On XML integrity constraints in the presence of DTDs
Journal of the ACM (JACM)
A Digital Signature Based on a Conventional Encryption Function
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Cocoon: Building XML Applications
Cocoon: Building XML Applications
Architectural styles and the design of network-based software architectures
Architectural styles and the design of network-based software architectures
ORDPATHs: insert-friendly XML node labels
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Using XForms to simplify Web programming
WWW '05 Proceedings of the 14th international conference on World Wide Web
Securing XML data in third-party distribution systems
Proceedings of the 14th ACM international conference on Information and knowledge management
Universal access architecture for digital libraries
CASCON '05 Proceedings of the 2005 conference of the Centre for Advanced Studies on Collaborative research
Decentralized authorization and data security in web content delivery
Proceedings of the 2007 ACM symposium on Applied computing
BPM '08 Proceedings of the 6th International Conference on Business Process Management
BaseX & DeepFS joint storage for filesystem and database
Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology
An optimistic technique for transactions control using REST architectural style
Proceedings of the 2009 ACM symposium on Applied Computing
Data integrity related markup language and HTTP protocol support for web intermediaries
EUC'06 Proceedings of the 2006 international conference on Embedded and Ubiquitous Computing
Hi-index | 0.00 |
The REpresentational State Transfer (REST) represents an extensible, easy and elegant architecture for accessing web-based resources. REST alone and in combination with XML is fast gaining momentum in a diverse set of web applications. REST is stateless, as is HTTP on which it is built. For many applications, this not enough, especially in the context of concurrent access and the increasing need for auditing and accountability. We present a lightweight mechanism which allows the application to control the integrity of the underlying resources in a simple, yet flexible manner. Based on an opportunistic locking approach, we show in this paper that XML does not only act as an extensible and direct accessible backend that ensures easy modifications due to the allocation of nodes, but also gives scalable possibilities to perform on-the-fly integrity verification based on the tree structure.