Sciweavers

DBSEC
2006
144views Database» more  DBSEC 2006»
13 years 6 months ago
Policy Classes and Query Rewriting Algorithm for XML Security Views
Most state-of-the-art approaches of securing XML documents are based on a partial annotation of an XML tree with security labels which are later propagated to unlabeled nodes of th...
Nataliya Rassadko
DEXA
2003
Springer
108views Database» more  DEXA 2003»
13 years 9 months ago
Repairing Inconsistent Merged XML Data
XML is rapidly becoming one of the most adopted standard for information representation and interchange over the Internet. With the proliferation of mobile devices of communication...
Wilfred Ng
DOCENG
2003
ACM
13 years 9 months ago
Extending xQuery with transformation operators
In this paper, we propose to extend XQuery - the XML query language - with a set of transformation operators which will produce a copy of an XML tree in which some subtrees will b...
Emmanuel Bruno, Jacques Le Maitre, Elisabeth Muris...
CIKM
2005
Springer
13 years 10 months ago
QED: a novel quaternary encoding to completely avoid re-labeling in XML updates
The method of assigning labels to the nodes of the XML tree is called a labeling scheme. Based on the labels only, both ordered and un-ordered queries can be processed without acc...
Changqing Li, Tok Wang Ling
DASFAA
2007
IEEE
221views Database» more  DASFAA 2007»
13 years 11 months ago
TwigList : Make Twig Pattern Matching Fast
Twig pattern matching problem has been widely studied in recent years. Give an XML tree T . A twig-pattern matching query, Q, represented as a query tree, is to find all the occur...
Lu Qin, Jeffrey Xu Yu, Bolin Ding