Topic
Data access
About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.
Papers published on a yearly basis
Papers
More filters
•
13 Aug 2003TL;DR: In this article, the authors present a system and method for limiting access to data including a secured appliance, where the secured appliance has limited responsiveness to received remote control data frames unless such remote control Data frames include parameters matching those stored within the secured appliances.
Abstract: A system and method for limiting access to data including a secured appliance. The secured appliance has limited responsiveness to received remote control data frames unless such remote control data frames include parameters matching those stored within the secured appliance.
55 citations
•
IBM1
TL;DR: In this article, a data storage subsystem controller queries all computing systems having direct access to the same data storage areas as to the operating systems utilized by such computing systems and retrieves the stored meta-data associated with the computing system which is requesting access to a storage area within the shared data storage system.
Abstract: A method and system are provided which allow heterogeneous computing systems to have direct access to the same data storage areas on a shared data storage subsystem such that the method and system are transparent to the heterogeneous computing systems. The method and system achieve the foregoing via the following steps. A data storage subsystem controller queries all computing systems having direct access to the same data storage areas of a shared data storage subsystem as to the operating systems utilized by such computing systems. In response to answers received in response to the queries, the data storage subsystem controller creates and stores meta-data which associates each computing system having direct access with whatever operating system is running on each computing system having direct access. In response to a request from a computing system having direct access for access to a data storage area within the shared data storage subsystem, the data storage subsystem controller retrieves the stored meta-data associated with the computing system which is requesting access to a data storage area within the shared data storage subsystem. The data storage subsystem controller utilizes the retrieved meta-data to correctly interpret and respond to the request for access to a data storage area in a manner consonant with the operating system of the computing system which is requesting access to a data storage area within said shared data storage subsystem.
55 citations
•
IBM1
TL;DR: In this article, the authors present a secure architecture in which access to data is limited to only approved or authorized entities, confidential details in received data can be readily identified and concealed; and confidential details that have become non-confidential can be identified and exposed.
Abstract: Various embodiments for maintaining security and confidentiality of data and operations within a fraud detection system. Each of these embodiments utilizes a secure architecture in which: (1) access to data is limited to only approved or authorized entities; (2) confidential details in received data can be readily identified and concealed; and (3) confidential details that have become non-confidential can be identified and exposed.
55 citations
•
17 Nov 2014TL;DR: In this paper, the authors propose a verifiable secret sharing scheme to verify that encrypted data can be reconstituted without the data storage system accessing the encrypted data, and the system synchronously acknowledges that the received encrypted data has been verified and successfully stored.
Abstract: Embodiments are directed to allowing a user to store encrypted, third-party-accessible data in a data store and to providing third party data access to a user's encrypted data according to a predefined policy. A data storage system receives encrypted data from a user at a data storage system. The data is encrypted using the user's private key. The data storage system stores the received encrypted data according to a predefined policy. The encryption prevents the storage system from gaining access to the encrypted data, while the policy allows the encrypted data to be released upon receiving a threshold number of requests from verified third parties. The data storage system implements a verifiable secret sharing scheme to verify that the encrypted data can be reconstituted without the data storage system accessing the encrypted data. The data storage system synchronously acknowledges that the received encrypted data has been verified and successfully stored.
55 citations
••
19 Apr 1999TL;DR: A practically usable method is given, named QEM, which constructs the broadcast schedule by expanding each query's data set in greedy way and a measure, named QueryDistance (QD), which represents the degree of coherence for the data set accessed by a query.
Abstract: In mobile distributed systems the data on air can be accessed by a large number of clients. This paper describes the way clients access the wireless broadcast data with short latency. We define and analyze the problem of wireless data scheduling and we propose a measure, named QueryDistance (QD), which represents the degree of coherence for the data set accessed by a query. We give a practically usable method named QEM which constructs the broadcast schedule by expanding each query's data set in greedy way. We also evaluate the performance of our method by experiments.
55 citations