Sciweavers

169 search results - page 11 / 34
» Schema Based XML Security: RBAC Approach
Sort
View
OTM
2005
Springer
14 years 1 months ago
Semantic Schema Matching
We view match as an operator that takes two graph-like structures (e.g., XML schemas) and produces a mapping between the nodes of these graphs that correspond semantically to each ...
Fausto Giunchiglia, Pavel Shvaiko, Mikalai Yatskev...
ACSAC
2000
IEEE
14 years 1 days ago
Extending Java for Package based Access Control
This paper describes an extension of the Java language that provides “programmable security.” The approach augments the Java syntax with constructs for specifying various acce...
John Hale, Mauricio Papa, Oliver Bremer, Rodrigo C...
SACMAT
2010
ACM
14 years 14 days ago
Role updating for assignments
The role-based access control (RBAC) has significantly simplified the management of users and permissions in computing systems. In dynamic environments, systems are usually unde...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
ER
2003
Springer
98views Database» more  ER 2003»
14 years 26 days ago
Extracting Relations from XML Documents
XML is becoming a prevalent format for data exchange. Many XML documents have complex schemas that are not always known, and can vary widely between information sources and applica...
Eugene Agichtein, C. T. Howard Ho, Vanja Josifovsk...
GEOINFO
2003
13 years 9 months ago
GMLA: A XML Schema for Integration and Exchange of Multidimensional-Geographical Data
The integration among DW, OLAP and GIS has been given considerable attention in recent years by many researchers and industrial corporations. This may be a result of: 1) DW/OLAP ca...
Robson do Nascimento Fidalgo, Joel da Silva, Val&e...