Information System Monitoring Access Log Database on Database Server

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Database Security System for Applying Sophisticated Access Control via Database Firewall Server

Recently, information leakage incidents have occurred due to database security vulnerabilities. The administrators in the traditional database access control methods grant simple permissions to users for accessing database objects. Even ∗ corresponding author Database Security System 1193 though they tried to apply more strict permissions in recent database systems, it was difficult to properly...

متن کامل

SD-SQL Server: Scalable Distributed Database System

We present SD-SQL Server, a prototype scalable distributed database system. It let a relational table to grow over new storage nodes invisibly to the application. The evolution uses splits dynamically generating a distributed range partitioning of the table. The splits avoid the reorganization of a growing database, necessary for the current DBMSs and a headache for the administrators. We illus...

متن کامل

Measuring Relational Database Server

This project involves comparing two relational database servers using sections of the AS3AP industry standard benchmark. The two servers tested were Oracle 8.0.3, developed by the Oracle Corporation and MySQL 3.22.14b-gamma, developed by T.c.X DataKonsultAB. The servers were both installed on the same Intel-based hardware platform running the Red Hat Linux 5.2 operating system (kernel 2.0.36). ...

متن کامل

Database Parameter Server

In this work, we propose Database Parameter Server, a database-centric solution to handle big models. The main idea is to offload the model to secondary storage and leverage database techniques for efficient model training. The model is represented as a table rather than as an array attribute. This distinction in model representation changes fundamentally how in-database analytics is carried ou...

متن کامل

Analysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)

Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis.    Methods: The method of this research is log anal...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IOP Conference Series: Materials Science and Engineering

سال: 2018

ISSN: 1757-899X

DOI: 10.1088/1757-899x/407/1/012110