Sciweavers

3269 search results - page 153 / 654
» Query Optimization for XML
Sort
View
151
Voted
ICICS
2007
Springer
15 years 7 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
131
Voted
WWW
2005
ACM
16 years 4 months ago
TJFast: effective processing of XML twig pattern matching
Finding all the occurrences of a twig pattern in an XML database is a core operation for efficient evaluation of XML queries. A number of algorithms have been proposed to process ...
Jiaheng Lu, Ting Chen, Tok Wang Ling
DASFAA
2010
IEEE
176views Database» more  DASFAA 2010»
15 years 3 months ago
Efficient Database-Driven Evaluation of Security Clearance for Federated Access Control of Dynamic XML Documents
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
234
Voted
ICDE
2006
IEEE
179views Database» more  ICDE 2006»
16 years 5 months ago
ACXESS - Access Control for XML with Enhanced Security Specifications
We present ACXESS (Access Control for XML with Enhanced Security Specifications), a system for specifying and enforcing enhanced security constraints on XML via virtual "secu...
Sriram Mohan, Jonathan Klinginsmith, Arijit Sengup...
202
Voted
VLDB
2006
ACM
115views Database» more  VLDB 2006»
16 years 3 months ago
Integrating document and data retrieval based on XML
For querying structured and semistructured data, data retrieval and document retrieval are two valuable and complementary techniques that have not yet been fully integrated. In thi...
Jan-Marco Bremer, Michael Gertz