Sciweavers

1403 search results - page 79 / 281
» Security Model for XML Data
Sort
View
CSFW
2009
IEEE
15 years 8 months ago
Authentication without Elision: Partially Specified Protocols, Associated Data, and Cryptographic Models Described by Code
Specification documents for real-world authentication protocols typically mandate some aspects of a protocol's behavior but leave other features optional or undefined. In add...
Phillip Rogaway, Till Stegers
CSSE
2004
IEEE
15 years 4 months ago
A comparison of modeling strategies in defining XML-based access control languages
One of the most important features of XML-based Web services is that they can be easily accessed over the Internet, but this makes them vulnerable to a series of security threats....
Claudio Agostino Ardagna, Sabrina De Capitani di V...
DEXA
2003
Springer
135views Database» more  DEXA 2003»
15 years 9 months ago
On the Optimality of Holistic Algorithms for Twig Queries
Streaming XML documents has many emerging applications. However, in this paper, we show that the restrictions imposed by data streaming are too restrictive for processing twig quer...
Byron Choi, Malika Mahoui, Derick Wood
ADBIS
2000
Springer
106views Database» more  ADBIS 2000»
15 years 8 months ago
Using XML and Regular Expressions in the Syntactic Analysis of Inflectional Language
In this paper we describe an approach to representation of data and knowledge using two technologies: XML and regular expressions in a domain of natural language syntactic analysis...
Marek Trabalka, Mária Bieliková
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
15 years 5 months ago
Preemptive Measures against Malicious Party in Privacy-Preserving Data Mining
Currently, many privacy-preserving data mining (PPDM) algorithms assume the semi-honest model and/or malicious model of multi-party interaction. However, both models are far from ...
Shuguo Han, Wee Keong Ng