Sciweavers

169 search results - page 1 / 34
» Schema Based XML Security: RBAC Approach
Sort
View
DBSEC
2003
155views Database» more  DBSEC 2003»
13 years 6 months ago
Schema Based XML Security: RBAC Approach
As a platform-independent solution, XML is going to be used in many environments such as application integration and Web Services. Security of XML instance is a basic problem, esp...
Xinwen Zhang, Jaehong Park, Ravi S. Sandhu
CCS
2007
ACM
13 years 10 months ago
Administration in role-based access control
Administration of large-scale RBAC systems is a challenging open problem. We propose a principled approach in designing and analyzing administrative models for RBAC. We identify s...
Ninghui Li, Ziqing Mao
IIWAS
2008
13 years 6 months ago
A schema matching-based approach to XML schema clustering
The relationship between XML data clustering and schema matching is bidirectional. On one side, clustering techniques have been adopted to improve matching performance, and on the...
Alsayed Algergawy, Eike Schallehn, Gunter Saake
MM
2004
ACM
106views Multimedia» more  MM 2004»
13 years 10 months ago
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database
In this paper, a framework named SMARXO is proposed to address the security issues in multimedia applications by adopting RBAC (Role-Based Access Control), XML, and ObjectRelation...
Shu-Ching Chen, Mei-Ling Shyu, Na Zhao
APWEB
2004
Springer
13 years 10 months ago
Graphical Representation of XML Schema
XML is becoming the de-facto standard for exchanging information in distributed applications and services. This has resulted in the development of a large number of XML documents w...
Flora Dilys Salim, Rosanne Price, Maria Indrawan, ...