期刊文献+

数据抽取技术在安全事件管理系统中的应用研究 被引量:1

The Application Research of Data Extraction Technology in the Security Events Management System
下载PDF
导出
摘要 本文主要针对目前安全事件管理系统中安全事件信息抽取的问题,提出了基于XML语言的安全事件信息和抽取方法描述的数据抽取框架DSXML,该框架可以实现跨平台的,分布式的安全事件信息抽取,从而为安全事件管理系统提供可靠的安全事件信息数据源。 In order to solve the problems of data extract in the security event management system, in this paper the data extraction frame DS_XML, which uses xml language to describe the security events information and data extract methods, is presented. DS_XML can realize cross platform, distribution data extraction of security events information. So it can be a reliable date source of security management system.
作者 何俊杰 HE Jun-jie (Netcenter of Ningbo Universiw,Ningbo 315211 ,China)
出处 《电脑知识与技术》 2007年第10期3-3,41,共2页 Computer Knowledge and Technology
关键词 安全事件管理系统 数据抽取技术 XML security events management system data extraction xml
  • 相关文献

参考文献3

二级参考文献23

  • 1Bray T, Paoli J, Sperberg-McQueen CM. Extensible markup language (XML) 1.0. W3C Recommendation, 1998.http://www.w3, org/TR/REC-xml.
  • 2Boag S, et al. XQuery 1.0: An XML query language. W3C Working Draft, 2002. http://www.w3.org/TR/xquery.
  • 3Florescu D, Kossmann D. A performance evaluation of alternative mapping schemes for storing XML data in a relational database.Technical Report, No. 3684, INRIA, 1999.
  • 4Shanmugaanndaram J, et al. Relational databases for querying XML documents: Limitationsand opportunities. In: Atkinson MP,et al., eds. Proceedings of the 25th International Conference on Very Large Data Bases. Edinburgh, Scotland: Morgan Kaufmann Publishers, 1999. 302-314.
  • 5Buneman P, Davidson S, Fan W, Hara C, Tan W. Keys for XML. In: Proceedings of the 10th International Conference on World Wide Web. Hong Kong: ACM, 2001. 201-210.
  • 6Buneman P, Fan W, Sim6on J, Weinstein S. Constraints for semistructured data and XML. SIGMOD Record (ACM Special Interest Group on Management of Data), 2001,30(1):47-54.
  • 7Fan W, Schwenzer P, Wu K. Keys with upward wildcards for XML. In: Mayr HC, et al., eds. Database and Expert Systems Applications, 12th International Conference. Lecture Notes in Computer Science 2113, Munich, Germany: Springer-Verlag, 2001.657-667.
  • 8Fan W, Sim6on J. Integrity constraints for XML. In: Proceedings of the 19th ACMSIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. Dallas, Texas: ACM, 2000.23-34.
  • 9Lee ML, Ling TW, Low WL. Designing functional dependencies for XML.In: Jensen CS, et al., eds. Advances in Database Technology--EDBT 2002, 8th International Conference on Extending Database Technology. Lecture Notes in Computer Science2287, Prague, Czech Republic: Springer-Verlag, 2002. 124-141.
  • 10Thompson H, et al. XML schema. W3C Working Draft, 2001. http://www.w3.org/XML/Schema.

共引文献39

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部