scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Proceedings ArticleDOI
23 Jun 2007
TL;DR: OBIX, a new standard for representing and accessing building automation data via Web services, is discussed and it is shown how access to a BA system that follows the KNX protocol standard can be faithfully represented by way of oBIX entities.
Abstract: Web services are a key technology for enabling interoperable machine-to-machine interaction over a network. They also lend themselves excellently to the integration of automation and IT systems. This paper discusses oBIX, a new standard for representing and accessing building automation (BA) data via Web services. It is shown how access to a BA system that follows the KNX protocol standard can be faithfully represented by way of oBIX entities. A prototype implementation of such a gateway is presented. The extensible nature of the oBIX data model is leveraged by using it to express the required KNX-oBIX mapping information as well. This approach allows a particularly clear and efficient gateway design.

47 citations

Patent
05 Nov 2010
TL;DR: In this article, a file system driver is provided to each virtual machine to enable read access to the data instance through its mounted file system, and a virtual machine is suspended and a copy of the file instance is saved as part of the stored image of the suspended VM.
Abstract: A data instance to be shared by multiple virtual machines is stored at a hypervisor level. A file system driver is provided to each virtual machine. Each virtual machine mounts a file system backed by the data instance, and thus has read access to the data through its mounted file system. A virtual machine is suspended. A copy of the data instance is saved as part of the stored image of the suspended virtual machine. The suspended virtual machine is subsequently restored from the stored image, and the copy of the data instance is present in the restored virtual machine. The copy of the data instance is detected at a hypervisor level, and the restored virtual machine is provided with read access to the data instance through its mounted filed system.

46 citations

Patent
19 Sep 2012
TL;DR: In this paper, a module provides an interface between a multi-tenant database and a nontenant-specific application instance such that the application instance sends data access commands to the module as if it is communicating with a single-tenants database.
Abstract: A module provides an interface between a multi-tenant database and a non-tenant-specific application instance such that the application instance sends data access commands to the module as if it is communicating with a single-tenant database. The module translates the non-tenant-specific data access command from the non-tenant-aware application into a multi-tenant data access command, as needed, without needing to alter the non-tenant specific application instance in any way. In this manner, a single-tenant application could be used by multiple tenants in a multi-tenant environment.

46 citations

Proceedings ArticleDOI
01 Oct 1994
TL;DR: This paper proposes a framework for secure access to databases by a wide audience over the Internet, using World Wide Web information servers, a modified version of the NCSA Mosaic Internet browser and role wrappers (software modules that assign roles to incoming database requests, based on the credentials submitted with the request).
Abstract: Security issues are the major roadblock currently preventing greater access to databases over the Internet. In this paper, we propose a framework for secure access to databases by a wide audience over the Internet, using World Wide Web information servers, a modified version of the NCSA Mosaic Internet browser and role wrappers (software modules that assign roles to incoming database requests, based on the credentials submitted with the request). We also describe an application embodying this framework. >

46 citations

Patent
01 Jun 2018
TL;DR: In this article, a data processing data inventory generation system is configured to: (1) generate a data model (e.g., a data inventory) for one or more data assets utilized by a particular organization; (2) generate respective data inventory for each of the one ormore data assets; and (3) map relationships between aspects of the data inventory, the data assets, etc. within the data model.
Abstract: In particular embodiments, a data processing data inventory generation system is configured to: (1) generate a data model (e.g., a data inventory) for one or more data assets utilized by a particular organization; (2) generate a respective data inventory for each of the one or more data assets; and (3) map one or more relationships between one or more aspects of the data inventory, the one or more data assets, etc. within the data model. In particular embodiments, a data asset (e.g., data system, software application, etc.) may include any entity that collects, processes, contains, and/or transfers personal data (e.g., a software application, database, website, server, etc.). A data asset may include any software or device (e.g., server or servers) utilized by a particular entity for such data collection, processing, transfer, storage, etc. The system may then utilize the generated model to fulfil a data subject access request.

46 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816