Topic
Data access
About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.
Papers published on a yearly basis
Papers
More filters
••
23 Jun 2007TL;DR: OBIX, a new standard for representing and accessing building automation data via Web services, is discussed and it is shown how access to a BA system that follows the KNX protocol standard can be faithfully represented by way of oBIX entities.
Abstract: Web services are a key technology for enabling interoperable machine-to-machine interaction over a network. They also lend themselves excellently to the integration of automation and IT systems. This paper discusses oBIX, a new standard for representing and accessing building automation (BA) data via Web services. It is shown how access to a BA system that follows the KNX protocol standard can be faithfully represented by way of oBIX entities. A prototype implementation of such a gateway is presented. The extensible nature of the oBIX data model is leveraged by using it to express the required KNX-oBIX mapping information as well. This approach allows a particularly clear and efficient gateway design.
47 citations
•
05 Nov 2010TL;DR: In this article, a file system driver is provided to each virtual machine to enable read access to the data instance through its mounted file system, and a virtual machine is suspended and a copy of the file instance is saved as part of the stored image of the suspended VM.
Abstract: A data instance to be shared by multiple virtual machines is stored at a hypervisor level. A file system driver is provided to each virtual machine. Each virtual machine mounts a file system backed by the data instance, and thus has read access to the data through its mounted file system. A virtual machine is suspended. A copy of the data instance is saved as part of the stored image of the suspended virtual machine. The suspended virtual machine is subsequently restored from the stored image, and the copy of the data instance is present in the restored virtual machine. The copy of the data instance is detected at a hypervisor level, and the restored virtual machine is provided with read access to the data instance through its mounted filed system.
46 citations
•
19 Sep 2012
TL;DR: In this paper, a module provides an interface between a multi-tenant database and a nontenant-specific application instance such that the application instance sends data access commands to the module as if it is communicating with a single-tenants database.
Abstract: A module provides an interface between a multi-tenant database and a non-tenant-specific application instance such that the application instance sends data access commands to the module as if it is communicating with a single-tenant database. The module translates the non-tenant-specific data access command from the non-tenant-aware application into a multi-tenant data access command, as needed, without needing to alter the non-tenant specific application instance in any way. In this manner, a single-tenant application could be used by multiple tenants in a multi-tenant environment.
46 citations
••
01 Oct 1994TL;DR: This paper proposes a framework for secure access to databases by a wide audience over the Internet, using World Wide Web information servers, a modified version of the NCSA Mosaic Internet browser and role wrappers (software modules that assign roles to incoming database requests, based on the credentials submitted with the request).
Abstract: Security issues are the major roadblock currently preventing greater access to databases over the Internet. In this paper, we propose a framework for secure access to databases by a wide audience over the Internet, using World Wide Web information servers, a modified version of the NCSA Mosaic Internet browser and role wrappers (software modules that assign roles to incoming database requests, based on the credentials submitted with the request). We also describe an application embodying this framework. >
46 citations
•
01 Jun 2018
TL;DR: In this article, a data processing data inventory generation system is configured to: (1) generate a data model (e.g., a data inventory) for one or more data assets utilized by a particular organization; (2) generate respective data inventory for each of the one ormore data assets; and (3) map relationships between aspects of the data inventory, the data assets, etc. within the data model.
Abstract: In particular embodiments, a data processing data inventory generation system is configured to: (1) generate a data model (e.g., a data inventory) for one or more data assets utilized by a particular organization; (2) generate a respective data inventory for each of the one or more data assets; and (3) map one or more relationships between one or more aspects of the data inventory, the one or more data assets, etc. within the data model. In particular embodiments, a data asset (e.g., data system, software application, etc.) may include any entity that collects, processes, contains, and/or transfers personal data (e.g., a software application, database, website, server, etc.). A data asset may include any software or device (e.g., server or servers) utilized by a particular entity for such data collection, processing, transfer, storage, etc. The system may then utilize the generated model to fulfil a data subject access request.
46 citations