Topic
Data access
About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This paper introduces a framework that eases the access of scholars to historical and cultural data about food production and commercial trade system during the Roman Empire, distributed across different data sources using the Ontology-Based Data Access (OBDA) paradigm.
44 citations
••
29 May 2016TL;DR: In this article, a lightweight server that takes SPARQL queries curated in GitHub repositories, and translates them to Linked Data APIs on the fly is presented, which can be used to speed up the implementation of Web APIs around Linked data.
Abstract: Building Web APIs on top of SPARQL endpoints is becoming common practice. It enables universal access to the integration favorable data space of Linked Data. In the majority of use cases, users cannot be expected to learn SPARQL to query this data space. Web APIs are the most common way to enable programmatic access to data on the Web. However, the implementation of Web APIs around Linked Data is often a tedious and repetitive process. Recent work speeds up this Linked Data API construction by wrapping it around SPARQL queries, which carry out the API functionality under the hood. Inspired by this development, in this paper we present grlc, a lightweight server that takes SPARQL queries curated in GitHub repositories, and translates them to Linked Data APIs on the fly.
44 citations
•
01 Jan 2006TL;DR: In this article, the authors explore how to design and build robust, efficient, and scalable data outsourcing mechanisms providing strong security assurances of correctness, confidentiality, and data access privacy, which is particularly relevant for outsourced data frameworks in which clients place sensitive data under the control of a foreign party without assurances of confidentiality.
Abstract: The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the control of a foreign party without assurances of confidentiality. Additionally, once outsourced, privacy and data access correctness (data integrity and query completeness) become paramount. Today's solutions are fundamentally insecure and vulnerable to illicit behavior, because they do not handle these dimensions.
In this tutorial we will explore how to design and build robust, efficient, and scalable data outsourcing mechanisms providing strong security assurances of (1) correctness, (2) confidentiality, and (3) data access privacy.
There exists a strong relationship between such assurances; for example, the lack of access pattern privacy usually allows for statistical attacks compromising data confidentiality. Confidentiality can be achieved by data encryption. However, to be practical, outsourced data services should allow expressive client queries (e.g., relational joins with arbitrary predicates) without compromising confidentiality. This is a hard problem because decryption keys cannot be directly provided to potentially untrusted servers. Moreover, if the remote server cannot be fully trusted, protocol correctness become essential. Therefore, solutions that do not address all three dimensions are incomplete and insecure.
44 citations
•
17 Dec 2007TL;DR: In this paper, a system, method, and computer program product for reducing load imbalance in a storage system having a plurality of storage devices organized in one or more RAIDs for storing data by moving data from heavily loaded storage devices to less-loaded storage devices during normal data access operations.
Abstract: The present invention provides a system, method, and computer program product for reducing load imbalance in a storage system having a plurality of storage devices organized in one or more RAIDs for storing data by moving data from heavily-loaded storage devices to less-loaded storage devices during normal data access operations. As a result of moving data to less-loaded storage devices, the service latency of those storage devices decreases, thereby optimizing the system's performance.
44 citations
•
IBM1
TL;DR: In this article, a method and system for controlling concurrency of access to data in a database system, including partitioning a table in the database system into a plurality of partitions, is presented.
Abstract: A method and system for controlling concurrency of access to data in a database system, includes: partitioning a table in the database system into a plurality of partitions; receiving a request for access to data; determining a partition of the plurality of partitions that contains the data; determining if the data has been committed; and if so, avoiding locking the partition in response to the request. By avoiding locking the partition when the data has been committed, the number of partition locks that need to be requested from a local resource lock manager is reduced, improving performance.
44 citations