Sciweavers

1403 search results - page 28 / 281
» Security Model for XML Data
Sort
View
RIAO
2007
13 years 11 months ago
XML Fragments Extended with Database Operators
XML documents represent a middle range between unstructured data such as textual documents and fully structured data encoded in databases. Typically, information retrieval techniq...
Yosi Mass, Dafna Sheinwald, Benjamin Sznajder, Siv...
SIGMOD
2003
ACM
240views Database» more  SIGMOD 2003»
14 years 10 months ago
XRANK: Ranked Keyword Search over XML Documents
We consider the problem of efficiently producing ranked results for keyword search queries over hyperlinked XML documents. Evaluating keyword search queries over hierarchical XML ...
Lin Guo, Feng Shao, Chavdar Botev, Jayavel Shanmug...
ICICS
2007
Springer
14 years 1 months ago
Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures
Authentication is increasingly relevant to data management. Data is being outsourced to untrusted servers and clients want to securely update and query their data. For example, in ...
Charalampos Papamanthou, Roberto Tamassia
BXML
2004
13 years 11 months ago
Metaschema Layering for XML
: The Extensible Markup Language (XML) is based on the concept of schema languages, which are used for validation of XML documents. In most cases, the metamodeling view of XML-base...
Erik Wilde
SDMW
2004
Springer
14 years 3 months ago
Abstracting and Refining Authorization in SQL
ing and Refining Authorization in SQL Arnon Rosenthal, Edward Sciore1 The SQL standard specifies authorization via a large set of rather opaque rules, which are difficult to unders...
Arnon Rosenthal, Edward Sciore