Sciweavers

2036 search results - page 6 / 408
» Using and Abusing XML
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Security Policies to Mitigate Insider Threat in the Document Control Domain
With rapid advances in online technologies, organizations are migrating from paper based resources to digital documents to achieve high responsiveness and ease of management. Thes...
Suranjan Pramanik, Vidyaraman Sankaranarayanan, Sh...
CAISE
2003
Springer
14 years 29 days ago
Approaches to Implementing Tailored Metaschemas in XML
The unique selling point of XML as standard representation of content is its ease of use thus facilitating interoperability between various partners and platforms. To overcome XML ...
Martin Bernauer, Gerti Kappel, Gerhard Kramler
DASFAA
2005
IEEE
115views Database» more  DASFAA 2005»
14 years 1 months ago
A Unifying Framework for Merging and Evaluating XML Information
Abstract. With the ever increasing connection between XML information systems over the Web, users are able to obtain integrated sources of XML information in a cooperative manner, ...
Ho Lam Lau, Wilfred Ng
DEXA
2006
Springer
129views Database» more  DEXA 2006»
13 years 11 months ago
Selectively Storing XML Data in Relations
This paper presents a new framework for users to select relevant data from an XML document and store it in an existing relational database, as opposed to previous approaches that s...
Wenfei Fan, Lisha Ma
JSS
2008
97views more  JSS 2008»
13 years 7 months ago
XML security - A comparative literature review
Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML S...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Mark...