Sciweavers

1403 search results - page 125 / 281
» Security Model for XML Data
Sort
View
PVLDB
2008
167views more  PVLDB 2008»
13 years 8 months ago
Keyword search on external memory data graphs
Keyword search on graph structured data has attracted a lot of attention in recent years. Graphs are a natural "lowest common denominator" representation which can combi...
Bhavana Bharat Dalvi, Meghana Kshirsagar, S. Sudar...
PODS
2009
ACM
122views Database» more  PODS 2009»
14 years 10 months ago
Satisfiability of downward XPath with data equality tests
In this work we investigate the satisfiability problem for the logic XPath( , , =), that includes all downward axes as well as equality and inequality tests. We address this probl...
Diego Figueira
SIGMOD
2002
ACM
134views Database» more  SIGMOD 2002»
14 years 10 months ago
QURSED: querying and reporting semistructured data
QURSED enables the development of web-based query forms and reports (QFRs) that query and report semistructured XML data, i.e., data that are characterized by nesting, irregularit...
Yannis Papakonstantinou, Michalis Petropoulos, Vas...
ESSOS
2009
Springer
14 years 5 months ago
Toward Non-security Failures as a Predictor of Security Faults and Failures
In the search for metrics that can predict the presence of vulnerabilities early in the software life cycle, there may be some benefit to choosing metrics from the non-security rea...
Michael Gegick, Pete Rotella, Laurie Williams
DBSEC
2004
97views Database» more  DBSEC 2004»
13 years 11 months ago
Configuring Storage Area Networks for Mandatory Security
Storage-area networks are a popular and efficient way of building large storage systems both in an enterprise environment and for multi-domain storage service providers. In both en...
Benjamin Aziz, Simon N. Foley, John Herbert, Garre...