Information System Monitoring Access Log Database on Database Server
نویسندگان
چکیده
منابع مشابه
Database Security System for Applying Sophisticated Access Control via Database Firewall Server
Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even ∗ corresponding author Database Security System 1193 though they tried to apply more strict permissions in recent database systems, it was difficult to properly...
متن کاملSD-SQL Server: Scalable Distributed Database System
We present SD-SQL Server, a prototype scalable distributed database system. It let a relational table to grow over new storage nodes invisibly to the application. The evolution uses splits dynamically generating a distributed range partitioning of the table. The splits avoid the reorganization of a growing database, necessary for the current DBMSs and a headache for the administrators. We illus...
متن کاملMeasuring Relational Database Server
This project involves comparing two relational database servers using sections of the AS3AP industry standard benchmark. The two servers tested were Oracle 8.0.3, developed by the Oracle Corporation and MySQL 3.22.14b-gamma, developed by T.c.X DataKonsultAB. The servers were both installed on the same Intel-based hardware platform running the Red Hat Linux 5.2 operating system (kernel 2.0.36). ...
متن کاملDatabase Parameter Server
In this work, we propose Database Parameter Server, a database-centric solution to handle big models. The main idea is to offload the model to secondary storage and leverage database techniques for efficient model training. The model is represented as a table rather than as an array attribute. This distinction in model representation changes fundamentally how in-database analytics is carried ou...
متن کاملAnalysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)
Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis. Methods: The method of this research is log anal...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IOP Conference Series: Materials Science and Engineering
سال: 2018
ISSN: 1757-899X
DOI: 10.1088/1757-899x/407/1/012110