Preserving key in XML data transformation

被引:0
|
作者
Md. Sumon Shahriar
Jixue Liu
机构
[1] University of South Australia,Data and Web Engineering Lab, School of Computer and Information Science
[2] University of South Australia,School of Computer and Information Science
来源
Acta Informatica | 2009年 / 46卷
关键词
Type Construct; Tuple Generation; Collapse Operator; Minimal Hedge; Proj Operator;
D O I
暂无
中图分类号
学科分类号
摘要
Transformation of XML data is an important task in data exchange, data publishing and data integration. Specifically in data integration, data in XML sources is transformed to match the target schema. Some of these sources have XML keys defined. When the data is transformed, the keys also need to be transformed for constraint comparisons, consistency checking and unification in the target schema. Thus, how the keys are transformed, and whether the transformed keys are valid and preserved to the target schema are important problems in XML data transformation and integration. Towards this problem, we firstly define XML keys and their satisfactions. We then study how keys are transformed and whether transformed keys are valid when a source schema is transformed to a target schema. Finally we show whether the transformed keys are satisfied by the transformed document.
引用
收藏
页码:475 / 507
页数:32
相关论文
共 50 条
  • [31] A hybrid data transformation approach for privacy preserving clustering of categorical data
    Natarajan, A. M.
    Rajalaxmi, R. R.
    Uma, N.
    Kirubhakar, G.
    INNOVATIONS AND ADVANCED TECHNIQUES IN COMPUTER AND INFORMATION SCIENCES AND ENGINEERING, 2007, : 403 - 408
  • [32] On the Notion of an XML Key
    Hartmann, Sven
    Koehler, Henning
    Link, Sebastian
    Trinh, Thu
    Wang, Jing
    SEMANTICS IN DATA AND KNOWLEDGE BASES, 2008, 4925 : 103 - +
  • [33] Transformation of QoS data into XML characterising data communication in real time distributed systems
    Poon, PMS
    Dillon, TS
    Chang, E
    2004 2ND IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS: COLLABORATIVE AUTOMATION - ONE KEY FOR INTELLIGENT INDUSTRIAL ENVIRONMENTS, 2004, : 204 - 209
  • [34] Key-based method for extracting entities from XML data
    Liu, X. (xianmliu@gmail.com), 1600, Science Press (51):
  • [35] Privacy preserving cloud data auditing with efficient key update
    Li, Yannan
    Yu, Yong
    Yang, Bo
    Min, Geyong
    Wu, Huai
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 78 : 789 - 798
  • [36] Information preserving XML schema embedding
    Fan, Wenfei
    Bohannon, Philip
    ACM TRANSACTIONS ON DATABASE SYSTEMS, 2008, 33 (01):
  • [37] Semantics-Preserving XML Query
    Song, Jiehu
    Lin, Zuoquan
    2020 5TH INTERNATIONAL CONFERENCE ON MATHEMATICS AND ARTIFICIAL INTELLIGENCE (ICMAI 2020), 2020, : 85 - 92
  • [38] Simple Data Transformation Method for Privacy Preserving Data Re-publication
    Choi, WonGil
    Ryu, JooSuk
    Kim, WonYoung
    Kim, UngMo
    2009 1ST IEEE SYMPOSIUM ON WEB SOCIETY, PROCEEDINGS, 2009, : 209 - 212
  • [39] Cartification: A Neighborhood Preserving Transformation for Mining High Dimensional Data
    Aksehirli, Emin
    Goethals, Bart
    Mueller, Emmanuel
    Vreeken, Jilles
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING (ICDM), 2013, : 937 - 942
  • [40] APPT - A Privacy Preserving Transformation Tool for Micro Data Release
    Poovammal, E.
    Ponnavaikko, M.
    PROCEEDINGS OF THE FIRST AMRITA ACM-W CELEBRATION OF WOMEN IN COMPUTING IN INDIA (A2WIC), 2010,