scispace - formally typeset
Search or ask a question
Topic

Data access

About: Data access is a research topic. Over the lifetime, 13141 publications have been published within this topic receiving 172859 citations. The topic is also known as: Data access.


Papers
More filters
Journal ArticleDOI
TL;DR: ImgLib2 is an open-source Java library for n-dimensional data representation and manipulation with focus on image processing that aims at minimizing code duplication by cleanly separating pixel-algebra, data access and data representation in memory.
Abstract: Summary: ImgLib2 is an open-source Java library for n-dimensional data representation and manipulation with focus on image processing. It aims at minimizing code duplication by cleanly separating pixel-algebra, data access and data representation in memory. Algorithms can be implemented for classes of pixel types and generic access patterns by which they become independent of the specific dimensionality, pixel type and data representation. ImgLib2 illustrates that an elegant high-level programming interface can be achieved without sacrificing performance. It provides efficient implementations of common data types, storage layouts and algorithms. It is the data model underlying ImageJ2, the KNIME Image Processing toolbox and an increasing number of Fiji-Plugins. Availability: ImgLib2 is licensed under BSD. Documentation and source code are available at http://imglib2.net and in a public repository at https://github.com/imagej/imglib. Supplementary Information: Supplementary data are available at Bioinformatics Online. Contact: ed.gbc-ipm@dleflaas

133 citations

Patent
Kazutoshi Shimada1
27 Dec 1996
TL;DR: In this article, an attribute-data extraction unit extracts location data and a password from attribute data which is added in advance to subject data to be accessed, at the time of requesting for an access to the data, the extracted password is compared with a password which is inputted from an input unit, and the extracted location data are compared with current location data detected by a location data detection unit.
Abstract: Upon data access, an attribute-data extraction unit extracts location data and a password from attribute data which is added in advance to subject data to be accessed. At the time of requesting for an access to the data, the extracted password is compared with a password which is inputted from an input unit, and the extracted location data is compared with current location data detected by a location-data detection unit. An access permission unit permits access to the data in accordance with the comparison results obtained by the password comparison unit and the location-data comparison unit. By virtue of the process, it is possible to more strictly protect confidential information in a data processing apparatus.

133 citations

Journal ArticleDOI
TL;DR: A job scheduling policy called HCS (Hierarchical Cluster Scheduling), and a dynamic data replication strategy, called HRS (Hiersarchical Replication Strategy), to improve the data access efficiencies in a cluster grid are developed and implemented.

132 citations

Patent
Eung-Moon Yeon1, Young-Ho Lim1
08 Oct 1993
TL;DR: In this paper, a semiconductor memory device includes two latch circuits, each for holding data corresponding to a single normal address, one for storing new data while the other latch circuit outputs its data to the page decoder for subsequent output.
Abstract: A semiconductor memory device includes two latch circuits, each for holding data corresponding to a single normal address. When sequentially used, one after the other, one latch circuit can be storing new data while the other latch circuit outputs its data to the page decoder for subsequent output. Thus, data access delay times for page mode operation are further reduced because the delay which typically results from addressing a normal address is eliminated.

131 citations

Proceedings ArticleDOI
08 May 2013
TL;DR: An access control framework for cloud storage systems that achieves fine-grained access control based on an adapted Ciphertext-Policy Attribute-based Encryption (CP-ABE) approach is designed and an efficient attribute revocation method is proposed to cope with the dynamic changes of users' access privileges in large-scale systems.
Abstract: A cloud storage service allows data owner to outsource their data to the cloud and through which provide the data access to the users. Because the cloud server and the data owner are not in the same trust domain, the semi-trusted cloud server cannot be relied to enforce the access policy. To address this challenge, traditional methods usually require the data owner to encrypt the data and deliver decryption keys to authorized users. These methods, however, normally involve complicated key management and high overhead on data owner. In this paper, we design an access control framework for cloud storage systems that achieves fine-grained access control based on an adapted Ciphertext-Policy Attribute-based Encryption (CP-ABE) approach. In the proposed scheme, an efficient attribute revocation method is proposed to cope with the dynamic changes of users' access privileges in large-scale systems. The analysis shows that the proposed access control scheme is provably secure in the random oracle model and efficient to be applied into practice.

131 citations


Network Information
Related Topics (5)
Software
130.5K papers, 2M citations
86% related
Cloud computing
156.4K papers, 1.9M citations
86% related
Cluster analysis
146.5K papers, 2.9M citations
85% related
The Internet
213.2K papers, 3.8M citations
85% related
Information system
107.5K papers, 1.8M citations
83% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202351
2022125
2021403
2020721
2019906
2018816