Sciweavers

217 search results - page 9 / 44
» XML Security Using XSLT
Sort
View
CORR
2002
Springer
81views Education» more  CORR 2002»
13 years 7 months ago
Towards practical meta-querying
We describe a meta-querying system for databases containing queries in addition to ordinary data. In the context of such databases, a meta-query is a query about queries. Represen...
Jan Van den Bussche, Stijn Vansummeren, Gottfried ...
JSS
2008
97views more  JSS 2008»
13 years 7 months ago
XML security - A comparative literature review
Since the turn of the millenium, Working Groups of the W3C have been concentrating on the development of XML based security standards, which are paraphrased as XML Security. XML S...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Mark...
ANSOFT
2002
100views more  ANSOFT 2002»
13 years 7 months ago
A Formal Object Approach to the Design of ZML
This paper addresses two issues: how formal object modeling techniques facilitate the XML application development and how XML technology helps formal/graphical software design proc...
Jing Sun, Jin Song Dong, Jing Liu, Hai H. Wang
DOCENG
2004
ACM
14 years 25 days ago
Logic-based XPath optimization
XPath [16] was introduced by the W3C as a standard language for specifying node selection, matching conditions, and for computing values from an XML document. XPath is now used in...
Pierre Genevès, Jean-Yves Vion-Dury
DOCENG
2007
ACM
13 years 11 months ago
Mapping paradigm for document transformation
Since the advent of XML, the ability to transform documents using transformation languages such as XSLT has become an important challenge. However, writing a transformation script...
Arnaud Blouin, Olivier Beaudoux