Sciweavers

217 search results - page 21 / 44
» XML Security Using XSLT
Sort
View
ADC
2007
Springer
107views Database» more  ADC 2007»
15 years 3 months ago
A Processing Model for the Optimal Querying of Encrypted XML Documents in XQuery
XQuery is a powerful and convenient language that is designed for querying the data in XML documents. In this paper, we address how to optimally query encrypted XML documents usin...
Tao-Ku Chang, Gwan-Hwan Hwang
CIKM
2004
Springer
15 years 3 months ago
QFilter: fine-grained run-time XML access control via NFA-based query rewriting
At present, most of the state-of-the-art solutions for XML access controls are either (1) document-level access control techniques that are too limited to support fine-grained sec...
Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu
77
Voted
COMPSAC
2010
IEEE
14 years 4 months ago
Metamodel Recovery from Multi-tiered Domains Using Extended MARS
With the rapid development of model-driven engineering (MDE), domain-specific modeling has become a widely used software development technique. In MDE, metamodels represent a schem...
Qichao Liu, Barrett R. Bryant, Marjan Mernik
PLANX
2007
14 years 11 months ago
XML Transformation Language Based on Monadic Second Order Logic
Although monadic second-order logic (MSO) has been a foundation of XML queries, little work has attempted to take MSO formulae themselves as a programming construct. Indeed, MSO f...
Kazuhiro Inaba, Haruo Hosoya
SWS
2004
ACM
15 years 3 months ago
Applying hierarchical and role-based access control to XML documents
W3C Recommendations XML Encryption and XML-Digital Signature can be used to protect the confidentiality of and provide assurances about the integrity of XML documents transmitted...
Jason Crampton