Working set-based access control for network file systems

Author(s):  
Stephen Smaldone ◽  
Vinod Ganapathy ◽  
Liviu Iftode
Author(s):  
Antonio Izquierdo ◽  
Jose María Sierra ◽  
Julio César Hernández ◽  
Arturo Ribagorda

Author(s):  
George Pallis ◽  
Konstantina Stoupa ◽  
Athena Vakali

The Internet (and networks overall) are currently the core media for data and knowledge exchange. XML is currently the most popular standardization for Web document representation and is rapidly becoming a standard for data representation and exchange over the Internet. One of the main issues is XML documents and in particular, storage and accessing. Among data management issues, storage and security techniques have a particular importance, since the performance of the overall XML-based Web information system relies on them. Storage issues mainly rely on the usage of typical database management systems (DBMSs), whereas XML documents can also be stored in other storage environments (such as file systems and LDAP directories) (Amer-Yahia & Fernandez, 2002; Kanne & Moerkotte, 2000; Silberschatz, Korth & Sudarshan, 2002). Additionally, in order to guarantee the security of the XML data, which are located in a variety of the above storage topologies, the majority of implementations also provide an appropriate access control. Most storage systems cooperate with access control modules implementing various models (Joshi, Aref, Ghafoor & Spafford, 2001), whereas there are few commercial access control products available. However, there are some standardized XML-based access control languages that can be adopted by most tools.


Author(s):  
George Pallis ◽  
Konstantina Stoupa ◽  
Athena Vakali

XML documents management is becoming an area of great research value and interest since XML has become a popular standard for data communication and knowledge exchange over the Internet. Therefore, new issues have emerged in terms of storage and access control policies for XML documents. Concerning the storage issues, the majority of proposals rely on the usage of typical database management systems (DBMSs), whereas XML documents can also be stored in other storage environments (such as file systems and LDAP directories). It is important to consider storage and access control together since these issues are essential in implementations for XML documents management. Moreover, the chapter focuses on the recent access control models which guarantee the security of the XML-based data, which are located in a variety of storage topologies. This chapter’s goal is to survey and classify existing approaches for XML documents storage and access control, and, at the same time, highlight the main differences between them. The most popular XML database software tools are outlined in terms of their storage and access control policies.


2004 ◽  
pp. 104-140 ◽  
Author(s):  
George Pallis ◽  
Konstantina Stoupa ◽  
Athena Vakali

XML documents management is becoming an area of great research value and interest since XML has become a popular standard for data communication and knowledge exchange over the Internet. Therefore, new issues have emerged in terms of storage and access control policies for XML documents. Concerning the storage issues, the majority of proposals rely on the usage of typical database management systems (DBMSs), whereas XML documents can also be stored in other storage environments (such as file systems and LDAP directories). It is important to consider storage and access control together since these issues are essential in implementations for XML documents management. Moreover, the chapter focuses on the recent access control models which guarantee the security of the XML-based data, which are located in a variety of storage topologies. This chapter’s goal is to survey and classify existing approaches for XML documents storage and access control, and, at the same time, highlight the main differences between them. The most popular XML database software tools are outlined in terms of their storage and access control policies.


2014 ◽  
Vol 23 (04) ◽  
pp. 1450052 ◽  
Author(s):  
JIANWEI LIAO

This paper proposes a framework, which requires keeping tracks of both logical I/O access operations and their corresponding physical access on the storage servers in a parallel file system, to build a self-tuning storage system. Thus, the built self-tuning storage system is able to support dynamical data migrating and data pre-fetching transparently from the view point of clients to boost I/O performance. To this end, we first devised an approach to find out the pairs of logical I/O operations and their associated physical I/O operations. We then employed working set modeling to form I/O access patterns and their corresponding disk access patterns. Finally, with the information about existing access patterns and the similarity analysis of access patterns, it is not difficult to predict the future I/O access operations for possible I/O optimization. Through a series of experiments based on several realistic benchmarks, we show that the newly proposed self-tuning storage system is capable of enabling data migration and data pre-fetching dynamically by using the information about I/O access patterns and the predicted future I/O operations. Therefore, it can improve I/O data throughput significantly for the applications with complicated access patterns; especially, for the applications that require to process multiple-dimensional data, such as medical image processing applications and geographic information system (GIS) applications.


Sign in / Sign up

Export Citation Format

Share Document