Sciweavers

86 search results - page 9 / 18
» A Schema Based Approach to Valid XML Access Control
Sort
View
ACSAC
2000
IEEE
13 years 11 months ago
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control
This contribution discusses a network-level access control technique that applies the non-discretionary access control model to individual data packets that are exchanged between ...
Reiner Sailer, M. Kabatnik
CNSR
2005
IEEE
14 years 1 months ago
Managing Access Control for Presence-Based Services
This paper presents an approach for managing access to services over presence-based communications based on the context of the situation. This paper addresses two technical challe...
Anand Dersingh, Ramiro Liscano, Allan G. Jost
EGC
2005
Springer
14 years 28 days ago
XDTM: The XML Data Type and Mapping for Specifying Datasets
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
JIB
2007
95views more  JIB 2007»
13 years 7 months ago
Integration of constraints documented in SBML, SBO, and the SBML Manual facilitates validation of biological models
The creation of quantitative, simulatable, Systems Biology Markup Language (SBML) models that accurately simulate the system under study is a time-intensive manual process that re...
Allyson L. Lister, Matthew R. Pocock, Anil Wipat
DASFAA
2006
IEEE
136views Database» more  DASFAA 2006»
14 years 1 months ago
Reuse or Never Reuse the Deleted Labels in XML Query Processing Based on Labeling Schemes
To facilitate the XML query processing, several kinds of labeling schemes have been proposed. Based on the labeling schemes, the ancestordescendant and parent-child relationships i...
Changqing Li, Tok Wang Ling, Min Hu