References
- Damiani, E. et al., “A Fine-Grained Access Control System for XML Documents,” ACM Trans. on Information and System Security, Vol.5, No.2, pp.169-202, May 2002 https://doi.org/10.1145/505586.505590
- B. Luo, D. Lee, W.-C. Lee, and P. Liu, “QFlter:Fine-grained run-time xml access control via nfa-based query rewriting,” Proceedings of the thirteenth ACM international conference on Information and knowledge management, pp.543.552, NewYork, USA, 2004
- InfoPath 2007, http://office.microsoft.com/infopath
- S. Thompson, and T. Torabi, “A Process Improvement Approach to Improve Web Form Design and Usability,” 18th International Conference on Database and Expert Systems Applications, pp.570-574, 2007 https://doi.org/10.1109/DEXA.2007.53
- 월드와이드웹, XML, DTD, XPath, 기타 표준, http://www.w3c.org
- E. Bruchez, “XForms and the eXist XML database: a perfect couple,” Wellesley, XML Conference and Exibition, Marriott Copley Place Boston, Massachusetts, USA, December 2007
- Fundulaki, I.andMarx, M.,“Specifying Access Control Policies for XML Documents with XPath,” In Proc. 9th ACM Symp. on Access Control Models and Technologies, pp.61-69, Yorktown Heights, New York, June, 2004 https://doi.org/10.1145/990036.990046
- C.-H. Lim, S. Park, and S. H. Son. “Access control of xml documents considering update operations,” Proceedings of the 2003 ACM workshop on XML security, pp.49-59, NewYork, USA, 2003 https://doi.org/10.1145/968559.968568
- J. Lee, K. Whang, W. Han, and I. Song, “The dynamic predicate: integrating access control with query processing in XML databases,” VLDB Journal, Vol.16, No.3, pp.371-387, July, 2007 https://doi.org/10.1007/s00778-006-0037-7
- M. Murata, A. Tozawa, and M. Kudo, “XML Access Control Using Static Analysis,” In Proc. 10th ACM Conf. on Computer and Communications Security, pp.73-84, Washingtion DC, USA, Oct., 2003 https://doi.org/10.1145/948109.948122
- J. Jeon, Y. Chung, M. Kim, Y. Lee, “Filtering XPath expressions for XML access control,” Computers and Security Vol.23, pp. 591-605, 2004 https://doi.org/10.1016/j.cose.2004.06.009
- T. Calders, S. Dekeyser, J. Hidders, and J. Paredaens, “Analyzing workflows implied by instane-dependent access rules,” PODS'06, pp.100-109, Chicago, USA, June, 2006
- A. Gupta and D. Suciu, “Stream processing of xpath queries with predicates,” Proceedings of the 2003 ACM SIGMOD international conference on Management of data, pp.419-430, San Diego, California, 2003 https://doi.org/10.1145/872757.872809
- S. Hou, and H. Jacobson, “Predicate-based filtering of XPath expressions,” ICDE'06, pp.53-53, 2006 https://doi.org/10.1109/ICDE.2006.115
- K. Song, and K. Lee, “An automated generation of xforms interfaces for web services,” IEEE International Conference on Web Services 2007, pp.856-863, Seoul, Korea, July 2007 https://doi.org/10.1109/ICWS.2007.35
- J. He, amd I. Yen, “Adaptive User Interface Generation for Web Services,” Proceedings of the IEEE International Conference on e-Business Engineering, pp.536-539, 2007 https://doi.org/10.1109/ICEBE.2007.82
- Carminati, B. and Ferrari, E., “AC-XML Documents: Improving the Performance of a Web Access Control Module,” In Proc. 10th ACM Symp. on Access Control Models and Technologies, pp. 67-76, Stockholm, Sweden, June, 2005 https://doi.org/10.1145/1063979.1063993
- 유가연, “오픈 API 플랫폼을 위한 XForms 브라우저 개발,” 석사학위논문, 경기대학교 일반대학원 컴퓨터과학과, 2007