Sciweavers

99 search results - page 2 / 20
» A XML format secure protocol - OpenSST
Sort
View
IC
2004
13 years 7 months ago
Optimizing Performance of Web Services with Chunk-Overlaying and Pipelined-Send
The performance of a Web service is primarily dependent on the design and implementation of its SOAP toolkit. SOAP is widely implemented using HTTP as the transport protocol and X...
Nayef Abu-Ghazaleh, Madhusudhan Govindaraju, Micha...
ACSAC
2006
IEEE
13 years 11 months ago
Secure Distributed Cluster Formation in Wireless Sensor Networks
In wireless sensor networks, clustering sensor nodes into small groups is an effective technique to achieve scalability, self-organization, power saving, channel access, routing, ...
Kun Sun, Pai Peng, Peng Ning, Cliff Wang
COLCOM
2007
IEEE
13 years 9 months ago
A structure preserving approach for securing XML documents
With the widespread adoption of XML as the message format to disseminate content over distributed systems including Web Services and Publish-Subscribe systems, different methods ha...
Mohamed Nabeel, Elisa Bertino
EDBTW
2006
Springer
13 years 7 months ago
Query Translation for XPath-Based Security Views
Abstract. Since XML is used as a storage format in an increasing number of applications, security has become an important issue in XML databases. One aspect of security is restrict...
Roel Vercammen, Jan Hidders, Jan Paredaens
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 7 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu