1,067,567 Hits in 12.0 sec

Federated databases and systems: Part I?A tutorial on their data sharing

David K. Hsiao
1992 The VLDB journal  
The issues and solutions for the interoperability of a class of heterogeneous databases and their database systems are expounded in two parts.  ...  Part I presents the data-sharing issues in federated databases and systems. Part II, which will appear in a future issue, explores resource-consolidation issues.  ...  The author would like to thank the referees for their recommended changes.  ... 
doi:10.1007/bf01228709 fatcat:v6vc7oifhbd2dk3b7py2l4dn5y

Supporting accessible hypermedia in web-based educational systems: defining an accessibility application profile for learning resources

P. Karampiperis, D. Sampson *
2004 New Review of Hypermedia and Multimedia  
To this end, in this paper we propose a methodology for defining an accessibility application profile that captures the accessibility properties of learning objects in a standard form and we examine its  ...  The design and development of web-based educational systems for people with special abilities has recently attracted the attention of the research community.  ...  IST-507922 and the CEN/ISSS Learning Technologies Workshop, Project Team "Accessibility properties for Learning Resources", contract CEN/EXPERT/2004/09.  ... 
doi:10.1080/13614560512331326008 fatcat:ivqhd5xxprgdrgpi5jpkwawwym

A Framework for Generating Query Language Code from OCL Invariants

Florian Heidenreich, Christian Wende, Birgit Demuth
2007 Electronic Communications of the EASST  
This framework allows for mapping UML models to arbitrary data schemas and for mapping OCL invariants to sentences in corresponding declarative query languages, enforcing semantical data integrity on implementation  ...  Since model transformations enable an automatic mapping of platform independent models (PIMs) to platform specific models (PSMs) and code, it is reasonable to utilise them to derive data schemas and integrity  ...  We focus on query languages, because data in business systems is mostly managed by systems that are accessible through query languages (e.g. database systems).  ... 
doi:10.14279/tuj.eceasst.9.108 dblp:journals/eceasst/HeidenreichWD08 fatcat:p3dxa5kwkncdxk3lpc2y7pt6oq

The WS-DAI family of specifications for web service data access and integration

Mario Antonioletti, Amy Krause, Norman W. Paton, Andrew Eisenberg, Simon Laws, Susan Malaika, Jim Melton, Dave Pearson
2006 SIGMOD record  
For direct data access, the WS-DAI specification defines a single query-language-independent message, and a template for realizations to follow in defining language-dependent operations.  ...  For example, an external data management system could be a centralized database or a federation, and a federation could be constructed using WS-DAI services to access the federated resources.  ... 
doi:10.1145/1121995.1122006 fatcat:bcetm4odlraxpfdg4w47f4da74

Data Base Technology

W. C. McGee
1981 IBM Journal of Research and Development  
This paper surveys the development of data base technology over the past twenty-five years and identifies the major IBM contributions to this development.  ...  The evolution of data base technology over the past twenty-five years is surveyed, and major IBM contributions to this technology are identified and briefly described.  ...  King for his help with early versions of this paper and for information on System R.  ... 
doi:10.1147/rd.255.0505 fatcat:2ttderdtjnguni5z4hcfypqiye

Access control for web data: models and policy languages

Barbara Carminatp, Elena Ferrari, Bhavani Thuraisingham
2006 Annales des télécommunications  
The key issue is how to trade-off between maximizing the sharing of information and enforcing a controlled access to web data.  ...  Finally, we discuss policy languages for the semantic web, and outline which are the main research directions in this field.  ...  The most important proposals of access control models and policy languages for web data have also been presented.  ... 
doi:10.1007/bf03219908 fatcat:icrox6x3dfaujgp2yxh35ftf44

Implementing database access control policy from unconstrained natural language text

John Slankas
2013 2013 35th International Conference on Software Engineering (ICSE)  
within a system's relational database.  ...  We propose a tool-based process to 1) parse existing, unaltered natural language documents; 2) classify whether or not a statement implies access control and whether or not the statement implies database  ...  Army Research Office (ARO) under grant W911NF-08-1-0105 managed by NCSU Secure Open Systems Initiative (SOSI).  ... 
doi:10.1109/icse.2013.6606716 dblp:conf/icse/Slankas04 fatcat:hswv6nwwvfhmhjs3h5a6swzr3y

Access control technologies for Big Data management systems: literature review and future trends

Pietro Colombo, Elena Ferrari
2019 Cybersecurity  
Data security and privacy issues are magnified by the volume, the variety, and the velocity of Big Data and by the lack, up to now, of a reference data model and related data manipulation languages.  ...  that any access control solution for Big Data platforms may fulfill.  ...  Issues related to domain specific Big Data systems Let us now consider open challenges related to access control enforcement within domain specific Big Data systems.  ... 
doi:10.1186/s42400-018-0020-9 fatcat:2wyaml2ffnfpjhof6faknr3wle

Language Access to Distributed Data with Error Recovery

Earl D. Sacerdoti
1977 International Joint Conference on Artificial Intelligence  
This paper discusses an effort in the application of artificial intelligence to the access of data from a large, distributed data base over a computer network.  ...  A running system is described that provides real-time access over the ARPANET to a data base distributed over several machines.  ...  Our initial efforts in this area have concentrated on access planning for collections of data bases supporting a relational model of the data [9] .  ... 
dblp:conf/ijcai/Sacerdoti77 fatcat:6zsyvxguyzdunbmrtflqpbuhb4

A Review of Object Oriented Database Concepts and their Implementation

Narciso Cerpa, Roy Dean
1993 Australasian Journal of Information Systems  
And their suitability for specific applications is assessed. Finally we offer some conclusions about research in this area and the directions in which further development should proceed.  ...  This article outlines and discusses the semantic data principles used inter alia in understanding Object Oriented concepts.  ...  Orion Orion is a prototype Object-Oriented data base system, used for supporting the data management needs of Proteus (an expert system).  ... 
doi:10.3127/ajis.v1i1.428 fatcat:5g63cm2k4zewbpoakrvgswxsb4

Report on the workshop on wrapper techniques for legacy data systems

Ph. Thiran, T. Risch, C. Costilla, J. Henrard, Th. Kabisch, J. Petrini, W-J. van den Heuvel, J-L. Hainaut
2005 SIGMOD record  
For example, XML or HTML documents on the web, or legacy systems, are not accessed through a query language but rather through a data access interface.  ...  In their paper, Vila and Costilla [3] present a mediator-wrapper architecture based on an extractor data model placed between each Web data source and its wrapper linked to a specific ontology.  ... 
doi:10.1145/1084805.1084824 fatcat:7el6uzb3r5hulj67qt3kpxltzu

UNIBASE - An Integrated Access to Databases

Z. Brzezinski, Janusz R. Getta, J. Rybnik, W. Stepniewski
1984 Very Large Data Bases Conference  
By an integrated database we mean a data storing system residing on identical hardware under an identical Data Base Management System /software/ or in a different manner: a single schema /i.e., database  ...  The following parts of an integrated database system are described: (2) a generalized schema of an integrated database schema and a formula language used for the definition of query, assertion, constraint  ...  Moreover, the UNIBASE as a Distributed Data Base Management System in local computer networksand its application areas will be presented elsewhere. ACKNOWLEDGEMENTS. The author wish to thank K .  ... 
dblp:conf/vldb/BrzezinskiGRS84 fatcat:3wzaxdtalnednldjrczfl4hwty

Multimodal application for foreign language teaching

Teresa Magal-Royo, Jose Luis Gimenez-Lopez, Blas Pairy, Jesus Garcia-Laborda, Jimena Gonzalez-del Rio
2011 2011 14th International Conference on Interactive Collaborative Learning  
The current development of educational applications for language learning has experienced a qualitative change in the criteria of interaction between users and devices due to the technological advances  ...  This paper shows the possibility of establishing multimodal architectures within the applications for specific language learning areas with ubiquitous devices, evidencing the technical and formal aspects  ...  with the user based on their preferences when carrying out specific tasks or using specific data input devices.  ... 
doi:10.1109/icl.2011.6059564 fatcat:nikrqtmtf5b5tcpwoqjt763ohu

XML and relational database management systems

Michael Rys, Don Chamberlin, Daniela Florescu
2005 Proceedings of the 2005 ACM SIGMOD international conference on Management of data - SIGMOD '05  
As XML has evolved from a document markup language to a widely-used format for exchange of structured and semistructured data, managing large amounts of XML data has become increasingly important.  ...  This tutorial will provide an insight into how XML functionality fits into relational database management systems as seen by three major relational vendors: IBM, Microsoft and Oracle.  ...  Other W3C Recommendations include XML Schema, a type system for XML [7] ; XPath, a language for navigating within XML documents [8, 9] ; and XSLT, an XML transformation language [10, 11] .  ... 
doi:10.1145/1066157.1066298 dblp:conf/sigmod/RysCF05 fatcat:ji6tfnwr4rb2lnszwrmcefpyza

A Formal Implementation Of Database Security

Yun Bai
2008 Zenodo  
In this paper, both issues of specification and implementation in database security environment will be considered; and the database security is achieved through the development of an efficient implementation  ...  This paper is to investigate the impplementation of security mechanism in object oriented database system.  ...  In our specification, a data object can act as either a subject or an object in terms of access control.  ... 
doi:10.5281/zenodo.1333147 fatcat:jerrqegdyfgmbdersoa2t5libi
« Previous Showing results 1 — 15 out of 1,067,567 results