[Home] [By Thread] [By Date] [Recent Entries]



thanks for the clarifications.. This illustrates what the PI in XML can do
etc..

I guess if there is some security/access control aspects in XML, then
probably a right perspective is: how to give access to different portions
of an XML document to different users.. I will keep it in mind, if I have
to review works in these areas.

best, murali.

On Tue, 18 Nov 2003, Michael Rys wrote:

> The point regarding PIs is that it is just markup and has no semantics.
> Only a processor that sees the PI and understands its target will act on
> it. It does not introduce "code" into XML any more or any less than an
> element with a specific markup.
>
> For example, for SQL Server 2000 we designed a so called SQLXML
> template: an XML file that contains markup with special names that
> execute a query against a database. We decided to use a special
> namespace and XML elements for giving this information, but
> theoretically, we could have used processing-instructions as well. XSLT
> processors for example interpret a special PI as an instruction to
> transform an XML document containing that PI using the indicated XSLT
> transform. Theoretically, XSLT could have chosen an XML element in a
> special namespace for doing so.
>
> There are some trade-offs to be made, but neither approach is more or
> less secure per se.
>
> Best regards
> Michael



Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member