Author image not provided
 Gregory Leighton

 homepage
 gleightoatualberta.ca

  Affiliation history
Bibliometrics: publication history
Average citations per article2.43
Citation Count17
Publication count7
Publication years2005-2011
Available for download3
Average downloads per article284.67
Downloads (cumulative)854
Downloads (12 Months)18
Downloads (6 Weeks)3
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


7 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 7 of 7
Sort by:

1 published by ACM
November 2011 ACM Transactions on Information and System Security (TISSEC): Volume 14 Issue 3, November 2011
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 8,   Downloads (Overall): 395

Full text available: PDFPDF
Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local identities, enforcing such policies across the federation becomes a challenge. In this article, we first consider the problem ...
Keywords: Access control, XACML, relational databases, XML

2
January 2011
Bibliometrics:
Citation Count: 0

Data federations allow the contents of multiple source databases to be accessed in a consistent manner. Since each source database is typically administered independently, heterogeneity often results, both in terms of how data is represented (i.e., the database schema), and in how controlled access to data is regulated. Typically, each ...

3 published by ACM
June 2010 SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologies
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 363

Full text available: PDFPDF
Data federations provide seamless access to multiple heterogeneous and autonomous data sources pertaining to a large organization. As each source database defines its own access control policies for a set of local identities, enforcing such policies across the federation becomes a challenge. In this paper, we first consider the problem ...
Keywords: access control, xml, relational databases, xacml

4
August 2009 XSym '09: Proceedings of the 6th International XML Database Symposium on Database and XML Technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

The eXtensible Markup Language (XML) provides a powerful and flexible means of encoding and exchanging data. As it turns out, its main advantage as an encoding format (namely, its requirement that all open and close markup tags are present and properly balanced) yields also one of its main disadvantages: verbosity. ...

5 published by ACM
March 2009 EDBT/ICDT '09: Proceedings of the 2009 EDBT/ICDT Workshops
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 96

Full text available: PDFPDF
Controlling access to data is of paramount importance to many database applications. In data integration and data interchange scenarios, relational data is published as XML, and it is natural to require that all existing access control policies defined over the relational data be completely -- and verifiably -- preserved over ...

6
September 2006 XSym'06: Proceedings of the 4th international conference on Database and XML Technologies
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 6

We describe an efficient method for the incremental validation of XML documents after composite updates. We introduce the class of Bounded-Edit (BE) DTDs and XML Schemas, and give a simple incremental revalidation algorithm that yields optimal performance for them, in the sense that its time complexity is linear in the ...

7
March 2005 DCC '05: Proceedings of the Data Compression Conference
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 6




The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us