scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Journal ArticleDOI
15 Jun 1986
TL;DR: In this article, the authors identify data modelling and data access and sharing requirements which multimedia applications impose on a database system and show the capabilities of an object-based data model and indicate extensions which are needed to meet the data modelling aspects of these requirements.
Abstract: This paper identifies data modelling and data access and sharing requirements which multimedia applications impose on a database system. It shows the capabilities of an object-based data model and indicates extensions which are needed to meet the data modelling aspects of these requirements. A logical implementation of the operations on the model is described. The model generalizes the notions of instantiation and generalization in the standard object-oriented paradigm, and augments it with the notions of aggregation and relationships which are specialized for a multimedia application environment. Objects may exist in aggregation hierarchies which provide the capability to integrate diverse types of multimedia information such as text, sound, bit-mapped images, and complex graphics drawings. Objects may also be linked through other user-defined relationships to capture such application functions as voice annotation and referencing of one document by another. Using this model, the semantics of aggregation and relationships in a multimedia application environment can be understood and efficiently supported by a database system.

197 citations

Patent
08 Dec 2006
TL;DR: In this article, a storage system is provided that includes a plurality of storage devices and a data structure, accessible to the storage system, that includes the configuration data that identifies each of the storage devices to which data access by a respective one of the plurality of network devices is authorized.
Abstract: A storage system is provided that includes a plurality of storage devices and a data structure, accessible to the storage system, that includes a plurality of records corresponding to a plurality of network devices that are coupled to the storage system. Each record includes configuration data that identifies each of the plurality of storage devices to which data access by a respective one of the plurality of network devices is authorized. Each record may further include visibility data that identifies whether certain types of non-data access, such as requests for general information relating to a respective storage device, by a respective one of the plurality of network devices is permitted, even though data access to the respective storage device by the respective one of the plurality of network devices is not authorized.

197 citations

Patent
24 Apr 2008
TL;DR: In this paper, the authors present methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modern distributed computing environment.
Abstract: The present invention provides methods, systems, computer program products, and methods of doing business whereby legacy host application/system access is integrated with single sign-on in a modern distributed computing environment. A security token used for signing on to the modern computing environment is leveraged, and is mapped to user credentials for the legacy host environment. These user credentials are programmatically inserted into a legacy host data stream, thereby giving the end user the look and feel of seamless access to all applications/systems, including not only modern computing applications/systems but also those residing on (or accessible through) legacy hosts. In addition to providing users with the advantages of single sign-on, the disclosed techniques enable limiting the number of user identifiers and passwords an enterprise has to manage.

195 citations

Journal ArticleDOI
TL;DR: This paper presents a framework for managing data quality in such environments using the information product approach and posits the notion of a virtual business environment to support dynamic decision-making and describes the role of the data quality framework.
Abstract: Large data volumes, widely distributed data sources, and multiple stakeholders characterize typical e-business settings. Mobile and wireless technologies have further increased data volumes, further distributed the data sources, while permitting access to data anywhere, anytime. Such environments empower and necessitate decision-makers to act/react quicker to all decision-tasks including mission-critical ones. Decision-support in such environments demands efficient data quality management. This paper presents a framework for managing data quality in such environments using the information product approach. It includes a modeling technique to explicitly represent the manufacture of an information product, quality dimensions and methods to compute data quality of the product at any stage in the manufacture, and a set of capabilities to comprehensively manage data quality and implement total data quality management. The paper also posits the notion of a virtual business environment to support dynamic decision-making and describes the role of the data quality framework in this environment.

195 citations

Patent
06 Dec 1999
TL;DR: In this article, a storage network that facilitates the transfer of a data set from a first storage device to a second storage device, without blocking access to the data set during the transfer is provided.
Abstract: A storage network that facilitates the transfer of a data set from a first storage device to a second storage device, without blocking access to the data set during the transfer is provided. An intermediate device for the storage network is provided. The intermediate device comprises a plurality of communication interfaces. Data transfer resources are coupled to the plurality of interfaces, and are used for transferring data access requests identifying the data set from a third interface at least one of a first and second interfaces. A logic engine within the intermediate device is coupled to the interfaces, and is responsive to a control signal to manage the transfer of the data set through the interfaces.

194 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816