International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064

Downloads: 106

Survey Paper | Information Technology | India | Volume 3 Issue 11, November 2014

A Control Mechanism for Enforcing Inference Usability of XML Documents

Smita Chaudhari, Rakesh Rajani

Handling of the important information from the XML Document file is the crucial part in the current competitive world as there are more secure transactions in the lot of organization. The most important feature of XML formatting is, it allows for adding schema declarations with integrity constraints to instance data, and to compose individual pieces of data in a tree-like fashion, where a link from a parent node to a sub tree carries some ontological information about the relationship between individual pieces of data. We are proposing an algorithm for weakening of the XML document by eliminating the confidential information, inference capabilities, modifying the schema of XML. The weakened XML document, modified schema conforms to the inference-proof viewed of the generated document to the client.

Keywords: XML document, XML schema, Inference control, Inference rule, XML data security

Edition: Volume 3 Issue 11, November 2014

Pages: 2230 - 2233

Share this Article

How to Cite this Article?

Smita Chaudhari, Rakesh Rajani, "A Control Mechanism for Enforcing Inference Usability of XML Documents", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=OCT141492, Volume 3 Issue 11, November 2014, 2230 - 2233

Enter Your Email Address


Similar Articles with Keyword 'XML'

Downloads: 110

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 3141 - 3144

Interrelated Document Warehouse Report Visualization

V. Vivek, N. J. Subashini

Share this Article

Downloads: 136 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Information Technology, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 393 - 400

Towards Early Diagnosis and Prevention of Type 2 Diabetes Mellitus: The Role of Smartphones

Denye Ogeh, Segun Fatumo

Share this Article

Similar Articles with Keyword 'document'

Downloads: 102

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Downloads: 105

Research Paper, Information Technology, Indonesia, Volume 4 Issue 4, April 2015

Pages: 3058 - 3063

The Designing of Measurement Instrument for Information Technology Risk Assessment as a Risk Management Strategy Recommendation at SBUPE Bandung

Yudi Priyadi, Suhardi

Share this Article

Similar Articles with Keyword 'Inference'

Downloads: 111

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 6, June 2015

Pages: 2923 - 2928

Hiding User Privacy in Location Based Services Through Clustering

Nilam V. Khandade, Snehal Nargundi

Share this Article

Downloads: 128

Research Paper, Information Technology, India, Volume 2 Issue 5, May 2013

Pages: 170 - 172

Applications of Knowledge Base Research Methods in Undergraduate Studies-A Case study of Madawalabu University Business School

Sreepada Hegde, Vijayalaxmi Hegde

Share this Article

Similar Articles with Keyword 'control'

Downloads: 81

Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020

Pages: 502 - 505

Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya

Yvonne Oyaro Opiyo, David Nzuki

Share this Article

Downloads: 86

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

Users Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Similar Articles with Keyword 'rule'

Downloads: 95

Survey Paper, Information Technology, India, Volume 3 Issue 6, June 2014

Pages: 1479 - 1482

Analysis of NSL-KDD Dataset for Fuzzy Based Intrusion Detection System

Macdonald Mukosera, Thabiso Peter Mpofu, Budwell Masaiti

Share this Article

Downloads: 103

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2137 - 2140

Protection Figures Hitting by Refining Depiction Fragment Torrent

P Siddharthan, C Mahesh

Share this Article

Similar Articles with Keyword 'data'

Downloads: 318 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article

Similar Articles with Keyword 'security'

Downloads: 0

Survey Paper, Information Technology, Iraq, Volume 10 Issue 7, July 2021

Pages: 1341 - 1348

Proposed Model to Identify the Influencing Students' Behavioral Intention to Use Mobile Learning: A Perspective from a Different Countries Case Study

Zainab Dalaf Katheeth, Bashar Dheyaa Noor, Ammar Dheyaa Noor

Share this Article

Downloads: 1

Research Paper, Information Technology, India, Volume 10 Issue 5, May 2021

Pages: 174 - 178

Android Notes using Finger Print Authentication

Vaibhav Garg, Siddharth Yadav, Rishabh Kamal

Share this Article
Top