Replicating Virtualized Database Servers

2014 ◽  
pp. 81-95
Author(s):  
Liang Zhao ◽  
Sherif Sakr ◽  
Anna Liu ◽  
Athman Bouguettaya
Keyword(s):  
1997 ◽  
Vol 25 (1) ◽  
pp. 222-225 ◽  
Author(s):  
J. G. Henikoff ◽  
S. Pietrokovski ◽  
S. Henikoff
Keyword(s):  

2021 ◽  
pp. 93-101
Author(s):  
D.S. Kucherenko ◽  

The article discusses the problems of managing the information security of the enterprise in a changing business climate. The description, shortcomings and advantages of the existing asS TP security system are given. The specifics of the company's procedural and technological security capabilities have been revealed. The enterprise's IT infrastructure has been identified in the information security and cyber defense format, consisting of three components: the servers of applications that deliver business applications; database servers that contain business data and system administration channels to manage and monitor infrastructure that need to work together as a coherent and coordinated system. Structured architecture, uniting corporate cybersecurity in 11 functional areas covering the technical and operational breadth of enterprise cybersecurity. These functional areas are highlighted on the basis of their relative independence from each other and because they are well consistent with the way staff, experience and responsibilities are shared in the enterprise. This corporate cybersecurity architecture format provides the basis for managing the capabilities that the enterprise provides the tools of audit, forensics, detection, and preventive control. This structure provides consistent management of security capabilities and helps prioritize their deployment, maintenance, and updates over time. It also ensures strict accountability and good alignment of strategy, staff, budget and technology to meet the organization's security needs. The structure is designed to be flexible and scalable regardless of the size of the enterprise. It provides an expandable mechanism for adjusting cyber defense over time in response to changing cyber threats.


2015 ◽  
Vol 764-765 ◽  
pp. 1351-1355
Author(s):  
Jin Long Wang ◽  
Shu Ju Chueh ◽  
Wen Chu Kuo ◽  
Yi Ying Lin

Moodle is one of the most popular Learning Management System (LMS) in the world. However, this kind of system always suffer the burden of large amount of user connections in a short period of time, such that the front end web servers and the rear end database servers became the bottleneck of the whole system. In the LMS system, the most challenges are to provide the rapid response, the system stability, the system flexibility, the system scalability, and the fault tolerance. Currently, the problems of system overloading are solved by the load balancing scheme, which still have a lot of limitations. In this paper, the proposed scheme, based on the load balancing scheme, combines the mercy of Moodle network scheme and the separate of database in order to improve the performance both on the level of systems and applications for the situation of large amount users. From the performance evaluation, the proposed scheme is superior to the existing system model.


2020 ◽  
Vol 9 (4) ◽  
pp. 260 ◽  
Author(s):  
Tomás Fernández ◽  
José Luis Pérez-García ◽  
José Miguel Gómez-López ◽  
Javier Cardenal ◽  
Julio Calero ◽  
...  

Gully erosion is one of the main processes of soil degradation, representing 50%–90% of total erosion at basin scales. Thus, its precise characterization has received growing attention in recent years. Geomatics techniques, mainly photogrammetry and LiDAR, can support the quantitative analysis of gully development. This paper deals with the application of these techniques using aerial photographs and airborne LiDAR data available from public database servers to identify and quantify gully erosion through a long period (1980–2016) in an area of 7.5 km2 in olive groves. Several historical flights (1980, 1996, 2001, 2005, 2009, 2011, 2013 and 2016) were aligned in a common coordinate reference system with the LiDAR point cloud, and then, digital surface models (DSMs) and orthophotographs were obtained. Next, the analysis of the DSM of differences (DoDs) allowed the identification of gullies, the calculation of the affected areas as well as the estimation of height differences and volumes between models. These analyses result in an average depletion of 0.50 m and volume loss of 85000 m3 in the gully area, with some periods (2009–2011 and 2011–2013) showing rates of 10,000–20,000 m3/year (20–40 t/ha*year). The manual edition of DSMs in order to obtain digital elevation models (DTMs) in a detailed sector has facilitated an analysis of the influence of this operation on the erosion calculations, finding that it is not significant except in gully areas with a very steep shape.


2015 ◽  
Vol 25 (09n10) ◽  
pp. 1703-1708 ◽  
Author(s):  
Óscar Mortágua Pereira ◽  
Diogo Domingues Regateiro ◽  
Rui L. Aguiar

In database applications, access control security layers are mostly developed from tools provided by vendors of database management systems and deployed in the same servers containing the data to be protected. This solution conveys several drawbacks. Among them we emphasize: (1) if policies are complex, their enforcement can lead to performance decay of database servers; (2) when modifications in the established policies implies modifications in the business logic (usually deployed at the client-side), there is no other possibility than modify the business logic in advance and, finally, 3) malicious users can issue CRUD expressions systematically against the DBMS expecting to identify any security gap. In order to overcome these drawbacks, in this paper we propose an access control stack characterized by: most of the mechanisms are deployed at the client-side; whenever security policies evolve, the security mechanisms are automatically updated at runtime and, finally, client-side applications do not handle CRUD expressions directly. We also present an implementation of the proposed stack to prove its feasibility. This paper presents a new approach to enforce access control in database applications, this way expecting to contribute positively to the state of the art in the field.


Sign in / Sign up

Export Citation Format

Share Document