Sciweavers

217 search results - page 17 / 44
» XML Security Using XSLT
Sort
View
KBSE
2005
IEEE
15 years 3 months ago
Clearwater: extensible, flexible, modular code generation
Distributed applications typically interact with a number of heterogeneous and autonomous components that evolve independently. Methodical development of such applications can ben...
Galen S. Swint, Calton Pu, Gueyoung Jung, Wenchang...
PODS
2010
ACM
170views Database» more  PODS 2010»
15 years 2 months ago
A learning algorithm for top-down XML transformations
A generalization from string to trees and from languages to translations is given of the classical result that any regular language can be learned from examples: it is shown that ...
Aurélien Lemay, Sebastian Maneth, Joachim N...
SIGMOD
2004
ACM
199views Database» more  SIGMOD 2004»
15 years 9 months ago
Approximate XML Query Answers
The rapid adoption of XML as the standard for data representation and exchange foreshadows a massive increase in the amounts of XML data collected, maintained, and queried over th...
Neoklis Polyzotis, Minos N. Garofalakis, Yannis E....
DEBU
1999
112views more  DEBU 1999»
14 years 9 months ago
Describing and Manipulating XML Data
This paper presents a brief overview of data management using the Extensible Markup Language (XML). It presents the basics of XML and the DTDs used to constrain XML data, and desc...
Sudarshan S. Chawathe
WWW
2003
ACM
15 years 10 months ago
Content extraction signatures using XML digital signatures and custom transforms on-demand
Content Extraction Signatures (CES) enable selective disclosure of verifiable content, provide privacy for blinded content, and enable the signer to specify the content the docume...
David Squire, Laurence Bull, Peter Stañski