual-image with the target to enhance the robustness of suggested scheme due to distribution of secret information within two stego images which is hard to extract without both stego simultaneously. The proposed scheme makes a trade-off among visual quality, security and embedding capacity as essential for ensuring innocuous communication. The experimental results and comparison with the state-of-art methods establishes that the proposed scheme ensures high degree of robustness against different venomous attacks. This approach may be beneficial to private and public sector practitioners and government agencies to protect valuable multimedia secret data from adversarial cyber attacks.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103919"},"PeriodicalIF":4.1,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142087777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication communication by using visualization cryptography for UAV networks 利用可视化加密技术进行无人机网络验证通信
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-08-18 DOI: 10.1016/j.csi.2024.103918
Aqeel Thamer Jawad , Rihab Maaloul , Lamia Chaari
{"title":"Authentication communication by using visualization cryptography for UAV networks","authors":"Aqeel Thamer Jawad ,&nbsp;Rihab Maaloul ,&nbsp;Lamia Chaari","doi":"10.1016/j.csi.2024.103918","DOIUrl":"10.1016/j.csi.2024.103918","url":null,"abstract":"<div><p>Utilizing unmanned aerial vehicles (UAVs) to support V2X requirements leverages their versatility and line-of-sight communication. Our prior work explored a multi-agent learning approach for resource optimization, maximizing task offloading while maintaining QoS. This paper focuses on securing UAV communication, particularly authentication. Traditional methods are often unsuitable due to UAV limitations. We propose a novel authentication mechanism for a single ground control station (GCS) interacting with multiple UAVs across flight sessions. The system utilizes a key generation method based on chaotic maps to create unique flight session keys for each pre-defined flight plan. These keys, along with flight plans, are registered in a secure database. During flight, the GCS verifies UAV identity by employing the flight session key and corresponding flight plan for message authentication. This approach reduces computational and communication overhead compared to traditional certificate exchanges and asymmetric cryptography, which are energy-intensive for UAVs. While not a comprehensive security solution, this method provides an initial layer of protection for the UAV network.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103918"},"PeriodicalIF":4.1,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142002235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large language models for code completion: A systematic literature review 用于代码自动补全的大型语言模型:系统性文献综述
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-08-18 DOI: 10.1016/j.csi.2024.103917
Rasha Ahmad Husein , Hala Aburajouh , Cagatay Catal
{"title":"Large language models for code completion: A systematic literature review","authors":"Rasha Ahmad Husein ,&nbsp;Hala Aburajouh ,&nbsp;Cagatay Catal","doi":"10.1016/j.csi.2024.103917","DOIUrl":"10.1016/j.csi.2024.103917","url":null,"abstract":"<div><p>Code completion serves as a fundamental aspect of modern software development, improving developers' coding processes. Integrating code completion tools into an Integrated Development Environment (IDE) or code editor enhances the coding process and boosts productivity by reducing errors and speeding up code writing while reducing cognitive load. This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. While several research papers have focused on the use of LLMs for code completion, these studies are fragmented, and there is no systematic overview of the use of LLMs for code completion. Therefore, we aimed to perform a Systematic Literature Review (SLR) study to investigate how LLMs have been applied for code completion so far. We have formulated several research questions to address how LLMs have been integrated for code completion-related tasks and to assess the efficacy of these LLMs in the context of code completion. To achieve this, we retrieved 244 papers from scientific databases using auto-search and specific keywords, finally selecting 23 primary studies based on an SLR methodology for in-depth analysis. This SLR study categorizes the granularity levels of code completion achieved by utilizing LLMs in IDEs, explores the existing issues in current code completion systems, how LLMs address these challenges, and the pre-training and fine-tuning methods employed. Additionally, this study identifies open research problems and outlines future research directions. Our analysis reveals that LLMs significantly enhance code completion performance across several programming languages and contexts, and their capability to predict relevant code snippets based on context and partial input boosts developer productivity substantially.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103917"},"PeriodicalIF":4.1,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0920548924000862/pdfft?md5=8314175bcf57b70427dd5c869ea42978&pid=1-s2.0-S0920548924000862-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142076551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain 两全其美:区块链上高效、可用、可审计的生物识别 ABC
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-08-13 DOI: 10.1016/j.csi.2024.103916
Neyire Deniz Sarier
{"title":"Best of two worlds: Efficient, usable and auditable biometric ABC on the blockchain","authors":"Neyire Deniz Sarier","doi":"10.1016/j.csi.2024.103916","DOIUrl":"10.1016/j.csi.2024.103916","url":null,"abstract":"<div><p>In García-Rodríguez et al. 2024, two generic constructions for biometric-based non-transferable Attribute Based Credentials (biometric ABC) are presented, which offer different trade-offs between efficiency and trust assumptions. In this paper, we focus on the second scheme denoted as BioABC-ZK that tries to remove the strong (and unrealistic) trust assumption on the Reader R, and we show that BioABC-ZK has a security flaw for a colluding R and Verifier V. Besides, BioABC-ZK lacks GDPR-compliance, which requires secure processing of biometrics, for instance in form of Fuzzy Extractors, as opposed to (<span><math><mi>i</mi></math></span>) storing the reference biometric template <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>B</mi><mi>i</mi><mi>o</mi></mrow></msub></math></span> in the user’s mobile phone and (<span><math><mrow><mi>i</mi><mi>i</mi></mrow></math></span>) processing of biometrics using an external untrusted R, whose foreign manufacturers are unlikely to adjust their products according to GDPR.</p><p>The contributions of this paper are threefold. First, we review efficient biometric ABC schemes to identify the privacy-by-design criteria for them. In view of these principles, we propose a new architecture for <em>biometric ABC</em> of Sarier 2021 by adapting the recently introduced <em>core/helper setting</em>. Briefly, a user in our modified setting is composed of a constrained core device (a SIM card) inside a helper device (a smart phone with dual SIM and face recognition feature), which – as opposed to García-Rodríguez et al. 2024 – does not need to store <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>B</mi><mi>i</mi><mi>o</mi></mrow></msub></math></span>. This way, the new design provides <em>Identity Privacy</em> without the need for an external R and/or a dedicated hardware per user such as a biometric smart card reader or a tamper proof smart card as in current hardware-bound credential systems. Besides, the new system maintains minimal hardware requirements on the SIM card – only responsible for storing ABC and helper data –, which results in easy adoption and usability without loosing efficiency, if deep face fuzzy vault and our modified ABC scheme are employed together. As a result, a total overhead of 500 ms to a showing of a comparable non-biometric ABC is obtained instead of the 2.1 s in García-Rodríguez et al. 2024 apart from the removal of computationally expensive pairings. Finally, as different from García-Rodríguez et al. 2024, auditing is achieved via Blockchain instead of proving in zero-knowledge the actual biometric matching by the user to reveal malicious behavior of R and V.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103916"},"PeriodicalIF":4.1,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141979792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A theory on human factors in DevOps adoption DevOps 应用中的人为因素理论
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2024-08-12 DOI: 10.1016/j.csi.2024.103907
Juanjo Pérez-Sánchez , Saima Rafi , Juan Manuel Carrillo de Gea , Joaquín Nicolás Ros , José Luis Fernández Alemán
{"title":"A theory on human factors in DevOps adoption","authors":"Juanjo Pérez-Sánchez ,&nbsp;Saima Rafi ,&nbsp;Juan Manuel Carrillo de Gea ,&nbsp;Joaquín Nicolás Ros ,&nbsp;José Luis Fernández Alemán","doi":"10.1016/j.csi.2024.103907","DOIUrl":"10.1016/j.csi.2024.103907","url":null,"abstract":"<div><h3>Context:</h3><p>DevOps is a software engineering paradigm that enables faster deliveries and higher quality products. However, DevOps adoption is a complex process that is still insufficiently supported by research. In addition, human factors are the main difficulty for a successful DevOps adoption, although very few studies address this topic.</p></div><div><h3>Objective:</h3><p>This paper addresses two research gaps identified in literature, namely: (1) the characterization of DevOps from the perspective of human factors, i.e. the description of DevOps’ human characteristics to better define it, and (2) the identification and analysis of human factors’ effect in the adoption of DevOps.</p></div><div><h3>Method:</h3><p>We employed a hybrid methodology that included a Systematic Mapping Study followed by the application of a clustering technique. A questionnaire for DevOps practitioners (<span><math><mrow><mi>n</mi><mo>=</mo><mn>15</mn></mrow></math></span>) was employed as an evaluation method.</p></div><div><h3>Results:</h3><p>A total of 59 human factors related to DevOps were identified, described, and synthesized. The results were used to build a theory on DevOps human factors.</p></div><div><h3>Conclusion:</h3><p>The main contribution of this paper is a theory proposal regarding human factors in DevOps adoption. The evaluation results show that almost every human factor identified in the mapping study was found relevant in DevOps adoption. The results of the study represent an extension of DevOps characterization and a first approximation to human factors in DevOps adoption.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"92 ","pages":"Article 103907"},"PeriodicalIF":4.1,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S092054892400076X/pdfft?md5=8a197a8035fc3bc559533baac7028e12&pid=1-s2.0-S092054892400076X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141993505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信