DataX: an Approach to Ubiquitous Database Access

نویسندگان

  • Hui Lei
  • Marion Blount
  • Carl D. Tait
چکیده

This paper describes an approach for enabling remote database access from heterogeneous thin clients. DataX is a proxy-based architecture that supports disconnected operation by replicating a subset of the database on the mobile client, using a weak consistency criterion. It adapts data replication to device characteristics, link attributes and user preferences. It employs a per-device renderer to present data in a form layout, making the application logic separate from user interface logic and independent of the device type. It offers small footprint of client-side software, rapid development of end-to-end solutions, and portability across multiple server platforms.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Method for Protecting Access Pattern in Outsourced Data

Protecting the information access pattern, which means preventing the disclosure of data and structural details of databases, is very important in working with data, especially in the cases of outsourced databases and databases with Internet access. The protection of the information access pattern indicates that mere data confidentiality is not sufficient and the privacy of queries and accesses...

متن کامل

An Authorization Framework for Database Systems

Today, data plays an essential role in all levels of human life, from personal cell phones to medical, educational, military and government agencies. In such circumstances, the rate of cyber-attacks is also increasing. According to official reports, data breaches exposed 4.1 billion records in the first half of 2019. An information system consists of several components, which one of the most im...

متن کامل

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases is necessary. In this paper, we propose an intrusion detection system for detecting attacks...

متن کامل

Chip-Secured Data Access: Confidential Data on Untrusted Servers

The democratization of ubiquitous computing (access data anywhere, anytime, anyhow), the increasing connection of corporate databases to the Internet and the today’s natural resort to Webhosting companies strongly emphasize the need for data confidentiality. Database servers arouse user’s suspicion because no one can fully trust traditional security mechanisms against more and more frequent and...

متن کامل

A Query Interface for Ubiquitous Access to Database Resources

Most information systems depend on a Database Management System (DBMS) to organize information. Access to such an information system is based on use of a database query language on the part of the user. This poses user skills (or skill levels), as problem. For example, for medical staff at a hospital, users can not spare time to learn a database query language. As a result medical staff tend to...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1999