• Title/Summary/Keyword: database access

Search Result 873, Processing Time 0.028 seconds

Access Control Models for XML Databases in the Cloud

  • Alfaqir, Shumukh;Hendaoui, Saloua;Alhablani, Fatimah;Alenzi, Wesam
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.89-96
    • /
    • 2022
  • Security is still a great concern to this day, albeit we have come a long way to mitigate its numerous threats. No-SQL databases are rapidly becoming the new database de-facto, as more and more apps are being developed every day. However, No-SQL databases security could be improved. In this paper, we discuss a way to improve the security of XML-based databases with the use of trust labels to be used as an access control model.

Analysis of DOAJ-Registered Open Access Journals in Asian Countries

  • Jane Cho
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.13 no.3
    • /
    • pp.31-45
    • /
    • 2023
  • This study aims to understand the characteristics of Asian OA journals and to identify differences by the countries. 3,103 DOAJ-registered OA journals from 21 Asian countries as of 2020 were selected and analyzed from various perspectives using correspondence and correlation analysis. The results revealed that Indonesia had the most DOAJ-registered open access journals, followed by Iran and India. An APC was not charged by 70% of journals, but this varied greatly by country. Meanwhile, as a result of comparing DOAJ-registered Asian journals with international citation database listed journals, 11% of journals were listed on Scopus and only 2.6% and 0.1% were listed on SCIE and SSCI, which is represents less than half of the global level. In addition, although there are many free to read local journals in China, Japan, and Korea, the number of OA journals registered in DOAJ is relatively small. Therefore, it is difficult to say that the progress of OA in local journals is fast even if the country's global research competitiveness is high.

Performance Evaluation for Scheduling Policies on a Realtime Database (실시간 데이터베이스에 대한 스케쥴링 정책의 성능 평가)

  • Kim, Suhee;Han, Kwangrok;Kim, Hwankoo;Son, Sang-Hyuk
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.57-82
    • /
    • 2004
  • The confluence of computers, communications, and databases is quickly creating a distributed database where many applications require real-time access to temporally consistent sensor data. We have developed an object-oriented real-time database system called BeeHive to provide a significant improvement in performance and functionality over conventional non-real-time database and object management systems. In this paper, the performance of two data-deadline cognizant scheduling policies EDDF and EDF-DC and the baseline EDF policy with/without admission control are evaluated through extensive experiments on BeeHive. The ranges where data-deadline cognizant scheduling policies are effective and where admission control plays a role are identified.

  • PDF

A DATABASE FOR HUMAN PERFORMANCE UNDER SIMULATED EMERGENCIES OF NUCLEAR POWER PLANTS

  • Park, Jin-Kyun;Jung, Won-Dea
    • Nuclear Engineering and Technology
    • /
    • v.37 no.5
    • /
    • pp.491-502
    • /
    • 2005
  • Reliable human performance is a prerequisite in securing the safety of complicated process systems such as nuclear power plants. However, the amount of available knowledge that can explain why operators deviate from an expected performance level is so small because of the infrequency of real accidents. Therefore, in this study, a database that contains a set of useful information extracted from simulated emergencies was developed in order to provide important clues for understanding the change of operators' performance under stressful conditions (i.e., real accidents). The database was developed under Microsoft Windows TM environment using Microsoft Access $97^{TM}$ and Microsoft Visual Basic $6.0^{TM}$. In the database, operators' performance data obtained from the analysis of over 100 audio-visual records for simulated emergencies were stored using twenty kinds of distinctive data fields. A total of ten kinds of operators' performance data are available from the developed database. Although it is still difficult to predict operators' performance under stressful conditions based on the results of simulated emergencies, simulation studies remain the most feasible way to scrutinize performance. Accordingly, it is expected that the performance data of this study will provide a concrete foundation for understanding the change of operators' performance in emergency situations.

Design of Main-Memory Database Prototype System using Fuzzy Checkpoint Technique in Real-Time Environment (실시간 시스템에서 퍼지 검사점을 이용한 주기억 데이터베이스 프로토타입 시스템의설계)

  • Park, Yong-Mun;Lee, Chan-Seop;Choe, Ui-In
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1753-1765
    • /
    • 2000
  • As the areas of computer application are expanded, real-time application environments that must process as many transactions as possible within their deadlines, such as a stock transaction systems, ATM switching systems etc, have been increased recently. The reason why the conventional database systems can't process soft real-time applications is the lack of prediction and poor performance on processing transaction's deadline. If transactions want to access data stored at the secondary storage, they can not satisfy requirements of real-time applications because of the disk delay time. This paper designs a main-memory database prototype systems to be suitable to real-time applications and then this system can produce rapid results without disk i/o as all of the information are loaded in main memory database. In thesis proposed the improved techniques with respect to logging, checkpointing, and recovering in our environment. In order to improve the performance of the system, a) the frequency of log analysis and redo processing is reduced by the proposed redo technique at system failure, b) database consistency is maintained by improved fuzzy checkpointing. The performance model is proposed which consists of two parts. The first part evaluates log processing time for recovery and compares with other research activities. The second part examines checkpointing behavior.

  • PDF

Contracture for GRM of Biological Resources Information of based DADI (DADI 기반의 생물다양성정보에 대한 GRM 구축)

  • 이계준;박형선;안부영;양진호
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2002.11a
    • /
    • pp.479-484
    • /
    • 2002
  • In this paper consisted of thur steps for the research The first, The Database of Biological Resource Information are constructing for species Information and Content Information of based XML. The second The item of defined from the analysts and must be considered for national GSD(Global Species Database), Supply and Contracture of input System of based Component for the Efficient Local Information Database. The third, Information Service and Interoperability are using the GRM(Global Road Map) of based DADI. These are able to accomplish to Contracture for Database and Service structure of Biological Resources Information

  • PDF

QSDB: An Encrypted Database Model for Privacy-Preserving in Cloud Computing

  • Liu, Guoxiu;Yang, Geng;Wang, Haiwei;Dai, Hua;Zhou, Qiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3375-3400
    • /
    • 2018
  • With the advent of database-as-a-service (DAAS) and cloud computing, more and more data owners are motivated to outsource their data to cloud database in consideration of convenience and cost. However, it has become a challenging work to provide security to database as service model in cloud computing, because adversaries may try to gain access to sensitive data, and curious or malicious administrators may capture and leak data. In order to realize privacy preservation, sensitive data should be encrypted before outsourcing. In this paper, we present a secure and practical system over encrypted cloud data, called QSDB (queryable and secure database), which simultaneously supports SQL query operations. The proposed system can store and process the floating point numbers without compromising the security of data. To balance tradeoff between data privacy protection and query processing efficiency, QSDB utilizes three different encryption models to encrypt data. Our strategy is to process as much queries as possible at the cloud server. Encryption of queries and decryption of encrypted queries results are performed at client. Experiments on the real-world data sets were conducted to demonstrate the efficiency and practicality of the proposed system.

A study on the database structure of medical records - Focusing on Yakazudōmei's medical records - (의안(醫案)의 데이터베이스 구조화 연구 - 시수도명의 의안을 중심으로 -)

  • Kim, Sung-Won;Kim, Ki-Wook;Lee, Byung-Wook
    • Herbal Formula Science
    • /
    • v.25 no.1
    • /
    • pp.39-49
    • /
    • 2017
  • Objectives : The contents of the literature associated with the medical records were entered into the database. We want to find the structure and search methods for efficient utilization of the database. Methods : The contents were entered into the database using the 'Access 2014 of the MS'. The Query Sentences were created and utilized for a search. Results : We could find information about the prescriptions, medical records and patients by the herbs and symptom combinations using the single table named 'Integrated Knowledge' and queries. Integrated Knowledge is a table that gathered patient information, prescription information and symptom information together. Conclusions : If you store patient, prescription and symptom information on a single table, you could search and use the results by various combinations of the various elements included in the table. These results could help curing patients on the basis of evidence-based treatment at the clinics.

A Study on Development of Database for the Characteristics of Hazardous Chemicals (유해화학물질 특성정보 데이터베이스 구축 연구)

  • Han, Jong-Yup;Song, Ki-Sup;Kang, Sung-Hyun
    • Journal of Information Management
    • /
    • v.28 no.2
    • /
    • pp.1-19
    • /
    • 1997
  • A late-comer in the marine affairs, development of ways for efficient access and utilization of information on marine environmental conservation and pollution prevention is important. The properties and removal methods of toxic chemicals have been entered into the database for 1,000 substances. The database of toxic chemicals for pollution and spills has also been fortified for the following terms: general characteristics, health hazard and response, fire hazard and response, chemical reactivity, physico-chemical properties, and other properties. The information and data running in this database are easily accessible via Internet and Korean telecommunications companies; it is also available KRISTAL databases.

  • PDF

Contracture for GRM of Biological Resources Information of based DADI (DADI 기반의 생물다양성정보에 대한 GRM 구축)

  • 이계준;박형선;안부영;양진호
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.11a
    • /
    • pp.479-484
    • /
    • 2002
  • In this paper consisted of three steps for the research The first, The Database of Biological Resource Information are constructing for species Information and Content Information of based XML. The second, The item of defined from the analysts and must be considered for national GSD(Global Species Database), Supply and Contracture of Input System of based Component for the Efficient Local Information Database. The third Information Service and Interoperability are using the GRM(Global Road Map) of based DADI. These are able to accomplish to Contracture for Database and Service structure of Biological Resources Information.

  • PDF