Sciweavers

265 search results - page 25 / 53
» A role-based approach to access control for XML databases
Sort
View
EGC
2005
Springer
14 years 28 days ago
XDTM: The XML Data Type and Mapping for Specifying Datasets
We are concerned with the following problem: How do we allow a community of users to access and process diverse data stored in many different formats? Standard data formats and da...
Luc Moreau, Yong Zhao, Ian T. Foster, Jens-S. V&ou...
CCS
2007
ACM
14 years 1 months ago
A data outsourcing architecture combining cryptography and access control
Data outsourcing is becoming today a successful solution that allows users and organizations to exploit external servers for the distribution of resources. Some of the most challe...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
EDBTW
2006
Springer
13 years 11 months ago
Conflict Resolution in Updates Through XML Views
Abstract. In this paper, we focus on B2B scenarios where XML views are extracted from relational databases and sent over the Web to another application that edits them and sends th...
André Prisco Vargas, Vanessa P. Braganholo,...
CIKM
2005
Springer
14 years 29 days ago
QED: a novel quaternary encoding to completely avoid re-labeling in XML updates
The method of assigning labels to the nodes of the XML tree is called a labeling scheme. Based on the labels only, both ordered and un-ordered queries can be processed without acc...
Changqing Li, Tok Wang Ling
SIGMOD
2004
ACM
110views Database» more  SIGMOD 2004»
14 years 25 days ago
Liquid Data for WebLogic: Integrating Enterprise Data and Services
Information in today’s enterprises commonly resides in a variety of heterogeneous data sources, including relational databases, web services, files, packaged applications, and c...
Vinayak R. Borkar