Sciweavers

1403 search results - page 93 / 281
» Security Model for XML Data
Sort
View
ICDM
2002
IEEE
114views Data Mining» more  ICDM 2002»
15 years 9 months ago
Online Algorithms for Mining Semi-structured Data Stream
In this paper, we study an online data mining problem from streams of semi-structured data such as XML data. Modeling semi-structured data and patterns as labeled ordered trees, w...
Tatsuya Asai, Hiroki Arimura, Kenji Abe, Shinji Ka...
CIKM
2009
Springer
15 years 9 months ago
Answering XML queries using materialized views revisited
Answering queries using views is a well-established technique in databases. In this context, two outstanding problems can be formulated. The first one consists in deciding whethe...
Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang
PODS
2003
ACM
107views Database» more  PODS 2003»
16 years 4 months ago
E-services: a look behind the curtain
The emerging paradigm of electronic services promises to bring to distributed computation and services the flexibility that the web has brought to the sharing of documents. An und...
Richard Hull, Michael Benedikt, Vassilis Christoph...
CSREASAM
2009
15 years 5 months ago
Security Level Determination Using Branes for Contextual Based Global Processing: An Architecture
This paper presents the basics of a new paradigm that allows generators and consumers of global contextual information to determine an appropriate security level needed for contex...
Greg Vert, Evangelos Triantaphyllou
VLDB
2006
ACM
122views Database» more  VLDB 2006»
16 years 4 months ago
A secure distributed framework for achieving k-anonymity
k-anonymity provides a measure of privacy protection by preventing re-identification of data to fewer than a group of k data items. While algorithms exist for producing k-anonymous...
Wei Jiang, Chris Clifton