edited by J.W.A Langeveld, John Dixon, and Herman van Keulen.
by Jonathan Waxman.
[edited by] Jennifer Romano Bergstrom, PhD, Andrew Jonathan Schall.
suroto
Data Models for Semistructured Data -- ORA-SS -- Schema Extraction -- Normalization -- Views -- Physical Database Design -- Conclusion.Semistructured Database Design provides an essential reference for anyone interested in the effective management of semsistructured data. Since many new and advanced web applications consume a huge amount of such data, there is a growing need to properly design …
Prologue -- Walk-through: Using UML for Security -- Background -- Developing Secure Systems -- Model-based Security Engineering with UML -- Applications -- Tool Support -- Tool support for UMLsec -- A Formal Foundation -- Formal Systems Development with UML -- Epilogue -- Further Material -- Outlook.Attacks against computer systems can cause considerable economic or physical damage. High-qualit…
Encrypted Data Access -- Efficient Key Updates in Encrypted Database Systems -- Metadata Management in Outsourced Encrypted Databases -- Experiments with Queries over Encrypted Data Using Secret Sharing -- Access Control -- An Authorization Framework for Sharing Data in Web Service Federations -- User-Managed Access Control for Health Care Systems -- Specifying an Access Control Model for Ontol…