33,963 research outputs found

    XML data integrity based on concatenated hash function

    Get PDF
    Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through investigation, the paper discovered that besides data content integrity, XML data integrity should also protect element location information, and context referential integrity under fine-grained security situation. The aim of this paper is to propose a model for XML data integrity considering XML data features. The paper presents an XML data integrity model named as CSR (content integrity, structure integrity, context referential integrity) based on a concatenated hash function. XML data content integrity is ensured using an iterative hash process, structure integrity is protected by hashing an absolute path string from root node, and context referential integrity is ensured by protecting context-related elements. Presented XML data integrity model can satisfy integrity requirements under situation of fine-grained security, and compatible with XML signature. Through evaluation, the integrity model presented has a higher efficiency on digest value-generation than the Merkle hash tree-based integrity model for XML data

    Ensuring referential integrity under causal consistency

    Get PDF
    Referential integrity (RI) is an important correctness property of a shared, distributed object storage system. It is sometimes thought that enforcing RI requires a strong form of consistency. In this paper, we argue that causal consistency suffices to maintain RI. We support this argument with pseudocode for a reference CRDT data type that maintains RI under causal consistency. QuickCheck has not found any errors in the model

    Static Analysis of Partial Referential Integrity for Better Quality SQL Data

    Get PDF
    Referential integrity ensures the consistency of data between database relations. The SQL standard proposes different semantics to deal with partial information under referential integrity. Simple semantics neglects tuples with nulls, and enjoys built-in support by commercial database systems. Partial semantics does check tuples with nulls, but does not enjoy built-in support. We investigate this mismatch between the SQL standard and real database systems. Indeed, insight is gained into the trade-off between cleaner data under partial semantics and the efficiency of checking simple semantics. The cost for referential integrity checking is evaluated for various dataset sizes, indexing structures and degrees of cleanliness. While the cost of partial semantics exceeds that of simple semantics, their performance trends follow similar patterns under growing database sizes. Applying multiple index structures and exploiting appropriate validation mechanisms increase the efficiency of checking partial semantics

    Contemplative Science: An Insider's Prospectus

    Get PDF
    This chapter describes the potential far‐reaching consequences of contemplative higher education for the fields of science and medicine

    Forensic flavour

    Get PDF
    Databases often receive an uninspired and uninterested response. The curriculum content of a database module generally involves the design of entity-relationship models, SQL programming, application development and advanced database applications such as data warehousing and data mining. These are often taught within the tired and relatively worn case studies of purchase order systems, retail or health care systems. However the current trend for crime scene investigation drama and the frequent stories in the news of personal tragedies involving incorrect data, missing data or data mix-up capture the attention of many. The truth is that crimes require data investigation and expert database witnesses to provide evidence and this requires database knowledge and skill. This project involved the introduction of a ‘forensic flavour’ to the teaching of databases as part of an undergraduate Computing Degree to students. The ‘forensic flavour’ involved introducing investigative and enquiry based learning techniques as well as selecting case studies based around real-life crimes and crime data. The learning objectives remained unchanged for the modules as did the curriculum content. The initial findings are that the students engaged on average 40% better and enjoyed the experience more
    • 

    corecore