XPath leashed

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

General Assessment: Is Innovation being Leashed?

The slightly modified title (Un/Leashing) reflects the prevailing paradigm underlined at several occasions during the Leipzig 2010 Forum. Transport innovations can have both the public and private sectors as promoters of innovative practices, but on occasions, more common on the public side, they can act as impediments to innovation, willingly (through regulations) or unwillingly (through unint...

متن کامل

Rewriting XPath queries using materialized XPath views

Let XP(/, //, [ ]) be the fragment of XPath 1.0, consisting of queries that involve only the child and descendant axes, and predicates without disjunction or negation (and no wildcard nodetests); these queries can be represented as tree patterns. We consider the problem of rewriting a query Q using a materialized view V , where Q,V ∈ XP(/, //, [ ]). We present more efficient algorithms for the ...

متن کامل

Data Driven XPath Generation

The XPath query language offers a standard for information extraction from HTML documents. Therefore, the DOM tree representation is typically used, which models the hierarchical structure of the document. One of the key aspects of HTML is the separation of data and the structure that is used to represent it. A consequence thereof is that data extraction algorithms usually fail to identify data...

متن کامل

XPath: Looking Forward

The location path language XPath is of particular importance for XML applications since it is a core component of many XML processing standards such as XSLT or XQuery. In this paper, based on axis symmetry of XPath, equivalences of XPath 1.0 location paths involving reverse axes, such as ancestor and preceding, are established. These equivalences are used as rewriting rules in an algorithm for ...

متن کامل

Blind XPath Injection

This paper describes a Blind XPath Injection attack that enables an attacker to extract a complete XML document used for XPath querying without prior knowledge of the XPath query. The attack is “complete” since all possible data is exposed. The attack makes use of two techniques – XPath crawling, and Booleanization of XPath queries. Using this attack, it is possible to get hold of the XML “data...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Computing Surveys

سال: 2009

ISSN: 0360-0300,1557-7341

DOI: 10.1145/1456650.1456653