Entry Bouganim:2008:DAC from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Bouganim:2008:DAC,
author = "Luc Bouganim and Fran{\c{c}}ois Dang Ngoc and Philippe
Pucheral",
title = "Dynamic access-control policies on {XML} encrypted
data",
journal = j-TISSEC,
volume = "10",
number = "4",
pages = "4:1--4:??",
month = jan,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1284680.1284684",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 12 17:52:24 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "The erosion of trust put in traditional database
servers and in Database Service Providers and the
growing interest for different forms of selective data
dissemination are different factors that lead to move
the access-control from servers to clients. Different
data encryption and key dissemination schemes have been
proposed to serve this purpose. By compiling the
access-control rules into the encryption process, all
these methods suffer from a static way of sharing data.
With the emergence of hardware security elements on
client devices, more dynamic client-based
access-control schemes can be devised. This paper
proposes a tamper-resistant client-based XML
access-right controller supporting flexible and dynamic
access-control policies. The access-control engine is
embedded in a hardware-secure device and, therefore,
must cope with specific hardware resources. This engine
benefits from a dedicated index to quickly converge
toward the authorized parts of a potentially streaming
XML document. Pending situations (i. e. , where data
delivery is conditioned by predicates, which apply to
values encountered afterward in the document stream)
are handled gracefully, skipping, whenever possible the
pending elements and reassembling relevant parts when
the pending situation is solved. Additional security
mechanisms guarantee that (1) the input document is
protected from any form of tampering and (2) no
forbidden information can be gained by replay attacks
on different versions of the XML document and of the
access-control rules. Performance measurements on
synthetic and real datasets demonstrate the
effectiveness of the approach. Finally, the paper
reports on two experiments conducted with a prototype
running on a secured hardware platform.",
acknowledgement = ack-nhfb,
articleno = "4",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "access-control; data confidentiality; smartcard;
ubiquitous data management",
}
Related entries
- access-control,
9(4)421,
10(1)2,
10(1)3,
10(2)5,
10(2)7,
10(4)2,
14(1)2,
14(1)9,
15(4)15,
15(4)18,
16(4)17
- additional,
2(1)3,
9(2)181,
11(2)3,
11(2)6,
12(3)18,
13(4)33,
15(2)6,
17(1)1
- all,
1(1)93,
2(2)159,
2(3)332,
2(4)416,
10(1)4,
10(2)5,
10(4)2,
11(2)1,
11(2)3,
11(2)4,
11(2)5,
11(2)6,
11(3)13,
11(4)18,
11(4)20,
11(4)22,
12(2)10,
12(3)18,
13(1)10,
13(3)25,
13(3)28,
13(4)38,
13(4)41,
14(1)6,
14(1)14,
14(3)27,
15(1)4,
15(2)9,
15(3)14,
15(4)16,
15(4)17,
16(1)4,
17(1)2,
17(3)9,
17(3)11,
18(1)2,
18(2)5
- any,
1(1)66,
1(1)93,
2(4)390,
9(4)461,
10(3)10,
10(3)12,
10(4)1,
11(2)4,
11(2)6,
11(3)13,
11(3)16,
11(4)20,
12(1)3,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)10,
12(3)14,
12(3)18,
12(3)19,
12(4)20,
13(1)10,
13(3)28,
13(4)33,
13(4)39,
14(1)6,
14(1)8,
14(1)9,
14(4)32,
15(1)2,
15(2)9,
15(2)10,
15(4)17,
16(2)6,
16(2)7,
16(3)12,
16(4)13,
16(4)15,
17(2)8,
17(3)9,
17(3)11,
18(1)1
- apply,
2(2)177,
2(3)269,
7(2)319,
10(4)5,
12(1)1,
13(4)40,
14(1)2,
14(1)6,
17(4)15,
18(1)4
- approach,
1(1)3,
1(1)26,
2(1)34,
2(2)138,
2(3)269,
2(3)295,
5(2)119,
5(3)203,
6(1)128,
7(3)392,
9(4)391,
9(4)421,
10(1)2,
10(1)4,
10(3)11,
10(3)12,
11(1)3,
11(3)15,
11(3)16,
11(4)17,
11(4)19,
12(1)1,
12(1)4,
12(2)11,
12(3)14,
13(3)20,
13(3)24,
13(4)31,
13(4)35,
13(4)36,
14(1)8,
14(3)23,
14(4)29,
15(1)4,
15(3)12,
15(3)13,
15(4)15,
15(4)17,
15(4)18,
16(2)5,
16(2)7,
16(2)8,
16(4)15,
16(4)16,
17(3)12,
17(4)14,
18(2)5,
18(2)7,
18(3)11
- authorized,
2(1)3,
9(4)421
- been,
1(1)93,
2(3)269,
2(3)332,
10(1)2,
10(3)12,
11(1)2,
11(4)17,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(3)17,
13(3)20,
13(3)27,
13(4)36,
13(4)39,
14(1)3,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
15(2)10,
16(3)10,
16(4)14,
17(1)3,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(2)7,
18(4)14
- benefit,
9(2)181,
9(4)461,
10(1)3,
10(3)11,
11(4)20,
11(4)23,
12(2)13,
13(4)31,
14(1)7,
14(1)9,
16(1)1,
16(3)11
- client,
2(3)230,
2(4)390,
10(2)8,
11(2)2,
11(3)16,
12(3)14,
12(3)16,
13(4)30,
14(1)12,
14(3)27,
14(4)32,
16(2)5,
16(3)11,
16(3)12,
16(4)13,
17(2)5,
17(4)15
- conducted,
14(1)10,
16(4)14,
18(4)13,
18(4)14
- confidentiality,
10(2)7,
13(3)22,
13(3)25,
13(4)31,
13(4)32,
13(4)35
- control, access-,
9(4)421,
10(1)2,
10(1)3,
10(2)5,
10(2)7,
10(4)2,
14(1)2,
14(1)9,
15(4)15,
15(4)18,
16(4)17
- cope,
13(3)28,
16(4)16
- database,
1(1)26,
1(1)93,
2(4)354,
4(4)321,
8(1)119,
9(1)31,
10(1)2,
11(2)5,
12(2)8,
13(4)31,
13(4)32,
14(3)25,
16(3)12,
17(3)11,
18(3)9
- dataset,
10(1)4,
12(1)4,
13(4)32,
15(4)15,
15(4)17,
16(2)8,
16(4)14,
17(3)12,
18(2)7,
18(4)12,
18(4)14
- dedicated,
14(1)3
- delivery,
17(4)13
- demonstrate,
2(3)295,
10(1)4,
10(4)1,
10(4)6,
11(1)3,
11(3)16,
11(4)22,
12(1)4,
12(3)19,
13(1)10,
13(4)30,
13(4)31,
13(4)38,
14(3)27,
15(1)2,
15(1)4,
15(2)7,
15(3)12,
15(3)13,
15(4)16,
16(3)9,
16(3)10,
17(2)8,
17(3)10,
17(3)12,
17(4)16,
18(2)8,
18(4)12,
18(4)14
- device,
2(3)230,
10(4)3,
11(2)2,
11(3)14,
12(3)15,
13(4)30,
14(1)7,
15(1)4,
15(2)7,
16(2)6,
16(3)10,
17(3)10,
17(4)14,
17(4)16,
18(2)7
- different,
1(1)26,
1(1)93,
2(1)105,
2(2)138,
2(3)269,
10(1)2,
10(1)4,
12(1)3,
12(3)14,
13(1)10,
13(3)27,
13(3)28,
14(1)4,
14(4)28,
15(1)2,
15(2)7,
15(2)10,
16(1)3,
16(2)7,
16(3)9,
16(4)15,
17(2)7,
17(4)14,
18(1)1,
18(3)11
- dissemination,
5(3)290
- document,
5(2)169,
5(3)290,
9(4)421,
10(1)3,
12(3)16,
15(2)7,
17(3)12,
18(1)1
- dynamic,
2(1)65,
3(3)136,
5(4)367,
7(1)21,
10(2)7,
11(2)3,
11(3)15,
12(1)6,
12(2)10,
12(3)18,
13(2)14,
13(4)32,
14(2)15,
14(3)24,
15(3)13,
16(2)5,
17(2)5,
17(4)15,
18(3)11
- e.,
10(3)11,
10(4)5,
11(2)4,
11(2)5,
11(2)6
- effectiveness,
10(4)6,
11(3)12,
11(4)22,
12(2)12,
15(3)11,
15(3)12,
17(3)9
- embedded,
13(4)30,
17(4)16
- encrypted,
3(2)107,
8(1)119,
12(3)16,
13(3)22,
13(4)32,
13(4)35,
13(4)37,
16(3)12,
18(3)10
- encryption,
2(3)230,
2(4)416,
6(3)365,
7(1)1,
7(2)206,
9(2)162,
9(3)325,
9(4)461,
10(2)6,
11(2)4,
13(3)22,
13(4)31,
13(4)33,
13(4)35,
13(4)41,
16(1)2,
16(3)10,
17(2)6,
18(1)4,
18(3)10
- engine,
2(4)390,
13(3)28,
15(3)13
- experiment,
10(4)1,
11(2)5,
11(3)12,
11(4)22,
12(2)13,
13(3)28,
15(4)15,
16(2)6,
16(3)10,
16(3)11,
16(4)14,
17(3)12,
17(4)15,
18(3)11
- factor,
9(4)461,
10(4)5,
12(3)18,
13(4)37,
17(1)1,
17(2)8
- finally,
2(1)3,
10(4)1,
11(2)3,
11(4)17,
11(4)18,
12(3)18,
12(3)19,
12(4)20,
14(3)27,
16(1)4,
18(2)6,
18(4)12
- flexible,
2(2)177,
2(3)269,
4(2)158,
6(4)501,
10(1)2,
11(1)3,
13(3)24,
16(4)17,
17(3)10,
18(1)3
- forbidden,
11(4)21
- form,
11(4)17,
12(2)8,
16(4)17,
17(1)3,
17(1)4
- gained,
2(1)34,
2(1)65,
10(2)6
- growing,
10(1)3,
13(4)36,
14(4)32
- guarantee,
2(2)159,
10(3)11,
11(2)4,
11(2)5,
12(2)8,
12(2)9,
12(4)21,
13(3)21,
15(1)3,
15(4)17,
18(1)4,
18(4)12
- handled,
12(3)18
- hardware,
2(3)269,
14(1)5,
15(2)7,
17(2)8,
18(3)11
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)5,
10(4)6,
11(1)2,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- i.,
11(2)4,
11(2)5,
11(2)6
- index,
13(4)32
- input,
10(4)3,
12(2)10,
14(1)7,
14(3)27,
14(4)32,
15(4)15,
15(4)17,
16(1)4,
16(2)6,
18(1)4
- interest,
2(1)3,
12(4)20
- lead,
1(1)3,
2(1)3,
10(4)5,
11(4)17,
12(1)2,
13(3)20,
13(4)29,
17(1)2,
18(3)10,
18(4)13
- management,
1(1)3,
2(1)3,
2(1)65,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(4)354,
2(4)390,
3(2)107,
4(4)321,
4(4)453,
5(2)95,
6(3)327,
9(4)391,
10(4)2,
11(4)21,
12(1)6,
12(3)18,
13(1)5,
13(4)36,
16(1)4
- measurement,
2(4)416,
14(1)13,
15(4)17,
18(4)12
- mechanism,
2(2)177,
3(1)51,
10(2)8,
10(4)6,
11(2)5,
11(3)12,
11(3)16,
12(1)4,
12(2)9,
12(2)11,
12(2)13,
12(3)15,
12(3)19,
12(4)22,
13(3)21,
13(3)24,
13(3)25,
13(3)28,
13(4)29,
14(1)3,
14(1)11,
14(3)24,
14(3)27,
15(1)5,
15(2)6,
15(2)10,
16(1)3,
16(2)5,
16(3)12,
17(1)3,
17(2)5,
17(3)10,
18(4)14
- method,
1(1)3,
1(1)26,
2(2)159,
2(3)295,
2(3)332,
2(4)416,
9(3)259,
10(1)3,
10(3)10,
10(4)5,
11(2)2,
11(3)16,
11(4)19,
11(4)22,
12(1)2,
12(1)6,
12(2)13,
12(3)16,
13(2)15,
13(4)35,
15(1)4,
15(2)10,
15(3)12,
15(4)15,
15(4)17,
17(3)12,
18(3)9
- more,
2(1)3,
2(1)65,
2(3)332,
9(2)181,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(3)9,
10(4)1,
10(4)6,
11(2)3,
11(2)4,
11(2)6,
11(3)14,
11(4)21,
12(1)1,
12(2)8,
12(2)10,
12(2)12,
12(2)13,
12(3)18,
13(1)10,
13(3)20,
13(3)21,
13(3)22,
13(3)28,
13(4)32,
13(4)34,
13(4)39,
14(3)27,
14(4)31,
15(1)2,
15(1)5,
15(2)8,
15(2)9,
15(3)11,
15(3)12,
15(4)16,
16(1)2,
16(2)8,
16(3)10,
16(3)11,
16(4)17,
17(1)2,
17(1)3,
17(3)9,
17(4)14,
17(4)16,
18(1)1,
18(3)11,
18(4)13
- must,
2(2)159,
2(2)177,
9(4)421,
10(3)12,
11(3)13,
13(4)40,
14(4)29,
15(2)10,
16(1)4,
17(2)6
- paper,
1(1)66,
1(1)93,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)269,
2(4)390,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)5,
10(2)7,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
11(1)2,
11(2)1,
11(2)6,
12(2)12,
14(4)28,
14(4)32
- part,
2(3)332,
10(3)9,
11(2)2,
11(4)20,
12(1)1,
13(1)10,
15(2)8,
15(2)9,
16(4)15,
17(2)6,
17(4)16
- performance,
1(1)3,
1(1)26,
1(1)66,
2(3)269,
4(3)289,
5(4)458,
7(3)457,
9(4)461,
10(1)3,
11(1)2,
11(1)3,
11(2)1,
11(4)17,
11(4)19,
12(3)14,
12(3)16,
13(3)24,
13(3)25,
13(4)32,
13(4)35,
13(4)38,
14(1)3,
15(1)4,
16(1)1,
16(2)6,
16(2)8,
16(3)9,
16(4)16,
17(1)1,
17(2)8,
17(3)9,
17(4)13,
17(4)15
- platform,
11(1)3,
11(3)16,
11(4)22,
17(2)6,
18(3)11
- possible,
2(1)105,
10(2)5,
10(4)2,
11(2)6,
11(3)16,
11(4)22,
12(1)6,
12(2)10,
13(3)28,
13(4)33,
13(4)35,
13(4)39,
14(1)3,
14(1)14,
14(3)25,
14(4)32,
15(2)10,
17(1)2,
17(3)9,
18(1)4,
18(3)9
- potentially,
11(4)20,
16(3)12,
18(2)7,
18(4)12
- predicate,
11(1)3,
13(4)32,
14(1)9
- process,
1(1)26,
2(1)65,
9(4)421,
10(3)9,
11(1)2,
11(1)4,
11(4)18,
11(4)20,
12(2)11,
12(3)14,
13(1)10,
13(3)25,
13(4)36,
15(3)13,
16(2)5,
16(2)7,
17(2)6,
17(4)14,
18(1)3
- propose,
1(1)26,
2(1)65,
2(2)138,
2(3)269,
9(2)162,
9(4)391,
9(4)421,
10(1)3,
10(1)4,
10(3)12,
10(4)1,
10(4)3,
10(4)6,
11(1)3,
11(1)4,
11(3)12,
11(3)15,
11(4)18,
11(4)19,
11(4)23,
12(1)4,
12(2)8,
12(2)11,
12(2)13,
12(3)18,
13(3)28,
13(4)32,
13(4)36,
13(4)40,
13(4)41,
14(1)5,
14(1)10,
14(1)11,
14(3)24,
14(3)26,
14(4)30,
15(2)7,
15(4)17,
16(1)2,
16(4)15,
16(4)16,
17(1)1,
17(3)10,
17(3)11,
17(3)12,
17(4)13,
17(4)14,
18(1)2,
18(2)7
- proposed,
1(1)93,
2(2)138,
2(3)269,
2(4)416,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
11(1)2,
11(1)3,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)24,
14(3)27,
15(1)5,
15(3)11,
15(3)13,
15(4)15,
15(4)17,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- protected,
13(4)37,
18(2)6
- prototype,
1(1)3,
2(1)34,
10(1)4,
11(1)2,
11(1)3,
11(4)18,
12(1)4,
12(2)13,
13(4)30,
14(1)3,
16(1)1,
16(2)6,
17(2)5
- provider,
2(2)177,
11(1)3,
11(3)15,
13(4)39,
14(1)10,
16(3)12,
18(2)7,
18(4)13
- purpose,
10(3)9,
11(4)20,
12(2)11,
13(3)22,
13(3)24,
14(1)14,
16(3)10,
16(4)17,
17(1)3,
17(3)12,
18(1)1
- put,
11(4)19,
13(4)37,
16(3)9,
16(4)17,
18(1)1,
18(3)10
- quickly,
2(3)295,
11(2)3,
13(3)22,
15(3)13
- real,
10(1)2,
10(4)1,
11(2)3,
11(3)16,
11(4)17,
12(2)10,
12(2)11,
12(2)13,
13(4)30,
14(4)30,
16(3)10,
16(4)14,
16(4)17,
17(4)16,
18(1)3,
18(3)9,
18(4)12
- relevant,
12(1)2,
13(3)24,
15(4)18,
16(1)2,
17(2)7
- report,
10(1)4,
13(3)24,
16(1)1,
16(4)14,
17(2)5
- resource,
2(3)332,
9(4)391,
11(1)2,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(4)19,
11(4)20,
12(1)1,
12(1)6,
12(4)22,
13(3)20,
14(1)7,
14(1)10,
15(4)18,
17(1)2,
17(3)9,
18(2)6
- rule,
2(1)65,
10(1)4,
10(4)2,
10(4)5,
12(1)5,
12(4)21,
14(1)2,
15(2)6,
15(4)18,
16(4)16,
17(2)7
- running,
11(4)20,
12(2)10,
12(3)14,
13(1)10,
15(2)6,
15(4)16,
16(2)5,
16(4)13
- schemes,
3(3)161,
9(1)1,
9(4)461,
10(4)5,
11(2)1,
11(2)4,
11(2)5,
11(3)15,
11(4)22,
12(1)2,
12(1)3,
12(2)8,
12(3)18,
13(3)25,
13(4)39,
14(1)14,
14(4)29,
15(2)9,
17(1)4,
17(2)6,
17(4)15,
18(3)10
- secured,
17(2)5
- selective,
5(3)290,
13(4)39,
15(1)4
- serve,
2(3)230,
12(1)2,
15(3)13
- server,
1(1)66,
2(1)34,
2(3)230,
2(4)390,
11(2)2,
11(2)5,
11(3)14,
12(2)10,
12(3)14,
12(3)16,
12(3)17,
12(4)21,
14(1)3,
14(1)12,
14(4)29,
16(4)13,
16(4)15,
17(2)5,
17(4)15,
18(1)1
- service,
2(4)354,
4(4)453,
6(4)472,
10(1)2,
10(2)8,
10(3)11,
10(4)6,
11(1)2,
11(1)4,
11(3)15,
11(4)19,
12(2)12,
12(3)16,
13(4)38,
13(4)39,
13(4)41,
14(1)5,
14(3)23,
15(2)6,
15(3)12,
15(3)13,
16(2)5,
16(2)6,
16(3)11,
16(3)12,
16(4)14,
17(4)13,
17(4)15,
18(1)1,
18(1)2,
18(4)12,
18(4)13
- sharing,
2(4)354,
8(3)259,
9(4)461,
11(1)3,
11(1)4,
11(3)13,
13(4)34,
14(3)23,
17(4)13
- situation,
2(3)230,
11(3)12,
12(4)20,
15(2)10,
17(1)2
- smartcard,
9(3)325,
15(1)4
- solved,
17(3)11
- specific,
1(1)26,
10(2)6,
10(4)3,
11(4)19,
12(1)6,
13(3)26,
14(1)5,
14(1)9,
15(2)6,
16(3)10,
18(1)2
- static,
2(1)65,
9(3)292,
10(2)5,
11(2)3,
11(3)15,
12(1)1,
12(4)20,
13(4)32,
14(1)6,
16(1)4,
17(4)15,
18(1)4,
18(2)8
- stream,
6(2)258,
7(2)319,
12(3)16,
13(3)28,
14(1)5,
14(3)26,
15(4)17,
16(3)10,
17(4)16,
18(1)4
- streaming,
11(3)15,
12(3)16,
13(3)28
- suffer,
15(1)4,
16(2)7,
17(1)2,
18(4)12
- supporting,
4(2)103,
6(1)1,
13(3)24
- synthetic,
16(2)8
- tampering,
11(3)14,
13(4)30
- therefore,
2(2)177,
11(4)19,
12(2)11,
13(1)10,
13(3)28,
14(3)24,
15(1)5,
15(4)16,
17(1)3
- toward,
10(1)2,
11(1)3,
12(1)4,
15(2)7,
17(2)6,
18(4)14
- traditional,
1(1)93,
2(3)269,
11(4)22,
12(1)3,
12(2)10,
12(4)21,
14(1)3,
15(1)2,
16(2)8,
17(1)2,
17(3)12,
17(4)14,
17(4)16,
18(2)7
- trust,
5(2)95,
6(1)1,
7(1)21,
7(3)428,
9(3)352,
9(4)391,
10(3)11,
10(3)12,
10(4)3,
11(1)2,
12(1)2,
12(1)6,
12(2)8,
13(1)2,
13(1)5,
13(2)16,
14(4)29,
17(2)6
- two,
1(1)26,
2(4)416,
9(4)391,
10(1)4,
10(2)6,
10(2)8,
10(3)10,
11(2)1,
11(2)4,
11(2)6,
11(3)13,
11(4)22,
12(1)2,
12(1)3,
12(1)4,
12(1)6,
12(3)14,
12(4)20,
13(3)22,
13(3)27,
13(4)40,
14(1)4,
14(1)5,
14(4)30,
15(1)2,
15(1)5,
15(2)6,
15(3)11,
15(3)12,
16(1)1,
16(1)2,
16(1)4,
16(3)9,
16(3)10,
16(4)15,
17(4)13,
18(2)5,
18(4)12,
18(4)13,
18(4)14
- ubiquitous,
12(3)15,
12(4)21,
18(1)1
- value,
10(3)10,
10(4)1,
11(2)5,
11(4)18,
12(1)6,
12(2)10,
13(1)10,
14(1)9,
14(1)14,
15(1)4,
15(2)9,
15(4)17,
16(1)1,
17(3)10,
18(1)1,
18(2)5,
18(3)10
- version,
10(1)3,
11(1)2,
12(2)10,
12(3)16,
13(4)37,
16(4)13,
17(4)15
- way,
2(1)3,
2(1)65,
2(3)230,
2(3)269,
2(4)416,
9(4)461,
10(4)3,
11(1)2,
11(3)13,
12(1)5,
12(2)8,
12(2)11,
12(3)14,
13(1)10,
13(3)22,
13(3)28,
13(4)34,
15(2)10,
15(4)15,
16(3)10,
16(3)11,
16(4)17,
17(2)6
- when,
2(3)295,
10(2)7,
10(3)12,
10(4)6,
11(2)3,
11(2)6,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
12(2)10,
12(2)11,
12(4)20,
12(4)22,
13(1)10,
13(3)27,
13(4)32,
13(4)34,
13(4)35,
13(4)37,
15(2)6,
15(2)9,
15(2)10,
15(3)14,
16(1)3,
16(2)8,
17(3)9,
17(4)13,
18(3)9,
18(4)12
- whenever,
12(3)18,
12(3)19,
13(3)22
- where,
2(3)230,
9(4)461,
10(4)5,
10(4)6,
11(3)12,
11(3)13,
11(4)19,
12(1)3,
12(3)15,
12(3)16,
12(4)20,
13(3)20,
13(3)22,
13(4)33,
13(4)37,
14(1)7,
15(2)6,
15(3)12,
15(3)13,
16(1)4,
16(2)5,
17(3)10,
17(4)16,
18(1)2,
18(2)8
- XML,
5(2)169,
5(3)290,
9(3)292,
9(4)421,
10(1)3,
10(2)8