메뉴 건너뛰기




Volumn , Issue , 2010, Pages 248-255

Towards an XML Adaptation/Alteration control framework

Author keywords

Adaptation and alteration; Composition; Modeling; Petri nets; XML control

Indexed keywords

ADAPTATION AND ALTERATION; AGGREGATION FUNCTIONS; COMPOSITION; COMPOSITION MODELING; CONTROL FRAMEWORK; EXISTING SYSTEMS; INFORMATION EXCHANGES; MODELING; NOVICE AND EXPERT PROGRAMMERS; SEMANTIC OPERATION; USER DEFINED FUNCTIONS; XML DATA; XML FILTERING;

EID: 77954518234     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICIW.2010.44     Document Type: Conference Paper
Times cited : (2)

References (32)
  • 6
    • 50049101018 scopus 로고    scopus 로고
    • A keyword based filtering technique of document centric XML using NFA representation
    • 2007
    • C. Byun, K. Lee and S. Park, A keyword based filtering technique of document centric XML using NFA representation, In: Int. J. Appl. Math. Comput. Sci. 4 (3) (2007), pp. 136-143 (2007).
    • (2007) Int. J. Appl. Math. Comput. Sci. , vol.4 , Issue.3 , pp. 136-143
    • Byun, C.1    Lee, K.2    Park, S.3
  • 12
    • 4544375498 scopus 로고    scopus 로고
    • An operational model and language support for securing XML documents
    • G.-H. Hwang and T.-K. Chang, An operational model and language support for securing XML documents, In: Computers & Security, pp.505-525 (2004).
    • (2004) Computers & Security , pp. 505-525
    • Hwang, G.-H.1    Chang, T.-K.2
  • 13
    • 62249216277 scopus 로고    scopus 로고
    • Formal modeling and analysis of XML firewall for service-oriented systems
    • H. Xu, M. Ayachit and A. Reddyreddy, Formal Modeling And Analysis Of XML Firewall For Service-Oriented Systems, In: Int. J. Security and Networks, No. 3, Vol. 3, pp.5-8 (2008).
    • (2008) Int. J. Security and Networks , vol.3 , Issue.3 , pp. 5-8
    • Xu, H.1    Ayachit, M.2    Reddyreddy, A.3
  • 14
    • 77954525788 scopus 로고    scopus 로고
    • IBM Corporation Software Group, In: IBM Corporation 2008
    • IBM Corporation Software Group, IBM WebSphere DataPower XML Security Gateway XS40, In: IBM Corporation 2008, pp. 2-4 (2008).
    • (2008) IBM WebSphere DataPower XML Security Gateway XS40 , pp. 2-4
  • 17
    • 85009084595 scopus 로고    scopus 로고
    • Towards SMIL as a foundation for multimodal, multimedia applications
    • J. Beckham, G. Di Fabbrizio and N. Klarlund, Towards SMIL as a Foundation for Multimodal, Multimedia Applications, In: W3C Position Paper, pp. 1363-1366 (2001).
    • (2001) W3C Position Paper , pp. 1363-1366
    • Beckham, J.1    Fabbrizio, G.D.2    Klarlund, N.3
  • 19
    • 64349111952 scopus 로고    scopus 로고
    • A new virtual private network for today's mobile world
    • K. Heyman, A New Virtual Private Network for Today's Mobile World, In: TECHNOLOGY NEWS, pp. 17-19 (2007).
    • (2007) Technology News , pp. 17-19
    • Heyman, K.1
  • 21
    • 84958784177 scopus 로고
    • An introduction to the theoretical aspects of coloured Petri Nets
    • LNCS, Verlag
    • K. Jensen, An Introduction to the Theoretical Aspects of Coloured Petri Nets, In: A Decade of Concurrency, LNCS, vol. 803, Verlag, pp.230-272 (1994).
    • (1994) A Decade of Concurrency , vol.803 , pp. 230-272
    • Jensen, K.1
  • 23
    • 84877335908 scopus 로고    scopus 로고
    • Efficient filtering of XML documents for selective dissemination of information
    • M. Altinel and M.J. Franklin, Efficient filtering of XML documents for selective dissemination of information, In: Proceedings of the 26th VLDB Conference, pp. 53-64 (2000).
    • (2000) Proceedings of the 26th VLDB Conference , pp. 53-64
    • Altinel, M.1    Franklin, M.J.2
  • 25
    • 77954480087 scopus 로고    scopus 로고
    • XML to XML through XML
    • P. Lemmens and G.-J. Houben, XML to XML through XML, In: WebNet 2001: pp. 772-777 (2001).
    • (2001) WebNet 2001 , pp. 772-777
    • Lemmens, P.1    Houben, G.-J.2
  • 26
    • 0002841051 scopus 로고    scopus 로고
    • Task-based Authorization Controls (TBAC): A family of models for active and enterprise-oriented authorization management
    • R. Thomas and R. Sandhu, Task-based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-oriented Authorization Management., In: the 11th IFIP Working Conference on Database Security, pp. 1-2 (1997).
    • (1997) 11th IFIP Working Conference on Database Security , pp. 1-2
    • Thomas, R.1    Sandhu, R.2
  • 28
    • 35248817413 scopus 로고    scopus 로고
    • Security, privacy, and anonymity
    • T. Wright, Security, Privacy, and Anonymity, In: The ACM StudentMagazine, pp. 1-2 (2004).
    • (2004) ACM StudentMagazine , pp. 1-2
    • Wright, T.1
  • 29
    • 77954463714 scopus 로고    scopus 로고
    • SMIL content adaptation for embedded devices
    • T. Lemlouma and N. Layada, SMIL Content Adaptation for Embedded Devices, In: SMILEurope 2002 Conference pp.1-11 (2002).
    • (2002) SMILEurope 2002 Conference , pp. 1-11
    • Lemlouma, T.1    Layada, N.2
  • 31
    • 70350394975 scopus 로고    scopus 로고
    • Enterprise digital rights management: Solutions against Information Theft by Insiders
    • Y. Yu and T.-C. Chiueh, Enterprise Digital Rights Management: Solutions against Information Theft by Insiders, In: Research Proficiency Examination (RPE) report, pp. 2-24 (2004).
    • (2004) Research Proficiency Examination (RPE) Report , pp. 2-24
    • Yu, Y.1    Chiueh, T.-C.2
  • 32
    • 3042746680 scopus 로고    scopus 로고
    • Path sharing and predicate evaluation for high performance XML filtering
    • 2003
    • Y. Diao, M. Altinel, M.J. Franklin, H. Zhang and P. Fischer, Path sharing and predicate evaluation for high performance XML filtering, In: ACM Trans. Database Syst. 28 (4) (2003), pp. 467-516 (2003).
    • (2003) ACM Trans. Database Syst. , vol.28 , Issue.4 , pp. 467-516
    • Diao, Y.1    Altinel, M.2    Franklin, M.J.3    Zhang, H.4    Fischer, P.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.