3,640 Hits in 3.7 sec

The Effective Method of Enhancing Data Security in a Cloud Storage System

S. Eswari, S. Manikandan
2015 International Journal of Computer Applications  
Here after users are not going to install applications for the services as there is less storage rather they can access Web Service.  ...  Such an auditing service not only helps save Clients computation resources and also to provide better Services for their Service Request.  ...  In this paper, it is suggest a UDDI verification approach using XML-Schema verification and WSDL verification technique.  ... 
doi:10.5120/ijca2015907100 fatcat:hu7zyxpqznayde2uc3qwbzchsm

Maintaining XML Data Integrity in Programs [chapter]

Patrick Michel, Arnd Poetzsch-Heffter
2010 Lecture Notes in Computer Science  
6 generic specific XML Relax NG XML Schema Programming Support pure DOM SAX JAXB XJ XDuce Schematron DSD Structure Integrity ?  ...  Datatype Approach Implementation of the Approach Tool Demo Conclusion 2 Scenario loosely coupled distributed systems collaborate (workflows) exchange XML data data is schema-constrained applications have  ...  Correctness proofs can be automated for useful invariants combined with local manipulation procedures. The technique is usable by Java programmers, as no background in theory is needed.  ... 
doi:10.1007/978-3-642-11266-9_50 fatcat:rm2lnzaefzfpbgxgaumua5d2zm

Safety Design for Simulation Models based on Formal Methods

Wassim Trojet
2017 International Journal of Computer Applications  
Control theory researchers have been using DEVS models to formalize discrete event systems for a long time.  ...  Safety verification is made once a "φDEVS" model is translated to a formal specification using Z notation by performing proof obligation.  ...  Fig. 4 . 4 The tree of the Z XML file 3.1.2 Verification algorithm.  ... 
doi:10.5120/ijca2017916058 fatcat:7oacebfrjjgvlg5stxmofmmv24

Designing Functional Dependencies for XML [chapter]

Mong Li Lee, Tok Wang Ling, Wai Lup Low
2002 Lecture Notes in Computer Science  
Functional dependencies are an integral part of database theory and they form the basis for normalizing relational tables up to BCNF.  ...  With the increasing relevance of the data-centric aspects of XML, it is pertinent to study functional dependencies in the context of XML, which will form the basis for further studies into XML keys and  ...  Schema languages for XML have been heavily researched [Don00], with the Document Type Definition (DTD) [BPSMM00] and XML Schema [Fal00] being the most popular currently.  ... 
doi:10.1007/3-540-45876-x_10 fatcat:gpqrznwifjg3dpjjfufgnubjye

Verification of the Security against Inference Attacks on XML Databases

2009 IEICE transactions on information and systems  
This paper discusses verification of the security against inference attacks on XML databases.  ...  First, a security definition called ksecrecy against inference attacks on XML databases is proposed. k-secrecy with an integer k > 1 (or k = ∞) means that attackers cannot narrow down the candidates for  ...  Shinichi Minamimoto of Osaka University for implementing the prototype system.  ... 
doi:10.1587/transinf.e92.d.1022 fatcat:tcwlmzo5srdwde2unjgz37ewya

Vendor independent control database for virtual preparation and formal verification

Petter Falkman, Jonathan Hedvall, Anders Holmblad, Bengt Lennartson
2011 2011 IEEE International Conference on Information and Automation  
A database, storing necessary control information for verification and controller synthesis, is presented.  ...  The present paper presents a method for sharing information between the different virtual development tools and formal verification tools.  ...  It is a very flexible language and one of its major advantages is that it is simple to read both for humans and computer programs. A. XML schemas XML schemas are used to define rules for XML files.  ... 
doi:10.1109/icinfa.2011.5949114 fatcat:qkqj2e4ydvh3xi2pdonvzqaxvy

Transformation of DEMO Metamodel into XML Schema [chapter]

Yan Wang, Antonia Albani, Joseph Barjis
2011 Lecture Notes in Business Information Processing  
DEMO is based on a founded theory, the Ψ -theory, and satisfies the requirements to be a well defined domain modeling methodology.  ...  Applications used for the automatic analysis (simulation) of the DEMO models or for the identification of business components are just two examples to be mentioned.  ...  Having an input conceptual model based on theory, as the Ψ -theory DEMO is based on, and having the models transformed into an exchangeable format (XML), lays down a profound opportunity for generating  ... 
doi:10.1007/978-3-642-21058-7_4 fatcat:nealoulecjalley3k2i2typ5mq

Design and implementation of an integrated surface texture information system for design, manufacture and measurement

Qunfen Qi, Paul J. Scott, Xiangqian Jiang, Wenlong Lu
2014 Computer-Aided Design  
Two modules (for profile and areal surface texture) each with five components are developed in the CatSurf.  ...  . • Category theory based knowledge representation mechanism is devised. • We developed a platform to integrate the information system with CAx systems. a b s t r a c t The optimized design and reliable  ...  schema for AST.  ... 
doi:10.1016/j.cad.2014.06.013 fatcat:lpnuthve2zhpdo7rclkprk65zm

A formal security policy for xenon

John McDermott, Leo Freitas
2008 Proceedings of the 6th ACM workshop on Formal methods in security engineering - FMSE '08  
• theorem proving stacked solvers: external tools integration • most Z tookit laws for sets and relations • MC (regions theory) laws for normalisation Theorem proving architecture overview Theorem proving  ...  as (source) modules elegant OO-design: modular, flexible, configurable, etc. •• extending available CZT Z tools for CSP/Circus is easier Representing Circus Circus XML format • standard format enabling  ... 
doi:10.1145/1456396.1456401 dblp:conf/ccs/McDermottF08 fatcat:q3zausysdbgbndabdnhhjapx7u

Correctness Criteria for Normalization of Semistructured Data

Scott Uk-Jin Lee, Jing Sun, Gillian Dobbie, Lindsay Groves, Yuan Fang Li
2008 Australian Software Engineering Conference : Proceedings  
However, these algorithms lack the verification that would ensure that data and constraints among the data are not lost or corrupted during normalization.  ...  Several normalization algorithms for semistructured database systems have been developed to satisfy these needs.  ...  verification support for the verification process.  ... 
doi:10.1109/aswec.2008.4483213 fatcat:zzopgbmbcvaorkpyfxoukw7gja

System Reliability using Simulation Models and Formal Methods

Wassim Trojet, Tahar Berradia
2015 International Journal of Computer Applications  
We offer a formal verification approach of DEVS models based on Z notation.  ...  For this reason, we have integrated the Z formal specification language in the DEVS formalism to detect errors before simulation which is still an important step for the validation.  ...  for the transformation of XML documents into other XML documents.  ... 
doi:10.5120/ijca2015907684 fatcat:7uh3o5ytgfbtrj4dicgh5xth6u

Logging the Abbot: Reflection-Oriented XSLT Programming for Corpora Conversion and Verification

Brian L. Pytlik Zillig
2013 Journal of the Text Encoding Initiative  
in the schema.  ...  That effort produced a commandline application, Abbot, which works by analyzing the XML schema that describes the document structure to which the target collection should be converted.  ...  For the Metadata Offer New Knowledge (MONK) Project, he created (with Stephen Ramsay, Martin Mueller) a command-line file conversion application, Abbot, which transforms variant TEI/XML texts into a common  ... 
doi:10.4000/jtei.722 fatcat:bf3emhq2q5dfrc2rbw5txcxsye

Report on the EDBT/ICDT 2010 workshop on updates in XML

Michael Benedikt, Daniela Florescu, Philippa Gardner, Giovanna Guerrini, Marco Mesiti, Emmanuel Waller
2010 SIGMOD record  
The first international workshop on Updates in XML [1] was held in conjunction with the EDBT/ICDT conference in Lausanne (Switzerland) on March 22, 2010, and attracted approximately 25 participants, culminating  ...  Federico Cavalieri presented his paper EX up: An Engine for the Evolution of XML Schemas and Associated Documents. XML Schema is employed for describing the type and structure of XML documents.  ...  The basic theory, and then the specifics of the implementation for a fragment of the W3C XQuery Update Facility are discussed.  ... 
doi:10.1145/1860702.1860713 fatcat:t4esorolvvdajawik7lkygcnmu

A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services [chapter]

Namje Park, Kiyoung Moon, Kyoil Chung, Dongho Won, Yuliang Zheng
2005 Lecture Notes in Computer Science  
This paper describes a novel security approach on fast mobile grid services based on current mobile web services platform environment using XML signcryption mechanism.  ...  The software-based module also needs to check the validity of the schema before the document is passed onto the next stages for verification.  ...  Signcryption Schema XML signcryption schema is shown above. The schema is required to validate the received XML message for its integrity.  ... 
doi:10.1007/11531371_27 fatcat:exq3fhppsze7lodaezaksmz7t4

Using semantic web technologies for analysis and validation of structural markup

Angelo Di Iorio, Silvio Peroni, Fabio Vitali
2011 International Journal of Web Engineering and Technology  
The well-formedness of a hierarchy, for instance, becomes an explicit assertion and similarly the analysis of the validity of markup structures become matter for further semantic analysis.  ...  Yet, little attention is being paid to the possibility of expressing the actual structures of the documents in a form suitable for the semantic web.  ...  Acknowledgements The authors wish to thank Michael Sperberg-McQueen for his deep and passionate remarks about EARMARK, and Federico Meschini for strongly supporting the ideas behind our project.  ... 
doi:10.1504/ijwet.2011.043439 fatcat:m53n62yhbfapngty67kciuhrz4
« Previous Showing results 1 — 15 out of 3,640 results