scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Proceedings ArticleDOI
22 Mar 2011
TL;DR: It is shown that the security framework proposed can efficiently protect a data storage system by evaluating the benefits of preventing a DoS attack targeted towards BlobSeer through experiments performed on the Grid'5000 testbed.
Abstract: Providing an adequate security level in Cloud Environments is currently an extremely active research area. More specifically, malicious behaviors targeting large-scale Cloud data repositories (e.g. Denial of Service attacks) may drastically degrade the overall performance of such systems and cannot be detected by typical authentication mechanisms. In this paper we propose a generic security management framework allowing providers of Cloud data management systems to define and enforce complex security policies. This security framework is designed to detect and stop a large array of attacks defined through an expressive policy description language and to be easily interfaced with various data management systems. We show that we can efficiently protect a data storage system by evaluating our security framework on top of the BlobSeer data management platform. We evaluate the benefits of preventing a DoS attack targeted towards BlobSeer through experiments performed on the Grid'5000 testbed.

64 citations

Journal ArticleDOI
15 Nov 2019
TL;DR: It is theorized that those who create data have intimate and tacit knowledge that can be used as barter to form collaborations for mutual advantage, and proposes a typology of data reuses ranging from comparative to integrative.
Abstract: Open access to data, as a core principle of open science, is predicated on assumptions that scientific data can be reused by other researchers. We test those assumptions by asking where scientists find reusable data, how they reuse those data, and how they interpret data they did not collect themselves. By conducting a qualitative meta-analysis of evidence on two long-term, distributed, interdisciplinary consortia, we found that scientists frequently sought data from public collections and from other researchers for comparative purposes such as “ground-truthing” and calibration. When they sought others’ data for reanalysis or for combining with their own data, which was relatively rare, most preferred to collaborate with the data creators. We propose a typology of data reuses ranging from comparative to integrative. Comparative data reuse requires interactional expertise, which involves knowing enough about the data to assess their quality and value for a specific comparison such as calibrating an instrument in a lab experiment. Integrative reuse requires contributory expertise, which involves the ability to perform the action, such as reusing data in a new experiment. Data integration requires more specialized scientific knowledge and deeper levels of epistemic trust in the knowledge products. Metadata, ontologies, and other forms of curation benefit interpretation for any kind of data reuse. Based on these findings, we theorize the data creators’ advantage, that those who create data have intimate and tacit knowledge that can be used as barter to form collaborations for mutual advantage. Data reuse is a process that occurs within knowledge infrastructures that evolve over time, encompassing expertise, trust, communities, technologies, policies, resources, and institutions. Keywords: data, science, reuse, biomedicine, environmental sciences, open science, data practices, science policy

63 citations

Journal ArticleDOI
TL;DR: This paper motivates the need for policy federation using an in-depth case study analysis in the domain of e-health and presents a policy federation algorithm based on a widely-applicable attribute-based policy model that effectively succeeds in keeping the sensitive tenant data confidential and improves policy evaluation time in most cases.
Abstract: Software-as-a-Service (SaaS) is a type of cloud computing in which a tenant rents access to a shared, typically web-based application hosted by a provider. Access control for SaaS should enable the tenant to control access to data that are located at the provider side, based on tenant-specific access control policies. Moreover, with the growing adoption of SaaS by large enterprises, access control for SaaS has to integrate with on-premise applications, inherently leading to a federated set-up. However, in the state of the art, the provider completely evaluates all policies, including the tenant policies. This (i) forces the tenant to disclose sensitive access control data and (ii) limits policy evaluation performance by having to fetch this policy-specific data. To address these challenges, we propose to decompose the tenant policies and evaluate the resulting parts near the data they require as much as possible while keeping sensitive tenant data local to the tenant environment. We call this concept policy federation. In this paper, we motivate the need for policy federation using an in-depth case study analysis in the domain of e-health and present a policy federation algorithm based on a widely-applicable attribute-based policy model. Furthermore, we show the impact of policy federation on policy evaluation time using the policies from the case study and a prototype implementation of supporting middleware. As shown, policy federation effectively succeeds in keeping the sensitive tenant data confidential and at the same time improves policy evaluation time in most cases.

63 citations

Patent
24 Apr 2006
TL;DR: In this paper, the authors propose a multi-protocol caching filer coupled to an origin server to provide storage virtualization of data served by the filer in response to data access requests issued by multiple protocols over a computer network.
Abstract: A network caching system has a multi-protocol caching filer coupled to an origin server to provide storage virtualization of data served by the filer in response to data access requests issued by multi-protocol clients over a computer network. The multi-protocol caching filer includes a file system configured to manage a sparse volume that “virtualizes” a storage space of the data to thereby provide a cache function that enables access to data by the multi-protocol clients. To that end, the caching filer further includes a multi-protocol engine configured to translate the multi-protocol client data access requests into generic file system primitive operations executable by both the caching filer and the origin server.

63 citations

Journal ArticleDOI
TL;DR: This article considers evolutionary changes to IS-136 TDMA to enable it to provide a variety of PCS concepts and proposes options that would provide high-quality voice service for indoor and pedestrian systems such as cellular office systems and personal base stations.
Abstract: A number of factors have motivated most spectrum owners to make plans to deploy upbanded second-generation cellular technologies for use in the PCS bands in the United States. However, the second-generation cellular technologies will need to be enhanced to provide third-generation services. There is interest in using the PCS and cellular spectra to broaden the market of users and the range of use of wireless beyond where it stands today, and beyond the primary applications that drove the development of the technologies being deployed. There is also interest in new technologies to improve the performance of cellular and PCS services, reduce the cost, and improve availability. This article considers evolutionary changes to IS-136 TDMA to enable it to provide a variety of PCS concepts. These evolutionary changes are presented in the form of options that would (1) provide high-quality voice service for indoor and pedestrian systems such as cellular office systems and personal base stations; (2) support enhanced-bit-rate packet wireless data access to the Internet as well as circuit data access; (3) provide smart antenna technology to improve coverage, quality, and capacity; (4) automatically assign frequencies for operation and provide for dynamic channel reconfiguration; (5) support microcellular arrangements to provide low-cost and high-capacity service in dense areas; and (6) support a future high-speed packet data access mode through a wideband system that is complementary to IS-136 TDMA and supports single-terminal operation.

63 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816