XPath leashed
نویسندگان
چکیده
منابع مشابه
General Assessment: Is Innovation being Leashed?
The slightly modified title (Un/Leashing) reflects the prevailing paradigm underlined at several occasions during the Leipzig 2010 Forum. Transport innovations can have both the public and private sectors as promoters of innovative practices, but on occasions, more common on the public side, they can act as impediments to innovation, willingly (through regulations) or unwillingly (through unint...
متن کاملRewriting XPath queries using materialized XPath views
Let XP(/, //, [ ]) be the fragment of XPath 1.0, consisting of queries that involve only the child and descendant axes, and predicates without disjunction or negation (and no wildcard nodetests); these queries can be represented as tree patterns. We consider the problem of rewriting a query Q using a materialized view V , where Q,V ∈ XP(/, //, [ ]). We present more efficient algorithms for the ...
متن کاملData Driven XPath Generation
The XPath query language offers a standard for information extraction from HTML documents. Therefore, the DOM tree representation is typically used, which models the hierarchical structure of the document. One of the key aspects of HTML is the separation of data and the structure that is used to represent it. A consequence thereof is that data extraction algorithms usually fail to identify data...
متن کاملXPath: Looking Forward
The location path language XPath is of particular importance for XML applications since it is a core component of many XML processing standards such as XSLT or XQuery. In this paper, based on axis symmetry of XPath, equivalences of XPath 1.0 location paths involving reverse axes, such as ancestor and preceding, are established. These equivalences are used as rewriting rules in an algorithm for ...
متن کاملBlind XPath Injection
This paper describes a Blind XPath Injection attack that enables an attacker to extract a complete XML document used for XPath querying without prior knowledge of the XPath query. The attack is “complete” since all possible data is exposed. The attack makes use of two techniques – XPath crawling, and Booleanization of XPath queries. Using this attack, it is possible to get hold of the XML “data...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM Computing Surveys
سال: 2009
ISSN: 0360-0300,1557-7341
DOI: 10.1145/1456650.1456653