Results 1 - 10
of
842
Secured XML Emails
"... Abstract — The Email messages are not secured over the internet as the headers are not authentic. The secured XML email has development a method for establishing a secure e-mail communication channel between sender and recipient. Secured XML Email has the significant advantage that all headers are p ..."
Abstract
- Add to MetaCart
Abstract — The Email messages are not secured over the internet as the headers are not authentic. The secured XML email has development a method for establishing a secure e-mail communication channel between sender and recipient. Secured XML Email has the significant advantage that all headers
Securing XML Documents
- INTERNATIONAL CONFERENCE ON EXTENDING DATABASE TECHNOLOGY
, 2000
"... Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing by the Web of information that must be accessed in a selective way requires the definition and enforcement of security controls, ensuring that in ..."
Abstract
-
Cited by 80 (5 self)
- Add to MetaCart
Web-based applications greatly increase information availability and ease of access, which is optimal for public information. The distribution and sharing by the Web of information that must be accessed in a selective way requires the definition and enforcement of security controls, ensuring
Secure XML Querying with Security Views
, 2004
"... The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing sensitive information to unauthorized users. This paper introduces a novel paradigm for specifying XML security constrain ..."
Abstract
-
Cited by 98 (10 self)
- Add to MetaCart
The prevalent use of XML highlights the need for a generic, flexible access-control mechanism for XML documents that supports efficient and secure query access, without revealing sensitive information to unauthorized users. This paper introduces a novel paradigm for specifying XML security
Towards Secure XML Federations
, 2002
"... The integration of isolated XML repositories has drawn more and more interest recently. In this paper, we propose XML federations to provide global e-services while preserving the necessary autonomy and security of each individual repository. First we show a logical architecture of XML federations, ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
The integration of isolated XML repositories has drawn more and more interest recently. In this paper, we propose XML federations to provide global e-services while preserving the necessary autonomy and security of each individual repository. First we show a logical architecture of XML federations
SECURING XML DOCUMENTS
, 2004
"... XML (extensible markup language) is becoming the current standard for establishing interoperability on the Web. XML data are self-descriptive and syntax-extensible; this makes it very suitable for representation and exchange of semi-structured data, and allows users to define new elements for their ..."
Abstract
- Add to MetaCart
and effective XML processing has posed a new challenge for the database world. This paper discusses a fast and efficient indexing technique for XML documents, and introduces the XML graph numbering scheme. It can be used for indexing and securing graph structure of XML documents. This technique provides
A Secure XML Database
"... In this paper, we define a security model [14] for a native XML database which supports the XUpdate language. Our model is inspired by the SQL security model which is the most famous security model for database. We first define a generic access control model for tree data structures. Then, we apply ..."
Abstract
- Add to MetaCart
In this paper, we define a security model [14] for a native XML database which supports the XUpdate language. Our model is inspired by the SQL security model which is the most famous security model for database. We first define a generic access control model for tree data structures. Then, we apply
Modeling Secure XML Data Warehouses
"... Abstract: Dataware houses are most ordinarily employed in strategic decision making processes. These systems integrate heterogeneous causes which are not only restricted to their interior enterprise facts & figures but also encompass facts & figures from the WWW, the last mentioned of which ..."
Abstract
- Add to MetaCart
, we have proposed a methodological approach for the model driven development of secure XML data warehouses.
SECURING XML QUERY PROCESSING STORAGE
, 2005
"... The effective processing of semi-structured data queries is a preliminary part of data mining stage. XML queries employ regular path expressions to find structural patterns within XML documents. The operation of structural join is a crucial part of XML query processing. Existing approaches reduce co ..."
Abstract
- Add to MetaCart
complex join expressions to several binary structural joins. In this paper, we are proposing a new structural join algorithm called sequence join algorithm, for sequential regular path expressions in securing XML query processing storage. It exploits information about position of the elements in a product
Towards Securing XML Web Services
, 2002
"... HI:# #DD&4 ,/01 # 9999 9999 9999 + $%<$ ,- N #D D&$O 430 # 9999 9999 9999 C8M I:R72,9B 1. ..."
Abstract
-
Cited by 9 (0 self)
- Add to MetaCart
HI:# #DD&4 ,/01 # 9999 9999 9999 + $%<$ ,- N #D D&$O 430 # 9999 9999 9999 C8M I:R72,9B 1.
Efficient processing of secured XML metadata
- In Proceedings of Intl. Workshop on Security for Metadata
, 2003
"... Abstract. Metadata management is a key issue in intelligent Web-based environments. It plays an important role in a wide spectrum of areas, ranging from semantic explication, information handling, knowledge management, multimedia processing to personalized service delivery. As a result, security iss ..."
Abstract
-
Cited by 2 (2 self)
- Add to MetaCart
issues around metadata management needs to be addressed in order to build trust and confidence to ambient environments. The aim of this paper is to bring together the worlds of security and XML-formatted metadata management in such a way that, on the one hand the requirement on secure metadata management
Results 1 - 10
of
842