default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 118 matches
- 2017
- Babak Safabahar, Meghdad Mirabi:
A new structure and access mechanism for secure and efficient XML data broadcast in mobile wireless networks. J. Syst. Softw. 125: 119-132 (2017) - 2016
- S. Sankari, Sundan Bose:
Efficient Identification of Structural Relationships for XML Queries using Secure Labeling Schemes. Int. J. Intell. Inf. Technol. 12(4): 63-80 (2016) - S. Sankari, Sundan Bose:
A Detailed Survey on Recent Trends in Secure XML Labeling Schemes. ICIA 2016: 84:1-84:6 - 2015
- Meghdad Mirabi, Hamidah Ibrahim, Leila Fathi, Nur Izura Udzir, Ali Mamat:
A Dynamic Compressed Accessibility Map for Secure XML Querying and Updating. J. Inf. Sci. Eng. 31(1): 59-93 (2015) - Sun-Moon Jo, Kyung-Yong Chung:
Design of access control system for telemedicine secure XML documents. Multim. Tools Appl. 74(7): 2257-2271 (2015) - Damien Doligez, Christèle Faure, Thérèse Hardin, Manuel Maarek:
Avoiding Security Pitfalls with Functional Programming: A Report on the Development of a Secure XML Validator. ICSE (2) 2015: 209-218 - 2014
- Leila Fathi, Hamidah Ibrahim, Meghdad Mirabi:
An energy conservation indexing method for secure XML data broadcast in mobile wireless networks. Pervasive Mob. Comput. 13: 125-141 (2014) - Alban Gabillon:
A Logical Formalization of a Secure XML Database. CoRR abs/1405.5671 (2014) - Pawel Krawczyk:
Secure SAML validation to prevent XML signature wrapping attacks. CoRR abs/1401.7483 (2014) - 2013
- Rajni Mohana, Deepak Dahiya:
Specifying Access Policies for Secure Content Dissemination of XML: A Technique Inspired by DNA Cryptography. J. Comput. Inf. Technol. 21(2): 71-84 (2013) - Belén Vela, Jose-Norberto Mazón, Carlos Blanco, Eduardo Fernández-Medina, Juan Trujillo, Esperanza Marcos:
Development of Secure XML Data Warehouses with QVT. Inf. Softw. Technol. 55(9): 1651-1677 (2013) - Andreas Becker, Meiko Jensen:
Secure Combination of XML Signature Application with Message Aggregation in Multicast Settings. ICWS 2013: 531-538 - Houari Mahfoud, Abdessamad Imine, Michaël Rusinowitch:
SVMAX: a system for secure and valid manipulation of XML data. IDEAS 2013: 154-161 - 2012
- Belén Vela, Carlos Blanco, Eduardo Fernández-Medina, Esperanza Marcos:
A practical application of our MDD approach for modeling secure XML data warehouses. Decis. Support Syst. 52(4): 899-925 (2012) - Andrew Clarke, Eric Pardede, Robert Steele:
External and Distributed Databases: Efficient and Secure XML Query Assurance. Int. J. Comput. Intell. Syst. 5(3): 421-433 (2012) - Artem Chebotko, Seunghan Chang, Shiyong Lu, Farshad Fotouhi:
Secure XML querying based on authorization graphs. Inf. Syst. Frontiers 14(3): 617-632 (2012) - Houari Mahfoud, Abdessamad Imine:
On Securely Manipulating XML Data. FPS 2012: 293-307 - Houari Mahfoud, Abdessamad Imine:
A General Approach for Securely Updating XML Data. WebDB 2012: 55-60 - Houari Mahfoud, Abdessamad Imine:
Secure querying of recursive XML views: a standard xpath-based technique. WWW (Companion Volume) 2012: 575-576 - Meghdad Mirabi, Hamidah Ibrahim, Nur Izura Udzir, Ali Mamat:
A Compact Bit String Accessibility Map for Secure XML Query Processing. ANT/MobiWIS 2012: 1172-1179 - Houari Mahfoud, Abdessamad Imine:
A General Approach for Securely Querying and Updating XML Data. CoRR abs/1202.0018 (2012) - 2011
- Yousef Rabadi:
Building a secured XML real-time interactive data exchange architecture. University of Huddersfield, UK, 2011 - Dong Chan An, Seog Park:
Efficient access control labeling scheme for secure XML query processing. Comput. Stand. Interfaces 33(5): 439-447 (2011) - Alfredo Cuzzocrea, Elisa Bertino:
Privacy Preserving OLAP over Distributed XML Data: A Theoretically-Sound Secure-Multiparty-Computation Approach. J. Comput. Syst. Sci. 77(6): 965-987 (2011) - Bo Luo, Dongwon Lee, Wang-Chien Lee, Peng Liu:
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata. VLDB J. 20(3): 397-415 (2011) - Houari Mahfoud, Abdessamad Imine:
Secure Querying of Recursive XML Views: A Standard XPath-based Technique. CoRR abs/1112.2605 (2011) - 2010
- Lijun Liao:
Secure email communication with XML-based technologies. Ruhr University Bochum, 2010, ISBN 978-3-89966-346-4, pp. 1-258 - Andrea Rota, Stuart Short, Mohammad Ashiqur Rahaman:
XML secure views using semantic access control. EDBT/ICDT Workshops 2010 - Belén Vela, Carlos Blanco, Eduardo Fernández-Medina, Esperanza Marcos:
Model driven development of secure XML data warehouses: a case study. EDBT/ICDT Workshops 2010 - Hung-Yu Chien, Ying-Lun Chen, Chien-Feng Lo, Yuh-Ming Huang:
A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security. GPC 2010: 407-417
skipping 88 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-21 11:38 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint