Business processes, the next-generation workflows, have attracted considerable research interest in the last 15 years. More recently, several XML-based languages have been propose...
Abstract. We present a method for mapping security levels among the components of a distributed system where data in the local sources are represented in XML. Distributed data is i...
Many data base applications require the storage and manipulation of different versions of data objects. To satisfy the diverse needs of these applications, current database system...