Sciweavers

169 search results - page 11 / 34
» Schema Based XML Security: RBAC Approach
Sort
View
OTM
2005
Springer
15 years 2 months ago
Semantic Schema Matching
We view match as an operator that takes two graph-like structures (e.g., XML schemas) and produces a mapping between the nodes of these graphs that correspond semantically to each ...
Fausto Giunchiglia, Pavel Shvaiko, Mikalai Yatskev...
ACSAC
2000
IEEE
15 years 1 months ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
74
Voted
SACMAT
2010
ACM
15 years 2 months ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ER
2003
Springer
98views Database» more  ER 2003»
15 years 2 months ago
Extracting Relations from XML Documents
XML is becoming a prevalent format for data exchange. Many XML documents have complex schemas that are not always known, and can vary widely between information sources and applica...
Eugene Agichtein, C. T. Howard Ho, Vanja Josifovsk...
GEOINFO
2003
14 years 10 months ago
GMLA: A XML Schema for Integration and Exchange of Multidimensional-Geographical Data
The integration among DW, OLAP and GIS has been given considerable attention in recent years by many researchers and industrial corporations. This may be a result of: 1) DW/OLAP ca...
Robson do Nascimento Fidalgo, Joel da Silva, Val&e...