Tudor [23] proposed an optimization model for XML data processing based on a heuristic algorithm to extract data from
XPath views.
In other words, it is possible for users to access and extract data with either SQL or
XPath from heterogeneous models (Relational and XML case), so they do not need to control the use of the two different types of query languages to retrieve data on different database systems.
The goal in Karma is to enable data-sawy users (for example, spreadsheet users) to model sources, shielding them from the complexities of the underlying technologies (for example, SQL, SPARQL, graph patterns, XSLT,
XPath, and so on).
Some of these technologies are SOAP [4], WSDL [5], UDDI [6], XML Schema [7], document object model (DOM) Application Program Interface (API) [8], Extensible Style sheet Language (XSL) [9], XSL Transformations (XSLT) [10], XML Path language (
XPath) [11] and many more.
(3) The input and precondition in service description document are captured by
Xpath, and input and precondition are refined into privacy items.
(1) When new documents are entered into the system, the Absolute Document
XPath Indexing (ADXPI) [34] indexer parses and analyzes the name of each element and its position to build inverted lists for each index in this system.
--The second column is filled in if the matcher has found an identical or similar
XPath in the Mapping Knowledge Base which is accessed simultaneously (2b).
XML Schema,
XPath, XLink, and Namespaces) to create this semantic meaning (Isenmann, Bey, & Welter, 2007).
Even protected by WS-Security, a SOAP-based Web service was still vulnerable to various types of newly found attacks including XML external entity attacks, XML bombs, malicious SOAP attachment, and
XPath injections (Jaamour, 2005).
* Usestandard
XPath v2 language to express mapping logic, enabling reuse of existing
XPath skills and the wealth of
XPath materials available online.