Distributed database access in a corporate environment using Java

NN Duan - Computer Networks and ISDN Systems, 1996 - Elsevier
… In this paper, a methodology of developing distributed database … tional CGI-based approach
for database access is given first, in … database environment is illustrated, followed by the …

Dynamic distributed database over cloud environment

AEA Raouf, NL Badr, MF Tolba - … AMLTA 2014, Cairo, Egypt, November 28 …, 2014 - Springer
… distributed environment that uses central remote servers and internet to maintain data and …
In this paper, we present a dynamic distributed database system over cloud environment. The …

NetCDF: an interface for scientific data access

R Rew, G Davis - IEEE computer graphics and applications, 1990 - ieeexplore.ieee.org
… objects that contain dissimilar kinds of data in a heterogeneous network environment and
for writing application software that does not depend on application-specific formats. …

A model for secure multimedia document database system in a distributed environment

JBD Joshi, ZK Li, H Fahmi, B Shafiq… - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
access control (RBAC) approaches [22], [25], [37]. In this paper, we propose a unified
multimedia document model to allow secure access to a multimedia document database. The …

Access control and session management in the HTTP environment

K Gutzmann - IEEE Internet Computing, 2001 - ieeexplore.ieee.org
… use the Internet’s public data network infrastructure. These risks extend behind firewalls to …
access unprotected services by simply plugging a portable computer into an unused network

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
… There are many security issues that compromise data in the process of data access and
storage in the cloud environment, especially in the case of data storage with the help of third …

Security considerations in a network management environment

D O'Mahony - IEEE Network, 1994 - ieeexplore.ieee.org
… lies with a network element or … access a portion of its MIB. For example, the customer may
wish to allow the administration to carry out tests involving equipment at the network access

Blockchain-based database in an IoT environment: challenges, opportunities, and analysis

L Tseng, X Yao, S Otoum, M Aloqaily, Y Jararweh - Cluster Computing, 2020 - Springer
… a distributed replicated database, which stores data that can be … replicated database in an
Internet-of-Things (IoT) environment, … of IoT environments, we study the impact of network and …

[PDF][PDF] Mining in a data-flow environment: Experience in network intrusion detection

W Lee, SJ Stolfo, KW Mok - … on Knowledge discovery and data mining, 1999 - dl.acm.org
… KDD process in “data-flow” environments, where unstructured and time dependent data can
be … Using network intrusion detection as a concrete application example, we describe how to …

Data access control in the cloud computing environment for bioinformatics

S Namasudra - Research Anthology on Bioinformatics, Genomics …, 2024 - igi-global.com
… In a cloud environment, when the CSP receives a data access request from a user, it must
provide public key of the DO to the user to get the secret key and other necessary credentials. …