scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Patent
13 Aug 2003
TL;DR: In this article, the authors present a system and method for limiting access to data including a secured appliance, where the secured appliance has limited responsiveness to received remote control data frames unless such remote control Data frames include parameters matching those stored within the secured appliances.
Abstract: A system and method for limiting access to data including a secured appliance. The secured appliance has limited responsiveness to received remote control data frames unless such remote control data frames include parameters matching those stored within the secured appliance.

55 citations

Patent
Behrouz Rasoulian1, Renato J. Recio1
24 Mar 1997
TL;DR: In this article, a data storage subsystem controller queries all computing systems having direct access to the same data storage areas as to the operating systems utilized by such computing systems and retrieves the stored meta-data associated with the computing system which is requesting access to a storage area within the shared data storage system.
Abstract: A method and system are provided which allow heterogeneous computing systems to have direct access to the same data storage areas on a shared data storage subsystem such that the method and system are transparent to the heterogeneous computing systems. The method and system achieve the foregoing via the following steps. A data storage subsystem controller queries all computing systems having direct access to the same data storage areas of a shared data storage subsystem as to the operating systems utilized by such computing systems. In response to answers received in response to the queries, the data storage subsystem controller creates and stores meta-data which associates each computing system having direct access with whatever operating system is running on each computing system having direct access. In response to a request from a computing system having direct access for access to a data storage area within the shared data storage subsystem, the data storage subsystem controller retrieves the stored meta-data associated with the computing system which is requesting access to a data storage area within the shared data storage subsystem. The data storage subsystem controller utilizes the retrieved meta-data to correctly interpret and respond to the request for access to a data storage area in a manner consonant with the operating system of the computing system which is requesting access to a data storage area within said shared data storage subsystem.

55 citations

Patent
22 Oct 2003
TL;DR: In this article, the authors present a secure architecture in which access to data is limited to only approved or authorized entities, confidential details in received data can be readily identified and concealed; and confidential details that have become non-confidential can be identified and exposed.
Abstract: Various embodiments for maintaining security and confidentiality of data and operations within a fraud detection system. Each of these embodiments utilizes a secure architecture in which: (1) access to data is limited to only approved or authorized entities; (2) confidential details in received data can be readily identified and concealed; and (3) confidential details that have become non-confidential can be identified and exposed.

55 citations

Patent
17 Nov 2014
TL;DR: In this paper, the authors propose a verifiable secret sharing scheme to verify that encrypted data can be reconstituted without the data storage system accessing the encrypted data, and the system synchronously acknowledges that the received encrypted data has been verified and successfully stored.
Abstract: Embodiments are directed to allowing a user to store encrypted, third-party-accessible data in a data store and to providing third party data access to a user's encrypted data according to a predefined policy. A data storage system receives encrypted data from a user at a data storage system. The data is encrypted using the user's private key. The data storage system stores the received encrypted data according to a predefined policy. The encryption prevents the storage system from gaining access to the encrypted data, while the policy allows the encrypted data to be released upon receiving a threshold number of requests from verified third parties. The data storage system implements a verifiable secret sharing scheme to verify that the encrypted data can be reconstituted without the data storage system accessing the encrypted data. The data storage system synchronously acknowledges that the received encrypted data has been verified and successfully stored.

55 citations

Proceedings ArticleDOI
Yon Dohn Chung1, Myoung Ho Kim1
19 Apr 1999
TL;DR: A practically usable method is given, named QEM, which constructs the broadcast schedule by expanding each query's data set in greedy way and a measure, named QueryDistance (QD), which represents the degree of coherence for the data set accessed by a query.
Abstract: In mobile distributed systems the data on air can be accessed by a large number of clients. This paper describes the way clients access the wireless broadcast data with short latency. We define and analyze the problem of wireless data scheduling and we propose a measure, named QueryDistance (QD), which represents the degree of coherence for the data set accessed by a query. We give a practically usable method named QEM which constructs the broadcast schedule by expanding each query's data set in greedy way. We also evaluate the performance of our method by experiments.

55 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816