<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Anna Maddalena</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">XML Data Stores: Emerging Practices</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">2</style></number><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">62-69</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Anna Maddalena</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">XML document indexes: a classification</style></title><secondary-title><style face="normal" font="default" size="100%">Internet Computing, IEEE</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">documents indexing</style></keyword><keyword><style  face="normal" font="default" size="100%">xml</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">64–71</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;XML’s increasing diffusion makes efficient XML query processing and indexing all the more critical. Given the semistructured nature of XML documents, however, general query processing techniques won’t work. Researchers have proposed several specialized indexing methods that offer query processors efficient access to XML documents, although none are yet fully implemented in commercial products. In this article the classification of XML indexing techniques identifies current practices and trends, offering insight into how developers can improve query processing and select the best solution for particular contexts.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Barbara Catania</style></author><author><style face="normal" font="default" size="100%">Anna Maddalena</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">XML Document Indexes: A Classification</style></title><secondary-title><style face="normal" font="default" size="100%">IEEE Internet Computing</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><number><style face="normal" font="default" size="100%">5</style></number><volume><style face="normal" font="default" size="100%">9</style></volume><pages><style face="normal" font="default" size="100%">64-71</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">XML-Based Revocation and Delegation in a Distributed Environment</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2005</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The rapid increase on the circulation of data over the web has highlightedthe need for distributed storage of Internet-accessible information due tothe rapid increase on the circulation of data over the web. Thus, access controlmechanisms should also be distributed in order to protect them effectively. A recentidea in the access control theory is the delegation and revocation of rights,i.e. the passing over of one clients rights to the other and vice versa. Here, wepropose an XML-based distributed delegation module which can be integratedinto a distributed role-based access control mechanism protecting networks. Theidea of X.509v3 certificates is used for the transfer of authorization informationreferring to a client. The modules are XML-based and all of the associated datastructures are expressed through Document Type Definitions (DTDs).&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zeng, Xingjie</style></author><author><style face="normal" font="default" size="100%">Li, Fang</style></author><author><style face="normal" font="default" size="100%">Zhang, Dongmo</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An XML-Based Bootstrapping Method for Pattern Acquisition</style></title><secondary-title><style face="normal" font="default" size="100%">ICEIS (2)</style></secondary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><pages><style face="normal" font="default" size="100%">303-308</style></pages><language><style face="normal" font="default" size="100%">eng</style></language></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">A XML-based Bootstrapping Method for Pattern Acquisition</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Extensible Markup Language (XML) has been widely used as a middleware because of its flexibility. Fixeddomain is one of the bottlenecks of Information Extraction (IE) technologies. In this paper we present aXML-based domain-adaptable bootstrapping method of pattern acquisition, which focuses on minimizingthe cost of domain migration. The approach starts from a seed corpus with some seed patterns; extends thecorpus based on the seed corpus through the Internet and acquires the new patterns from extended corpus.Positive and negative examples classified from training corpus are used to evaluate the patterns acquired.The result shows our method is a practical way in pattern acquisitions.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">An XML-based Framework for the development of Adaptive Educational Software</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Large-scale adaptive educational software requires advanced technologicalinfrastructures in order to support various cooperative educational organizations. Thispaper proposes a framework for overcoming the difficulties that arise due to thedistribution and heterogeneity of current collaborative educational technologies. Theproposed framework is based on XML it is of distributive and cooperative naturesince it is characterized by the following:• Each educational organization may plan its development to meet its own needs.• It is possible for each organization to concurrently reuse the software that hasalready been developed by any other organization,• Each organization can combine its own software production, with the productionof other cooperative organizations, in various ways.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author><author><style face="normal" font="default" size="100%">Li, Fang</style></author><author><style face="normal" font="default" size="100%">Tsoukalas, Ioannis</style></author></authors><secondary-authors><author><style face="normal" font="default" size="100%">Lindner, Wolfgang</style></author><author><style face="normal" font="default" size="100%">Mesiti, Marco</style></author><author><style face="normal" font="default" size="100%">Türker, Can</style></author><author><style face="normal" font="default" size="100%">Tzitzikas, Yannis</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></secondary-authors></contributors><titles><title><style face="normal" font="default" size="100%">XML-Based Revocation and Delegation in a Distributed Environment</style></title><secondary-title><style face="normal" font="default" size="100%">EDBT Workshops</style></secondary-title><tertiary-title><style face="normal" font="default" size="100%">Lecture Notes in Computer Science</style></tertiary-title></titles><dates><year><style  face="normal" font="default" size="100%">2004</style></year></dates><publisher><style face="normal" font="default" size="100%">Springer</style></publisher><volume><style face="normal" font="default" size="100%">3268</style></volume><pages><style face="normal" font="default" size="100%">299-308</style></pages><isbn><style face="normal" font="default" size="100%">3-540-23305-9</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The rapid increase on the circulation of data over the web has highlightedthe need for distributed storage of Internet-accessible information due tothe rapid increase on the circulation of data over the web. Thus, access controlmechanisms should also be distributed in order to protect them effectively. A recentidea in the access control theory is the delegation and revocation of rights,i.e. the passing over of one clients rights to the other and vice versa. Here, wepropose an XML-based distributed delegation module which can be integratedinto a distributed role-based access control mechanism protecting networks. Theidea of X.509v3 certificates is used for the transfer of authorization informationreferring to a client. The modules are XML-based and all of the associated datastructures are expressed through Document Type Definitions (DTDs).&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Stoupa, Konstantina</style></author><author><style face="normal" font="default" size="100%">Athena Vakali</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">An XML-based language for access control specifications in an RBAC environment</style></title><secondary-title><style face="normal" font="default" size="100%">SMC</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Access control</style></keyword><keyword><style  face="normal" font="default" size="100%">Attribute Certificates</style></keyword><keyword><style  face="normal" font="default" size="100%">Role Based Access Control</style></keyword><keyword><style  face="normal" font="default" size="100%">XML-based language</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><publisher><style face="normal" font="default" size="100%">IEEE</style></publisher><pages><style face="normal" font="default" size="100%">1717-1722</style></pages><isbn><style face="normal" font="default" size="100%">0-7803-7952-7</style></isbn><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;Lately, Web-accessed resources havesuperceded the resources accessed by local or wide-areanetworks. Therefore, new mechanisms should beimplemented for protecting resources from unknownclients. Attribute Certificates is a quite new technologyoffering such functionality. Those certificates are issuedby Attribute Authorities validating the attributes of theowner of the certificate. Based on this technology anXML-based access control mechanism is introduced forprotecting any kind of resources (from both known andunknown clients). The proposed model is ultimately rolebasedsince both clients and protected resources areorganized into roles. Moreover, an XML-based languageis introduced to express roles, authorizations, delegationrules, hierarchies and certificates.&lt;/p&gt;
</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>47</ref-type><contributors></contributors><titles><title><style face="normal" font="default" size="100%">An XML-based Language for Access Control Specifications in an RBAC Environment</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2003</style></year></dates><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">Lately, Web-accessed resources havesuperceded the resources accessed by local or wide-areanetworks. Therefore, new mechanisms should beimplemented for protecting resources from unknownclients. Attribute Certificates is a quite new technologyoffering such functionality. Those certificates are issuedby Attribute Authorities validating the attributes of theowner of the certificate. Based on this technology anXML-based access control mechanism is introduced forprotecting any kind of resources (from both known andunknown clients). The proposed model is ultimately rolebasedsince both clients and protected resources areorganized into roles. Moreover, an XML-based languageis introduced to express roles, authorizations, delegationrules, hierarchies and certificates.</style></abstract></record></records></xml>