We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...
Our Distributed Telecommunication Management System (DTMS) uses an object-oriented model to describe the networked Voice Communication System (VCS) to be managed. In order to allo...
The manual adaptation of conceptual models in general and reference models in particular is a time consuming and error prone task, which has to be carefully conducted. The configur...
Several XML query languages have been proposed that use XPath expressions to locate data. But XPath expressions might miss some data because of irregularities in the data and sche...
XPath [3, 5] is a powerful and quite successful language able to perform complex node selection in trees through compact specifications. As such, it plays a growing role in many ...