Data sharing on the Web

Author(s):  
B. Benatallah ◽  
A. Bouguettaya
Keyword(s):  
Author(s):  
Julián Andrés Rojas ◽  
Dylan Van Assche ◽  
Harm Delva ◽  
Pieter Colpaert ◽  
Ruben Verborgh

2016 ◽  
Vol 59 ◽  
Author(s):  
Marco Massa ◽  
Ezio D'Alema ◽  
Chiara Mascandola ◽  
Sara Lovati ◽  
Davide Scafidi ◽  
...  

<p><em>ISMD is the real time INGV Strong Motion database. During the recent August-September 2016 Amatrice, Mw 6.0, seismic sequence, ISMD represented the main tool for the INGV real time strong motion data sharing.  Starting from August 24<sup>th</sup>,  the main task of the web portal was to archive, process and distribute the strong-motion waveforms recorded  by the permanent and temporary INGV accelerometric stations, in the case of earthquakes with magnitude </em><em>≥</em><em> 3.0, occurring  in the Amatrice area and surroundings.  At present (i.e. September 30<sup>th</sup>, 2016), ISMD provides more than 21.000 strong motion waveforms freely available to all users. In particular, about 2.200 strong motion waveforms were recorded by the temporary network installed for emergency in the epicentral area by SISMIKO and EMERSITO working groups. Moreover, for each permanent and temporary recording site, the web portal provide a complete description of the necessary information to properly use the strong motion data.</em></p>


2018 ◽  
Vol 186 ◽  
pp. 07002
Author(s):  
Mauro Gargano ◽  
Antonella Gasperini ◽  
Luisa Schiavone ◽  
Francesca Brunetti

Polvere di stelle (Stardust) is the web portal of the National Institute for Astrophysics(INAF) dedicated to the Italian astronomical libraries, archives and museums. It offers different tools and databases created to support astronomical research and increase the value of one of the richest astronomical heritages in the world. In a single virtual space one can find useful tools for sharing digital resources and other services for current research. Besides the OPAC, consisting of bibliographic data of ancientand modern books and serials, the portal offers to astronomers, scholars, students, amateur astronomers and historians of science the possibility to search at the same time other databases: manuscripts, instruments, archival documents and biographies of astronomers. Furthermore, a digital showcase of rare books plays a relevant role in the portal. This paper illustrates the ongoing developments and perspectives of Polvere di stelle.


2018 ◽  
Vol 14 (09) ◽  
pp. 19
Author(s):  
Velin Spasov Kralev ◽  
Radoslava Stankova Kraleva ◽  
Ninа Sinyagina ◽  
Petia Koprinkova-Hristova ◽  
Nadejda Bocheva

<span lang="EN-US">This paper presents the results obtained from a comparative analysis of two methods for experimental data sharing. </span><span>Several </span><span lang="EN-US">works</span><span> related to the </span><span lang="EN-US">topic</span><span> and some </span><span lang="EN-US">approaches</span><span> for </span><span lang="EN-US">processing data</span><span> have been discussed. Different </span><span lang="EN-US">technolgoies related to the web services</span><span>, ways of using them and the areas of their application are analyzed. For the purposes of the study, a </span><span lang="EN-US">web service</span><span> for </span><span lang="EN-US">retrieving </span><span>specific data</span><span lang="EN-US"> from a behavioral experiments database</span><span> was de</span><span lang="EN-US">veloped</span><span>.</span><span>The methodology and conditions for conducting </span><span lang="EN-US">the </span><span>experiments are described. T</span><span lang="EN-US">wo</span><span> different indicators </span><span lang="EN-US">a</span><span>re analyzed, respectively: </span><span lang="EN-US">time to retrieve the data from a database </span><span>and iteration time across all records through one </span><span lang="EN-US">loop</span><span>. The results show that when </span><span lang="EN-US">retrieving</span><span> thousands of records both </span><span lang="EN-US">web service based approach</span><span> and an approach based on a remote database</span><span lang="EN-US"> server can be used. However, when retrieving millions of records</span><span>, </span><span lang="EN-US">the fastest approach was the one that uses remote database server</span><span>.</span><span> <span lang="EN-US">T</span></span><span>he obtained</span><span>results</span><span>show that </span><span lang="EN-US">the </span><span>dynamic arrays</span><span lang="EN-US"> (containing strings) </span><span>iterated much faster </span><span lang="EN-US">across all data records </span><span>than </span><span lang="EN-US">the dataset </span><span>approach.</span>


Author(s):  
Sophie Gastellier-Prevost

Within a more and more complex environment, where connectivity, reactivity and availability are mandatory, companies must be “electronically accessible and visible” (i.e., connection to the Web, e-mail exchanges, data sharing with partners, etc.). As such, companies have to protect their network and, given the broad range of security solutions on the IT security market, the only efficient way for them is to design a global secured architecture. After giving the reader all the necessary materials and explaining classical security and services needs, this chapter proposes three different realistic security-level architectures that may be currently deployed within companies. For more realistic analysis and illustration, two examples of companies with different size and profile are given. A number of advices, explanations and guidelines are provided in this chapter so readers are able to adapt those architectures to their own companies and both security and network needs.


2019 ◽  
Vol 8 (1) ◽  
pp. 40-52 ◽  
Author(s):  
Sarah W. Kansa ◽  
Levent Atici ◽  
Eric C. Kansa ◽  
Richard H. Meadow

ABSTRACTWith the advent of the Web, increased emphasis on “research data management,” and innovations in reproducible research practices, scholars have more incentives and opportunities to document and disseminate their primary data. This article seeks to guide archaeologists in data sharing by highlighting recurring challenges in reusing archived data gleaned from observations on workflows and reanalysis efforts involving datasets published over the past 15 years by Open Context. Based on our findings, we propose specific guidelines to improve data management, documentation, and publishing practices so that primary data can be more efficiently discovered, understood, aggregated, and synthesized by wider research communities.


2017 ◽  
Vol 11 (2) ◽  
pp. 49-63 ◽  
Author(s):  
Harshad Suryakant Wadkar ◽  
Arun Mishra ◽  
Arati M. Dixit

In last few decades, web browser has become one of the most used computer applications. The web browser is available on many devices such as desktops, laptops, palm devices and even in cars. According to recent research reports, the browser is targeted most by exploits in attacks on both home and corporate users. The default browser security configuration may leak user's sensitive information. It may also give remote code execution facility to attacker. In this paper, a framework to detect web browser security misconfiguration is proposed. The misconfiguration leads to data sharing to third party and insecure data transfer. The system scans browser configuration and determine deviation of configuration from secure settings. In addition, the system provides facility to achieve the level of security configuration with respect to recommended settings.


Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


Sign in / Sign up

Export Citation Format

Share Document