scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper introduces a framework that eases the access of scholars to historical and cultural data about food production and commercial trade system during the Roman Empire, distributed across different data sources using the Ontology-Based Data Access (OBDA) paradigm.

44 citations

Book ChapterDOI
29 May 2016
TL;DR: In this article, a lightweight server that takes SPARQL queries curated in GitHub repositories, and translates them to Linked Data APIs on the fly is presented, which can be used to speed up the implementation of Web APIs around Linked data.
Abstract: Building Web APIs on top of SPARQL endpoints is becoming common practice. It enables universal access to the integration favorable data space of Linked Data. In the majority of use cases, users cannot be expected to learn SPARQL to query this data space. Web APIs are the most common way to enable programmatic access to data on the Web. However, the implementation of Web APIs around Linked Data is often a tedious and repetitive process. Recent work speeds up this Linked Data API construction by wrapping it around SPARQL queries, which carry out the API functionality under the hood. Inspired by this development, in this paper we present grlc, a lightweight server that takes SPARQL queries curated in GitHub repositories, and translates them to Linked Data APIs on the fly.

44 citations

Proceedings Article
Radu Sion1
01 Jan 2006
TL;DR: In this article, the authors explore how to design and build robust, efficient, and scalable data outsourcing mechanisms providing strong security assurances of correctness, confidentiality, and data access privacy, which is particularly relevant for outsourced data frameworks in which clients place sensitive data under the control of a foreign party without assurances of confidentiality.
Abstract: The networked and increasingly ubiquitous nature of today's data management services mandates assurances to detect and deter malicious or faulty behavior. This is particularly relevant for outsourced data frameworks in which clients place data management with specialized service providers. Clients are reluctant to place sensitive data under the control of a foreign party without assurances of confidentiality. Additionally, once outsourced, privacy and data access correctness (data integrity and query completeness) become paramount. Today's solutions are fundamentally insecure and vulnerable to illicit behavior, because they do not handle these dimensions. In this tutorial we will explore how to design and build robust, efficient, and scalable data outsourcing mechanisms providing strong security assurances of (1) correctness, (2) confidentiality, and (3) data access privacy. There exists a strong relationship between such assurances; for example, the lack of access pattern privacy usually allows for statistical attacks compromising data confidentiality. Confidentiality can be achieved by data encryption. However, to be practical, outsourced data services should allow expressive client queries (e.g., relational joins with arbitrary predicates) without compromising confidentiality. This is a hard problem because decryption keys cannot be directly provided to potentially untrusted servers. Moreover, if the remote server cannot be fully trusted, protocol correctness become essential. Therefore, solutions that do not address all three dimensions are incomplete and insecure.

44 citations

Patent
Robert M. English1
17 Dec 2007
TL;DR: In this paper, a system, method, and computer program product for reducing load imbalance in a storage system having a plurality of storage devices organized in one or more RAIDs for storing data by moving data from heavily loaded storage devices to less-loaded storage devices during normal data access operations.
Abstract: The present invention provides a system, method, and computer program product for reducing load imbalance in a storage system having a plurality of storage devices organized in one or more RAIDs for storing data by moving data from heavily-loaded storage devices to less-loaded storage devices during normal data access operations. As a result of moving data to less-loaded storage devices, the service latency of those storage devices decreases, thereby optimizing the system's performance.

44 citations

Patent
02 Apr 2004
TL;DR: In this article, a method and system for controlling concurrency of access to data in a database system, including partitioning a table in the database system into a plurality of partitions, is presented.
Abstract: A method and system for controlling concurrency of access to data in a database system, includes: partitioning a table in the database system into a plurality of partitions; receiving a request for access to data; determining a partition of the plurality of partitions that contains the data; determining if the data has been committed; and if so, avoiding locking the partition in response to the request. By avoiding locking the partition when the data has been committed, the number of partition locks that need to be requested from a local resource lock manager is reduced, improving performance.

44 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816