scispace - formally typeset
Search or ask a question
Topic

Database-centric architecture

About: Database-centric architecture is a research topic. Over the lifetime, 1799 publications have been published within this topic receiving 48836 citations.


Papers
More filters
Proceedings ArticleDOI
17 May 1993
TL;DR: In this article, the performance characteristics and features of the "standard model" are described to determine if the requirements of "non-standard" architectures can be met, including reflected memory and hierarchical architectures driven by requirements for widely dispersed, large channel count or tightly coupled systems.
Abstract: Control system architecture development has followed the advances in computer technology through mainframes to minicomputers to micros and workstations. This technology advance and increasingly challenging accelerator data acquisition and automation requirements have driven control system architecture development. In summarizing the progress of control system architecture at the last International Conference an Accelerator and Large Experimental Physics Control Systems (ICALEPCS) B. Kuiper (1991) asserted that the system architecture issue was resolved and presented a "standard model". The "standard model" consists of a local area network (Ethernet or FDDI) providing communication between front end microcomputers, connected to the accelerator, and workstations, providing the operator interface and computational support. Although this model represents many present designs, there are exceptions including reflected memory and hierarchical architectures driven by requirements for widely dispersed, large channel count or tightly coupled systems. This paper describes the performance characteristics and features of the "standard model" to determine if the requirements of "non-standard" architectures can be met. Several possible extensions to the "standard model" are suggested including software as well as the hardware architectural features. >

10 citations

01 Jan 2008
TL;DR: This paper shows how the logical architectures can be modeled succinctly as function nets using a SysML-based notation and shows comprehensible views on the complete model to describe automotive features in a self-contained way including their variants, modes, and related scenarios.
Abstract: Modeling the logical architecture is an often underestimated development step to gain an early insight into the fundamental functional properties of an automo- tive system. An architectural description supports developers in making design deci- sions for further development steps like the refinement towards a software architecture or the partition of logical functions on ECUs and buses. However, due to the large size and complexity of the system and hence the logical architecture, a good notation, method, and tooling is necessary. In this paper, we show how the logical architectures can be modeled succinctly as function nets using a SysML-based notation. The use- fulness for developers is increased by comprehensible views on the complete model to describe automotive features in a self-contained way including their variants, modes, and related scenarios.

10 citations

Proceedings ArticleDOI
27 May 2015
TL;DR: D2Worm allows users to graphically model data-centric workflows in a declarative fashion based on the Guard-Stage-Milestone (GSM) meta-model, and automatically compile the modelled workflow into several fine-granular workflow units (WFUs), and deploy these WFUs on distributed infrastructures.
Abstract: Unlike traditional activity-flow-based models, data-centric workflows primarily focus on the data to drive a business. This enables the unification of operational management, concurrent process analytics, compliance with process or associated data constraints, and adaptability to changing environments. In this demonstration, we present D2Worm, a Distributed Data-centric Workflow Management system. D2Worm allows users to (1) graphically model data-centric workflows in a declarative fashion based on the Guard-Stage-Milestone (GSM) meta-model, (2) automatically compile the modelled workflow into several fine-granular workflow units (WFUs), and (3) deploy these WFUs on distributed infrastructures. A WFU is a system component that manages a subset of the workflow's data model and, at the same time, represents part of the global control flow by evaluating conditions over the data. WFUs communicate with each other over a publish/subscribe messaging infrastructure that allows the architecture to scale from a single node to dozens of machines distributed over different data-centers. In addition, D2Worm is able to (4) concurrently execute multiple workflow instances and monitor their behavior in real-time.

10 citations

Book ChapterDOI
03 Nov 2014
TL;DR: This paper addresses the question that whether a given protocol conforms to a privacy architecture and provides the answer based on formal methods and proposes a process algebra variant to define protocols and reason about privacy properties.
Abstract: In systems design, we generally distinguish the architecture and the protocol levels. In the context of privacy by design, in the first case, we talk about privacy architectures, which define the privacy goals and the main features of the system at high level. In the latter case, we consider the underlying concrete protocols and privacy enhancing technologies that implement the architectures. In this paper, we address the question that whether a given protocol conforms to a privacy architecture and provide the answer based on formal methods. We propose a process algebra variant to define protocols and reason about privacy properties, as well as a mapping procedure from protocols to architectures that are defined in a high-level architecture language.

10 citations

Proceedings ArticleDOI
01 Jan 2016
TL;DR: A data-centric architecture providing access control and privacy guaranties for the users of IoT-based applications is derived, and it is validated by showing how it empowers users to control access to their health data in a quantified self use case.
Abstract: Allowing users to control access to their data is paramount for the success of the Internet of Things, therefore, it is imperative to ensure it, even when data has left the users' control, e.g. shared with cloud infrastructure. Consequently, we propose several state of the art mechanisms from the security and privacy research fields to cope with this requirement. To illustrate how each mechanism can be applied, we derive a data-centric architecture providing access control and privacy guaranties for the users of IoT-based applications. Moreover, we discuss the limitations and challenges related to applying the selected mechanisms to ensure access control remotely. Also, we validate our architecture by showing how it empowers users to control access to their health data in a quantified self use case.

10 citations


Network Information
Related Topics (5)
Software development
73.8K papers, 1.4M citations
89% related
Server
79.5K papers, 1.4M citations
85% related
Mobile computing
51.3K papers, 1M citations
83% related
Quality of service
77.1K papers, 996.6K citations
82% related
Wireless sensor network
142K papers, 2.4M citations
81% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20236
202220
20216
20208
201914
201821