33,963 research outputs found
XML data integrity based on concatenated hash function
Data integrity is the fundamental for data authentication. A major problem for XML data authentication is that signed XML data can be copied to another document but still keep signature valid. This is caused by XML data integrity protecting. Through investigation, the paper discovered that besides data content integrity, XML data integrity should also protect element location information, and context referential integrity under fine-grained security situation. The aim of this paper is to propose a model for XML data integrity considering XML data features. The paper presents an XML data integrity model named as CSR (content integrity, structure integrity, context referential integrity) based on a concatenated hash function. XML data content integrity is ensured using an iterative hash process, structure integrity is protected by hashing an absolute path string from root node, and context referential integrity is ensured by protecting context-related elements. Presented XML data integrity model can satisfy integrity requirements under situation of fine-grained security, and compatible with XML signature. Through evaluation, the integrity model presented has a higher efficiency on digest value-generation than the Merkle hash tree-based integrity model for XML data
Ensuring referential integrity under causal consistency
Referential integrity (RI) is an important correctness property of a shared,
distributed object storage system. It is sometimes thought that enforcing RI
requires a strong form of consistency. In this paper, we argue that causal
consistency suffices to maintain RI. We support this argument with pseudocode
for a reference CRDT data type that maintains RI under causal consistency.
QuickCheck has not found any errors in the model
Static Analysis of Partial Referential Integrity for Better Quality SQL Data
Referential integrity ensures the consistency of data between database relations. The SQL standard proposes different semantics to deal with partial information under referential integrity. Simple semantics neglects tuples with nulls, and enjoys built-in support by commercial database systems. Partial semantics does check tuples with nulls, but does not enjoy built-in support. We investigate this mismatch between the SQL standard and real database systems. Indeed, insight is gained into the trade-off between cleaner data under partial semantics and the efficiency of checking simple semantics. The cost for referential integrity checking is evaluated for various dataset sizes, indexing structures and degrees of cleanliness. While the cost of partial semantics exceeds that of simple semantics, their performance trends follow similar patterns under growing database sizes. Applying multiple index structures and exploiting appropriate validation mechanisms increase the efficiency of checking partial semantics
Contemplative Science: An Insider's Prospectus
This chapter describes the potential farâreaching consequences of contemplative higher education for the fields of science and medicine
Forensic flavour
Databases often receive an uninspired and uninterested response. The curriculum content of a database module generally involves the design of entity-relationship models, SQL programming, application development and advanced database applications such as data warehousing and data mining. These are often taught within the tired and relatively worn case studies of purchase order systems, retail or health care systems. However the current trend for crime scene investigation drama and the frequent stories in the news of personal tragedies involving incorrect data, missing data or data mix-up capture the attention of many. The truth is that crimes require data investigation and expert database witnesses to provide evidence and this requires database knowledge and skill. This project involved the introduction of a âforensic flavourâ to the teaching of databases as part of an undergraduate Computing Degree to students. The âforensic flavourâ involved introducing investigative and enquiry based learning techniques as well as selecting case studies based around real-life crimes and crime data. The learning objectives remained unchanged for the modules as did the curriculum content. The initial findings are that the students engaged on average 40% better and enjoyed the experience more
- âŠ