Sciweavers

276 search results - page 44 / 56
» Generalized XML security views
Sort
View
BTW
2007
Springer
236views Database» more  BTW 2007»
13 years 11 months ago
A Classification of Schema Mappings and Analysis of Mapping Tools
: Schema mapping techniques for data exchange have become popular and useful tools both in research and industry. A schema mapping relates a source schema with a target schema via ...
Frank Legler, Felix Naumann
GIS
2002
ACM
13 years 7 months ago
A WFS-based mediation system for GIS interoperability
The proliferation of spatial data on the Internet is beginning to allow a much wider access to data currently available in various Geographic Information Systems (GIS). In order t...
Omar Boucelma, Mehdi Essid, Zoé Lacroix
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
WWW
2003
ACM
14 years 8 months ago
Evaluating SOAP for High Performance Business Applications: Real-Time Trading Systems
Web services, with an emphasis on open standards and flexibility, may provide benefits over existing capital markets integration practices. However, web services must first meet c...
Christopher Kohlhoff, Robert Steele
GRID
2007
Springer
14 years 1 months ago
Resource usage policy expression and enforcement in grid computing
-- To date, not enough attention has been paid to issues surrounding the description and enforcement of policies for controlling Grid resources. These policies define the permitted...
Jun Feng, Glenn S. Wasson, Marty Humphrey