R. Steele, W. Gardner, and T.S. Dillon
[1] W3c-Xml, Extensible markup language (xml), http://www.W3.Org/xml, 2004. [2] W. Gardner, E. Chang, & T.S. Dillon, Analysis model of webuser interface for web applications, 16th Int. Conf. on Software& Systems Engineering and Their Applications, ICSSEA 2003,France, Paris, 2003, 250–256. [3] R. Agrawal, N.H. Gehani, & J. Srinivasan, Odeview: Thegraphical interface to ode, Int. Conf. on Management of Data,Atlantic City, NJ, 1990, 34–43. [4] S. Dar, N.H. Gehani, H.V. Jagadish, & J. Srinivasan, Queriesin an object-oriented graphical interface, Journal of VisualLanguages and Computing, 6(1), 1995, 27–52. doi:10.1006/jvlc.1995.1003 [5] M. Carey, L. Haas, V. Maganty, & J. Williams, Pesto: Anintegrated query/browser for object databases, Int. Conf. onVery Large Databases (VLDB), Mumbai, India, 1996, 203–214. [6] M. Petropoulos, V. Vassalos, & Y. Papakonstantinou, Xmlquery forms (xqforms): Declarative specification of xml queryinterfaces, Int. Conf. on World Wide Web, Hong Kong, 2001,http://www10.org/cdrom/papers/335/index.html. [7] Y. Papakonstantinou, M. Petropoulos, & V. Vassalos, Qursed:Querying and reporting semistructured data, Int. Conf. onManagement of Data, Madison, WI, 2002. [8] K.D. Munroe & Y. Papakonstantinou, Bbq: A visual interfacefor integrated browsing and querying of xml, Int. Conf. onVery Large Databases (VLDB), Cairo, 2000. [9] M. Kudo & S. Hada, Xml document security based on provisional authorization, 7th ACM Conf. on Computer and Communications Security (CCS), Athens, 2000, 87–96. doi:10.1145/352600.352613 [10] E. Bertino, S. Castano, & E. Ferrari, Securing xml documentswith author-x, Internet Computing, IEEE, 5(3), 2001, 21–31. doi:10.1109/4236.935172 [11] E. Bertino & E. Ferrari, Secure and selective disseminationof xml documents, ACM Trans. on Information and SystemSecurity (TISSEC), 5(3), 2002, 290–331. doi:10.1145/545186.545190 [12] E. Damiani, P. Samarati, S. De Capitani Di Vimercati, &S. Paraboschi, Controlling access to xml documents, InternetComputing, IEEE, 5(6), 2001, 18–28. [13] E. Damiani, S.D.C.D. Vimercati, S. Paraboschi, & P. Samarati,A fine-grained access control system for xml documents, ACMTrans. on Information and System Security (TISSEC), 5(2),2002, 169–202. doi:10.1145/505586.505590 [14] A. Gabillon & E. Bruno, Regulating access to xml documents,15th Annual Conf. on Database Security, Niagara, Ontario,Canada, 2001, 299–314. [15] Oasis, Extensible access control markup language (xacml) version 1.0, 2003 [cited 30 May 2004], http://www.oasis-open.org/committees/tc_home.php?wg_ abbrev=xacml. [16] W3c-Xpath, Xml path language (xpath) version 1.0,http://www.W3.Org/tr/xpath, 1999. [17] W3c-Xsl, Extensible stylesheet language (xsl), http://www.W3.Org/style/xsl, 2003. [18] S.K. Goel, C. Clifton, & A. Rosenthal, Derived access controlspecification for xml, Workshop on XML Security, Fairfax,VA, 2003, 1–14. doi:10.1145/968559.968561 [19] W3c-Xquery, Xquery 1.0: An xml query language, http://www.W3.Org/tr/xquery, 2004. [20] G. Miklau & D. Suciu, Controlling access to published datausing cryptography, Proc. of the 29th VLDB Conf., Berlin,Germany, 2003. [21] F. Wenfei, C. Chee-Yong, & G. Minos, Secure xml queryingwith security views, SIGMOD, Paris, 2004, 587–598. [22] R. Steele, Y. Ventsov, & T. Dillon, Object-oriented database-based architecture for mobile enterprise applications, IEEEITCC04, Las Vegas, 2004, 586. [23] R. Steele, Y. Ventsov, & T. Dillon, Xml schema-based discoveryand invocation of mobile services, IEEE EEE04, Taipei, 2004,253–258. [24] R. Steele & T. Dillon, Ontology driven system for mobile deviceaccess of electronic health records, Proc. of 3rd Int. Conf. ofMobile Business 04, New York, US, July 12–13, 2004.
Important Links:
Go Back