Securing XML documents / Noha Nagy Mohy ; Supervised Osman Hagazy , Mohamed Elsharkawi
Material type:
- XML تحقيق السرية لبيانات لغة الترميز الممتدة [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.04.M.Sc.2009.No.S (Browse shelf(Opens below)) | Not for loan | 01010110052063000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.04.M.Sc.2009.No.S (Browse shelf(Opens below)) | 52063.CD | Not for loan | 01020110052063000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.20.04.M.Sc.2009.Mo.L A location discovery model using geogrphical information systems and artificial neural networks / | Cai01.20.04.M.Sc.2009.Ni.M A method and tool support for software architecting activities / | Cai01.20.04.M.Sc.2009.Ni.M A method and tool support for software architecting activities / | Cai01.20.04.M.Sc.2009.No.S Securing XML documents / | Cai01.20.04.M.Sc.2009.No.S Securing XML documents / | Cai01.20.04.M.Sc.2009.Su.G GSM network planning using SDSS and viewshed analysis / | Cai01.20.04.M.Sc.2009.Su.G GSM network planning using SDSS and viewshed analysis / |
Thesis (M.Sc.) - Cairo University - Faculty of Computers and Information - Department of Information System
XML is becoming the main standard for storing and exchanging data within organizations. As a consequence, the demand on privacy and information hiding of srnsitive information is increasing. Researchers try to prevent breaches of unauthorized access, disclosure, copying, use and modification of data. Access control models are not able to fully meet security needs
Issued also as CD
There are no comments on this title.