• Title/Summary/Keyword: Schemas

Search Result 117, Processing Time 0.026 seconds

Access Control Mechanism for CouchDB

  • Ashwaq A., Al-otaibi;Reem M., Alotaibi;Nermin, Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.107-115
    • /
    • 2022
  • Recently, big data applications need another database different from the Relation database. NoSQL databases are used to save and handle massive amounts of data. NoSQL databases have many advantages over traditional databases like flexibility, efficiently processing data, scalability, and dynamic schemas. Most of the current applications are based on the web, and the size of data is in increasing. NoSQL databases are expected to be used on a more and large scale in the future. However, NoSQL suffers from many security issues, and one of them is access control. Many recent applications need Fine-Grained Access control (FGAC). The integration of the NoSQL databases with FGAC will increase their usability in various fields. It will offer customized data protection levels and enhance security in NoSQL databases. There are different NoSQL database models, and a document-based database is one type of them. In this research, we choose the CouchDB NoSQL document database and develop an access control mechanism that works at a fain-grained level. The proposed mechanism uses role-based access control of CouchDB and restricts read access to work at the document level. The experiment shows that our mechanism effectively works at the document level in CouchDB with good execution time.

Analysis of Metadata Standards of Record Management for Metadata Interoperability From the viewpoint of the Task model and 5W1H (메타데이터 상호운용성을 위한 기록관리 메타데이터 표준 분석 5W1H와 태스크 모델의 관점에서)

  • Baek, Jae-Eun;Sugimoto, Shigeo
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.127-176
    • /
    • 2012
  • Metadata is well recognized as one of the foundational factors in archiving and long-term preservation of digital resources. There are several metadata standards for records management, archives and preservation, e.g. ISAD(G), EAD, AGRkMs, PREMIS, and OAIS. Consideration is important in selecting appropriate metadata standards in order to design metadata schema that meet the requirements of a particular archival system. Interoperability of metadata with other systems should be considered in schema design. In our previous research, we have presented a feature analysis of metadata standards by identifying the primary resource lifecycle stages where each standard is applied. We have clarified that any single metadata standard cannot cover the whole records lifecycle for archiving and preservation. Through this feature analysis, we analyzed the features of metadata in the whole records lifecycle, and we clarified the relationships between the metadata standards and the stages of the lifecycle. In the previous study, more detailed analysis was left for future study. This paper proposes to analyze the metadata schemas from the viewpoint of tasks performed in the lifecycle. Metadata schemas are primarily defined to describe properties of a resource in accordance with the purposes of description, e.g. finding aids, records management, preservation and so forth. In other words, the metadata standards are resource- and purpose-centric, and the resource lifecycle is not explicitly reflected in the standards. There are no systematic methods for mapping between different metadata standards in accordance with the lifecycle. This paper proposes a method for mapping between metadata standards based on the tasks contained in the resource lifecycle. We first propose a Task Model to clarify tasks applied to resources in each stage of the lifecycle. This model is created as a task-centric model to identify features of metadata standards and to create mappings among elements of those standards. It is important to categorize the elements in order to limit the semantic scope of mapping among elements and decrease the number of combinations of elements for mapping. This paper proposes to use 5W1H (Who, What, Why, When, Where, How) model to categorize the elements. 5W1H categories are generally used for describing events, e.g. news articles. As performing a task on a resource causes an event and metadata elements are used in the event, we consider that the 5W1H categories are adequate to categorize the elements. By using these categories, we determine the features of every element of metadata standards which are AGLS, AGRkMS, PREMIS, EAD, OAIS and an attribute set extracted from DPC decision flow. Then, we perform the element mapping between the standards, and find the relationships between the standards. In this study, we defined a set of terms for each of 5W1H categories, which typically appear in the definition of an element, and used those terms to categorize the elements. For example, if the definition of an element includes the terms such as person and organization that mean a subject which contribute to create, modify a resource the element is categorized into the Who category. A single element can be categorized into one or more 5W1H categories. Thus, we categorized every element of the metadata standards using the 5W1H model, and then, we carried out mapping among the elements in each category. We conclude that the Task Model provides a new viewpoint for metadata schemas and is useful to help us understand the features of metadata standards for records management and archives. The 5W1H model, which is defined based on the Task Model, provides us a core set of categories to semantically classify metadata elements from the viewpoint of an event caused by a task.

Application Program Independent Schema Evolution in Relational Databases (관계형 데이타베이스를 위한 응용 프로그램 독립적인 스키마 진화)

  • 나영국
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.445-456
    • /
    • 2004
  • The database schema is assumed to be stable enough to remain valid even as the modeled environment changes. However, in practice. data models are not nearly as stable as commonly assumed by the database designers. Even though a rich set of schema change operations is provided in current database systems, the users suffer from the problem that schema change usually impacts existing application programs that have been written against the schema. In this paper, we are exploring the possible solutions to overcome this problem of impacts on the application programs. We believe that for continued support of the existing programs on the old schema, the old schema should continue to allow updates and queries, as before. Furthermore, its associated data has to be kept up-to-date. We call this the program independency property of schema change tools. For this property. we devise so-called program independency schema evolution (PISE) methodology. For each of the set of schema change operations in the relational schemas, the sketch of the additional algorithms due to the PISE compliance is presented in order to prove the comprehensiveness and soundness of our PISE methodology.

The Effect of Group Sandplay Therapy for Children's Self-concept Construction and Ego-development Enhancement (아동의 자아개념형성과 자아발달 촉진을 위한 집단모래놀이치료 효과)

  • You, Seung-Eun;Park, Boo-Jin
    • Korean Journal of Child Studies
    • /
    • v.32 no.3
    • /
    • pp.163-184
    • /
    • 2011
  • This study was conducted in order to inquire into the impact of children's self-concept construction and ego-development enhancement during Group Sandplay Therapy. The Group Sandplay Therapy sessions were held once week, for a total of 20 weeks. The Group Sandplay Therapy Process consisted of playing with sand and creating a sand tray in groups. There were two group in total. Each group had 4 children of the same sex aged from six to seven years old. In order to study the self-concept and ego-development, we used a self-concept test and ego-development as a research tool. In addition, the present research analyzed any changes which tool place by dividing each aspect in each sand tray of the therapy process into a positive subject and a negative subject, and analyzed the changing patterns seen in the sand tray worldas it unfolded. It was proven that an efficient treatment in changing the sand tray world and children's action, had an effect on rearranging the children's mental schemas. In terms of the progress of the sandplay journey, it was seen that negative elements decreased dramatically and positive elements were observed to have increased. As a result it was confirmed that Group Sandplay Therapy had a number of positive effects in the construction of children's self-concept and in terms of the enhancement of children ego-development.

Database Designs for u-Healthcare System and Magi Network Traffic Management System (u-헬스케어 시스템과 네트워크 트래픽 매니지먼트 시스템의 데이터베이스 설계 및 구현)

  • Yong, Ki-Tak;Laine, Teemu H.;Lee, Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.3
    • /
    • pp.103-112
    • /
    • 2008
  • In this paper we present two databases for two different systems each having novel implementation ideas: a u-Healthcare system with a mobile gateway and MAGI network monitoring system. u-Healthcare system is capturing and monitoring vital sign data without restrictions of location and time using body sensor network and a mobile gateway. MAGI is a system which has a dynamic firewall function and solves problems of existing traffic monitoring tools. In addition to presenting the design principles behind these two systems, we describe the respective database schemas together with detailed information of the data stored within the databases. We will also show and discuss performance measurements and calculations for both systems. Based on the performance data we will discuss the systems' suitability for their intended uses.

A Study of Hierarchical Policy Model of Policy-based Integrated Security Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 정책 기반의 통합보안관리시스템의 계층적 정책모델에 관한 연구)

  • Lee, Dong-Yeong;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.607-614
    • /
    • 2001
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from those attacks, many vendors have developed various security systems such as firewalls, intrusion detection systems, and access control systems. However, managing those systems individually requires too much work and high cost. Thus, in order to manage integrated security management and establish consistent security management for various security products, the policy model of PN-ISMS (Policy Based Integrated Security Management System) has become very important. In this paper, present the hierarchical policy model which explore the refinement of high-level/conceptual policies into a number of more specific policies to form a policy hierarchy. A formal method of policy description was used as the basis of the mode in order to achieve precision and generality. Z-Notation was chosen for this propose. The Z-Notation is mathematical notation for expressing and communicating the specifications of computer programs. Z uses conventional notations of logic and set theory organized into expressions called schemas.

  • PDF

GLIBP: Gradual Locality Integration of Binary Patterns for Scene Images Retrieval

  • Bougueroua, Salah;Boucheham, Bachir
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.469-486
    • /
    • 2018
  • We propose an enhanced version of the local binary pattern (LBP) operator for texture extraction in images in the context of image retrieval. The novelty of our proposal is based on the observation that the LBP exploits only the lowest kind of local information through the global histogram. However, such global Histograms reflect only the statistical distribution of the various LBP codes in the image. The block based LBP, which uses local histograms of the LBP, was one of few tentative to catch higher level textural information. We believe that important local and useful information in between the two levels is just ignored by the two schemas. The newly developed method: gradual locality integration of binary patterns (GLIBP) is a novel attempt to catch as much local information as possible, in a gradual fashion. Indeed, GLIBP aggregates the texture features present in grayscale images extracted by LBP through a complex structure. The used framework is comprised of a multitude of ellipse-shaped regions that are arranged in circular-concentric forms of increasing size. The framework of ellipses is in fact derived from a simple parameterized generator. In addition, the elliptic forms allow targeting texture directionality, which is a very useful property in texture characterization. In addition, the general framework of ellipses allows for taking into account the spatial information (specifically rotation). The effectiveness of GLIBP was investigated on the Corel-1K (Wang) dataset. It was also compared to published works including the very effective DLEP. Results show significant higher or comparable performance of GLIBP with regard to the other methods, which qualifies it as a good tool for scene images retrieval.

A Software Architecture Design Method that Matches Problem Frames and Architectural Patterns (문제틀과 아키텍처 패턴의 매칭을 이용한 소프트웨어 아키텍처 설계 방법)

  • Kim, Jungmin;Kang, Sungwon;Lee, Jihyun
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.341-360
    • /
    • 2015
  • While architectural patterns provide software development solutions by providing schemas for structural organizations of software systems based on empirical knowledge, Jackson's problem frames provide a method of analyzing software problems. Problem frames are useful to understanding the software development problem, by putting emphasis on the problem domain, rather than on the solution space. Research exists that relates problem frames and software architecture, but most of this research uses problem frames only to understand given problems. Moreover, none of the existing research derives architectural patterns by considering both problem frames and quality attributes. In this paper, we propose a software architecture design method for pattern-based architecture design, by matching problem frames and architectural patterns. To that end, our approach first develops the problem model based on the problem frames approach, and then uses it to match with candidate architectural patterns, from the perspectives of both functionality, and quality attributes. Functional matching uses the problem frame diagram to match the problem model of an architectural pattern. We conduct a case study to show that our approach can systematically decide the right architectural patterns, and provide a basis for fine-grained software architecture design.

A Study on the Typicality and Preference according to Determinants of Typicality (전형성 결정요인에 따른 전형성과 선호도 연구)

  • 나광진;양종열;홍정표;이유리
    • Archives of design research
    • /
    • v.15 no.4
    • /
    • pp.87-96
    • /
    • 2002
  • This study investigated the influence of ideals(goal-directed design attributes) and physical common features on typicality of product design and the relationship between typicality and preference that suggested different result in prior research. So for these objectives we explored the relationship between typicality and preference with two dimensions composed of goal-directed attribute typicality and physical common features typicality. The result showed that consumers' judgment of typicality on product design was increased as the product design has ideals. This was a same result as the prior research. In addition, Increasing the physical common feature with other members in product category, consumers judged that the product design is typical. Otherwise, in results of the relationship between typicality and preference were showed that the design of ideals(goal-directed design attributes) influenced on preference positively, but the design of physical common features had an inverted U-shaped.

  • PDF

Aesthetic Implications of the Algorithm Applied to New Media Art Works : A Focus on Live Coding (뉴미디어 예술 작품에 적용된 알고리즘의 미학적 함의 : 라이브 코딩을 중심으로)

  • Oh, Junho
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.119-130
    • /
    • 2013
  • This paper researches the algorithm, whose materiality and expressiveness can be obtained through live coding. Live coding is an improvised genre of music that generates sounds while writing code in real time and projecting it onto a screen. Previous studies of live coding have focused on the development environment to support live coding performance effectively. However, this study examines the aesthetic attitude immanent in the realization of the algorithm through analyzing mostly used languages such as ChucK, Impromtu, and the visualization of live code and cases of "aa-cell" and "slub" performance. The aesthetic attitudes of live coding performance can be divided into algebraic and geometric attitudes. Algebraic attitudes underline the temporal development of concepts; geometric attitudes highlight the materialization of the spatial structure of concepts through image schemas. Such a difference echoes the tension between conception and materiality, which appears in both conceptual and concrete poetry. The linguistic question of whether conception or materiality is more greatly emphasized defines the expressiveness of the algorithm.