A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
The Effective Method of Enhancing Data Security in a Cloud Storage System
2015
International Journal of Computer Applications
Here after users are not going to install applications for the services as there is less storage rather they can access Web Service. ...
Such an auditing service not only helps save Clients computation resources and also to provide better Services for their Service Request. ...
In this paper, it is suggest a UDDI verification approach using XML-Schema verification and WSDL verification technique. ...
doi:10.5120/ijca2015907100
fatcat:hu7zyxpqznayde2uc3qwbzchsm
Maintaining XML Data Integrity in Programs
[chapter]
2010
Lecture Notes in Computer Science
6 generic specific XML Relax NG XML Schema Programming Support pure DOM SAX JAXB XJ XDuce Schematron DSD Structure Integrity ? ...
Datatype Approach Implementation of the Approach Tool Demo Conclusion 2 Scenario loosely coupled distributed systems collaborate (workflows) exchange XML data data is schema-constrained applications have ...
Correctness proofs can be automated for useful invariants combined with local manipulation procedures. The technique is usable by Java programmers, as no background in theory is needed. ...
doi:10.1007/978-3-642-11266-9_50
fatcat:rm2lnzaefzfpbgxgaumua5d2zm
Safety Design for Simulation Models based on Formal Methods
2017
International Journal of Computer Applications
Control theory researchers have been using DEVS models to formalize discrete event systems for a long time. ...
Safety verification is made once a "φDEVS" model is translated to a formal specification using Z notation by performing proof obligation. ...
Fig. 4 . 4 The tree of the Z XML file 3.1.2 Verification algorithm. ...
doi:10.5120/ijca2017916058
fatcat:7oacebfrjjgvlg5stxmofmmv24
Designing Functional Dependencies for XML
[chapter]
2002
Lecture Notes in Computer Science
Functional dependencies are an integral part of database theory and they form the basis for normalizing relational tables up to BCNF. ...
With the increasing relevance of the data-centric aspects of XML, it is pertinent to study functional dependencies in the context of XML, which will form the basis for further studies into XML keys and ...
Schema languages for XML have been heavily researched [Don00], with the Document Type Definition (DTD) [BPSMM00] and XML Schema [Fal00] being the most popular currently. ...
doi:10.1007/3-540-45876-x_10
fatcat:gpqrznwifjg3dpjjfufgnubjye
Verification of the Security against Inference Attacks on XML Databases
2009
IEICE transactions on information and systems
This paper discusses verification of the security against inference attacks on XML databases. ...
First, a security definition called ksecrecy against inference attacks on XML databases is proposed. k-secrecy with an integer k > 1 (or k = ∞) means that attackers cannot narrow down the candidates for ...
Shinichi Minamimoto of Osaka University for implementing the prototype system. ...
doi:10.1587/transinf.e92.d.1022
fatcat:tcwlmzo5srdwde2unjgz37ewya
Vendor independent control database for virtual preparation and formal verification
2011
2011 IEEE International Conference on Information and Automation
A database, storing necessary control information for verification and controller synthesis, is presented. ...
The present paper presents a method for sharing information between the different virtual development tools and formal verification tools. ...
It is a very flexible language and one of its major advantages is that it is simple to read both for humans and computer programs. A. XML schemas XML schemas are used to define rules for XML files. ...
doi:10.1109/icinfa.2011.5949114
fatcat:qkqj2e4ydvh3xi2pdonvzqaxvy
Transformation of DEMO Metamodel into XML Schema
[chapter]
2011
Lecture Notes in Business Information Processing
DEMO is based on a founded theory, the Ψ -theory, and satisfies the requirements to be a well defined domain modeling methodology. ...
Applications used for the automatic analysis (simulation) of the DEMO models or for the identification of business components are just two examples to be mentioned. ...
Having an input conceptual model based on theory, as the Ψ -theory DEMO is based on, and having the models transformed into an exchangeable format (XML), lays down a profound opportunity for generating ...
doi:10.1007/978-3-642-21058-7_4
fatcat:nealoulecjalley3k2i2typ5mq
Design and implementation of an integrated surface texture information system for design, manufacture and measurement
2014
Computer-Aided Design
Two modules (for profile and areal surface texture) each with five components are developed in the CatSurf. ...
. • Category theory based knowledge representation mechanism is devised. • We developed a platform to integrate the information system with CAx systems. a b s t r a c t The optimized design and reliable ...
schema for AST. ...
doi:10.1016/j.cad.2014.06.013
fatcat:lpnuthve2zhpdo7rclkprk65zm
A formal security policy for xenon
2008
Proceedings of the 6th ACM workshop on Formal methods in security engineering - FMSE '08
• theorem proving stacked solvers: external tools integration
• most Z tookit laws for sets and relations • MC (regions theory) laws for normalisation Theorem proving architecture overview Theorem proving ...
as (source) modules elegant OO-design: modular, flexible, configurable, etc.
•• extending available CZT Z tools for CSP/Circus is easier Representing Circus Circus XML format • standard format enabling ...
doi:10.1145/1456396.1456401
dblp:conf/ccs/McDermottF08
fatcat:q3zausysdbgbndabdnhhjapx7u
Correctness Criteria for Normalization of Semistructured Data
2008
Australian Software Engineering Conference : Proceedings
However, these algorithms lack the verification that would ensure that data and constraints among the data are not lost or corrupted during normalization. ...
Several normalization algorithms for semistructured database systems have been developed to satisfy these needs. ...
verification support for the verification process. ...
doi:10.1109/aswec.2008.4483213
fatcat:zzopgbmbcvaorkpyfxoukw7gja
System Reliability using Simulation Models and Formal Methods
2015
International Journal of Computer Applications
We offer a formal verification approach of DEVS models based on Z notation. ...
For this reason, we have integrated the Z formal specification language in the DEVS formalism to detect errors before simulation which is still an important step for the validation. ...
for the transformation of XML documents into other XML documents. ...
doi:10.5120/ijca2015907684
fatcat:7uh3o5ytgfbtrj4dicgh5xth6u
Logging the Abbot: Reflection-Oriented XSLT Programming for Corpora Conversion and Verification
2013
Journal of the Text Encoding Initiative
in the schema. ...
That effort produced a commandline application, Abbot, which works by analyzing the XML schema that describes the document structure to which the target collection should be converted. ...
For the Metadata Offer New Knowledge (MONK) Project, he created (with Stephen Ramsay, Martin Mueller) a command-line file conversion application, Abbot, which transforms variant TEI/XML texts into a common ...
doi:10.4000/jtei.722
fatcat:bf3emhq2q5dfrc2rbw5txcxsye
Report on the EDBT/ICDT 2010 workshop on updates in XML
2010
SIGMOD record
The first international workshop on Updates in XML [1] was held in conjunction with the EDBT/ICDT conference in Lausanne (Switzerland) on March 22, 2010, and attracted approximately 25 participants, culminating ...
Federico Cavalieri presented his paper EX up: An Engine for the Evolution of XML Schemas and Associated Documents. XML Schema is employed for describing the type and structure of XML documents. ...
The basic theory, and then the specifics of the implementation for a fragment of the W3C XQuery Update Facility are discussed. ...
doi:10.1145/1860702.1860713
fatcat:t4esorolvvdajawik7lkygcnmu
A Security Acceleration Using XML Signcryption Scheme in Mobile Grid Web Services
[chapter]
2005
Lecture Notes in Computer Science
This paper describes a novel security approach on fast mobile grid services based on current mobile web services platform environment using XML signcryption mechanism. ...
The software-based module also needs to check the validity of the schema before the document is passed onto the next stages for verification. ...
Signcryption Schema XML signcryption schema is shown above. The schema is required to validate the received XML message for its integrity. ...
doi:10.1007/11531371_27
fatcat:exq3fhppsze7lodaezaksmz7t4
Using semantic web technologies for analysis and validation of structural markup
2011
International Journal of Web Engineering and Technology
The well-formedness of a hierarchy, for instance, becomes an explicit assertion and similarly the analysis of the validity of markup structures become matter for further semantic analysis. ...
Yet, little attention is being paid to the possibility of expressing the actual structures of the documents in a form suitable for the semantic web. ...
Acknowledgements The authors wish to thank Michael Sperberg-McQueen for his deep and passionate remarks about EARMARK, and Federico Meschini for strongly supporting the ideas behind our project. ...
doi:10.1504/ijwet.2011.043439
fatcat:m53n62yhbfapngty67kciuhrz4
« Previous
Showing results 1 — 15 out of 3,640 results