Sciweavers

1403 search results - page 85 / 281
» Security Model for XML Data
Sort
View
BPSC
2009
184views Business» more  BPSC 2009»
15 years 5 months ago
Generating WS-SecurityPolicy Documents via Security Model Transformation
Abstract: When SOA-based business processes are to be enhanced with security properties, the model-driven business process development approach enables an easier and more reliable ...
Meiko Jensen
SIGMOD
2009
ACM
175views Database» more  SIGMOD 2009»
16 years 4 months ago
Keyword search on structured and semi-structured data
Empowering users to access databases using simple keywords can relieve the users from the steep learning curve of mastering a structured query language and understanding complex a...
Yi Chen, Wei Wang 0011, Ziyang Liu, Xuemin Lin
ER
2007
Springer
95views Database» more  ER 2007»
15 years 10 months ago
Providing Semantically Equivalent, Complete Views for Multilingual Access to Integrated Data
Today, there are several approaches supporting an integrated processing of XML and (object-)relational data sources. However, each of these approaches favors a single data model f...
Iryna Kozlova, Norbert Ritter, Martin Husemann
ISF
2007
121views more  ISF 2007»
15 years 4 months ago
Virtual organization security policies: An ontology-based integration approach
Abstract This paper addresses the specification of a security policy ontology framework to mediate security policies between virtual organizations (VO) and real organizations (RO)....
Saravanan Muthaiyah, Larry Kerschberg
ICSE
2008
IEEE-ACM
16 years 5 months ago
Data flow testing of service-oriented workflow applications
WS-BPEL applications are a kind of service-oriented application. They use XPath extensively to integrate loosely-coupled workflow steps. However, XPath may extract wrong data from...
Lijun Mei, W. K. Chan, T. H. Tse