Sciweavers

800 search results - page 8 / 160
» XML access control using static analysis
Sort
View
CCS
2007
ACM
15 years 4 months ago
Automaton segmentation: a new approach to preserve privacy in xml information brokering
A Distributed Information Brokering System (DIBS) is a peer-to-peer overlay network that comprises diverse data servers and brokering components helping client queries locate the ...
Fengjun Li, Bo Luo, Peng Liu, Dongwon Lee, Chao-Hs...
JFP
2006
80views more  JFP 2006»
14 years 10 months ago
Static analysis for path correctness of XML queries
A part of a query that will never contribute data to the query answer should be regarded as an error. This principle has been recently accepted into mainstream XML query languages...
Dario Colazzo, Giorgio Ghelli, Paolo Manghi, Carlo...
70
Voted
JCP
2008
141views more  JCP 2008»
14 years 10 months ago
Leakage Controlled Read Stable Static Random Access Memories
Semiconductor manufacturing process scaling increases leakage and transistor variations, both of which are problematic for static random access memory (SRAM). Since SRAM is a criti...
Sayeed A. Badrudduza, Ziyan Wang, Giby Samson, Law...
ICFP
2003
ACM
15 years 10 months ago
A static type system for JVM access control
This paper presents a static type system for JAVA Virtual Machine (JVM) code that enforces an access control mechanism similar to the one found, for example, in a JAVA implementat...
Tomoyuki Higuchi, Atsushi Ohori
97
Voted
ICECCS
2007
IEEE
154views Hardware» more  ICECCS 2007»
15 years 4 months ago
A light-weight static approach to analyzing UML behavioral properties
Identifying and resolving design problems in the early design phase can help ensure software quality and save costs. There are currently few tools for analyzing designs expressed ...
Lijun Yu, Robert B. France, Indrakshi Ray, Kevin L...