SemCrypt Secure XML Processing in Outsourced Databases
|
|
- Willis Casey
- 6 years ago
- Views:
Transcription
1 Institute für Wirtschaftsinformatik Nr / September 2008 SemCrypt Secure XML Processing in Outsourced Databases Katharina Grün Michael Karlinger Michael Schrefl Forschungsbericht Research Report 08.02
2 Vorbemerkung der Herausgeber / Editors preamble Die Forschungsberichte der Institute für Wirtschaftsinformatik dienen der Darstellung vorläufiger Ergebnisse z. B. Projektberichte und Zwischenergebnisse, die i. d. R. für spätere Veröffentlichungen überarbeitet werden. Die Autoren sind für kritische Hinweise dankbar. Alle Rechte vorbehalten. Research reports comprise preliminary results, e.g. project reports and intermediary results which will usually be revised for subsequent publications. Critical comments are appreciated by the authors. All rights reserved. Herausgeber / Editors o. Univ.-Prof. Dipl.-Ing. Dr. Gustav Pomberger, Institut für Wirtschaftsinformatik Software Engineering o. Univ.-Prof. Mag. Dr. Friedrich Roithmayr, Institut für Wirtschaftsinformatik Information Engineering o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl, Institut für Wirtschaftsinformatik Data & Knowledge Engineering o. Univ.-Prof. Dipl.-Ing. Dr. Christian Stary, Institut für Wirtschaftsinformatik Communications Engineering Autoren / Authors Mag. Katharina Grün gruen@dke.uni-linz.ac.at Mag. Michael Karlinger karlinger@dke.uni-linz.ac.at o. Univ.-Prof. Dr. Michael Schrefl schrefl@dke.uni-linz.ac.at Johannes Kepler Universität Linz Institut für Wirtschaftsinformatik - Data & Knowledge Engineering Altenberger Str. 69, A-4040 Linz, Austria
3 SemCrypt - Secure XML Processing in Outsourced Databases Katharina Grün Michael Karlinger Michael Schrefl Department of Business Informatics - Data & Knowledge Engineering Johannes Kepler University Linz, Austria {gruen, karlinger, schrefl}@dke.uni-linz.ac.at Abstract The increasing number and size of XML documents require efficient techniques for storing, querying and updating XML data. Current XML databases disregard privacy and security concerns when processing sensitive documents at external storage providers because they cannot prevent the untrustworthy storage provider from accessing either the content or the structure of the outsourced documents. At the external storage provider, SemCrypt 1 exclusively processes encrypted documents. Documents or document fragments are only decrypted at the client-side for authorized users. To query and update encrypted documents, the approach developed explores the structural semantics of the documents as well as special index structures. The SemCrypt database provides an administration tool that visualizes how data is stored and processed. 1 Introduction The trend to outsource data and the increasing need to process sensitive XML documents call for a secure processing model that ensures the privacy of stored documents without depending on service level agreements. Such a processing model grounds on a client-server architecture, where clients process data and the server acts as storage provider in an untrustworthy domain. All data processed at the storage provider is encrypted to protect it from being misused. Encryption and decryption for query and update processing are exclusively performed in the trusted domain of the client. In the secure processing model, querying and updating documents can basically be performed according to one of the following approaches: (i) encrypt 1 SemCrypt is a collaborative research project funded by FIT-IT, a programme initiative of the Austrian Federal Ministry of Transport, Innovation and Technology, with partners Johannes Kepler University Linz, Electronic Competence Center Vienna, and EC3 Networks GmbH. 1
4 whole documents or large document parts and transfer them between client and server for query and update processing [4], (ii) develop special encryption techniques for processing encrypted data directly at the server [1], (iii) exploit the structural semantics of documents and develop special storage and index structures. While approach (i) requires large amount of data to be transferred between client and server, approach (ii) cannot easily replace its encryption techniques when they are broken or better ones are available. Approach (iii) minimizes the amount of data transferred and works with off-the-shelf encryption techniques. SemCrypt [5] follows approach (iii) to efficiently query and update encrypted XML documents. This paper presents the main concepts that have been developed for SemCrypt. 1.1 Setup configurations To be adaptable to different application scenarios, SemCrypt s design allows for different configurations (cf. Figure 1.1), all of which rely on a potentially untrustworthy storage provider to store encrypted data. The storage provider is also responsible for backup, recovery and basic transaction control. Arbitrary DB Server Storage Provider Client SC Core / User App Arbitrary DB Server Storage Provider Client SC Core / User App Security Component store encrypted storage common access query processing encryption store encrypted storage common access query processing encryption authorization a) Single user configuration. b) Multi user configuration. Figure 1: Setup configurations of SemCrypt (SC). (a) Single user scenario: Each one of several single users has full access to exactly one encrypted store, where one storage provider may host several stores. A typical application scenario for this setting is a secure, remote document store where users manage their documents, e.g. insurance contracts, using a special purpose application. This application utilizes the SemCrypt Core for performing query and update processing as well as encryption/decryption within the trusted domain of the client. (b) Multi user scenario: Several users access the same documents from different, potentially insecure clients. Access authorization is delegated to a Security Component which en- and decrypts document fragments for authorized users. Alternatively, this security check could also be performed by specific 2
5 secure devices, such as powerful smart cards. A typical application scenario is to outsource the storage of records in e-government applications. 1.2 Challenges Designing a secure XML database system (DBS) poses several challenges. To ensure data privacy and prevent security risks as identified by Fong [2], the system must guarantee both storage and communication security. The physical storage structure must neither reveal the document content nor the document structure to the storage provider. To be widely applicable, the DBS should not depend on specific encryption techniques. Repeated encryption of the same plain text fragments or markups needs to result in different cipher texts in order to avoid statistic-based attacks. Regarding the client-server communication, repeated transmission of the same data has to be avoided, again in order to avoid statistic-based attacks. The DBS needs to support querying and updating of both the content and structure of documents, i.e. navigating within documents and constraining values and types. Finally, regarding the system s overall performance, the data volume to be transferred from the server for answering queries has to be minimized. 1.3 Achievements SemCrypt tackles these challenges as follows. The physical storage structure guarantees data privacy and security through encryption. To identify encrypted fragments, query and update processing techniques exploit the structural semantics of XML, i.e. schema information, which is captured by the document structure. Processing documents is based on a schema-aware labeling scheme [3] which not only allows to identify each node of a document by a unique node label, but also enables to execute many operations directly onto node labels without accessing encrypted data. To efficiently process queries that constrain node values, SemCrypt provides an index framework that supports indexing the content of arbitrary document fragments. Query processing is based on a query algebra enabling query optimization and index selection. Prior works on XML processing present isolated solutions for these problems, which cannot easily be combined due to conflicting assumptions. SemCrypt not only extends these techniques, but also integrates them into a multi-layered architecture. The layered structure of this architecture enables to use SemCrypt also as a conventional XML database by transferring the SemCrypt Core to the Storage Provider. 2 Architecture The architecture of the SemCrypt Core, depicted in Figure 2, integrates the various components and their data models and bridges the gap between the physical storage of encrypted data and its representation to end users. SemCrypt processes four kinds of primary data, namely schemas, documents, indices and 3
6 queries. Following database reference architectures, the processing of primary data occurs within different layers. The external layer represents data in a way familiar to end users, who e.g. formulate queries in terms of XPath. The Sem- Crypt Service takes user requests in their external representation, parses and dispatches them. Various database tasks, such as query optimization, cannot be efficiently performed on external primary data. The logical layer thus abstracts from external representations, while the internal layer incorporates special techniques to improve system performance. Within the logical and the internal layer, there is one specific component for each kind of primary data. At the physical layer, the Storage Engine provides access to the physical storage structures. These components and their data models are subsequently explained in more detail. All components create metadata, like names of available documents or schema information, and provide this metadata to other components. To manage metadata, SemCrypt follows the approach of using a separate database, encapsulated by the Metadata Manager. external SemCrypt Service logical internal Schema Manager Schema Engine Document Manager Document Engine Query Engine Execution Engine Index Manager Index Engine Metadata Manager physical Storage Engine network Storage Provider Figure 2: SemCrypt Architecture. 3 Concepts This section elaborates on the specific techniques developed for SemCrypt. To gain a better understanding of these techniques, we use a simplified example of managing insurance contracts within a secure, remote document store. Throughout the paper, the concepts are demonstrated by screen dumps taken from the prototype administration tool of SemCrypt (SCAdmin). 4
7 3.1 Physical storage To prevent security risks, SemCrypt uses the physical storage structure depicted in Figure 3. Data fragments are encrypted with a user defined standard encryption algorithm (E) and encryption key (K). The use of nonrecurring random numbers (nonce) prevents statistical analysis by encrypting same fragments differently in each communication with the Storage Provider. To identify encrypted fragments, each fragment has assigned a unique id, which encodes structural information about the fragment and is encrypted using a cryptographic hash function (H). In order to prevent frequency analysis, the Storage Engine caches frequently requested fragments. Figure 3: Storage view. Example 1 Figure 3 depicts sample terms of an insurance contract as encrypted fragment (top) and its unencrypted counterpart (bottom) when viewed in the SCAdmin tool. When the client requires a fragment to answer a query, it assembles its unique id, e.g based on metadata or partial query results and requests the fragment from the Storage Provider. 3.2 Schema processing Schema information, which in general can be extracted from XML schemas, DTDs or directly from XML documents, is primarily required for identifying encrypted document fragments and maintained by the Schema Manager. The Schema Engine builds a corresponding schema tree and encodes its paths and subtypes into schema labels, which are part of node labels and are exploited when processing queries and updates. Example 2 Figure 4 depicts the schema view of the SCAdmin tool when an XML Schema modeling insurance contracts is imported. The logical and internal representations of this XML Schema are depicted in the middle and bottom parts of Figure 4, respectively. Internally, for example, the path insurances/insurance is denoted by schema label 2. The two subtypes of insurances, life and car insurances, have assigned individual schema labels (3 and 4). 5
8 Figure 4: Schema view. 3.3 Document processing The Document Manager logically represents documents as trees of nodes, which the Document Engine internally identifies through node labels. The schemaaware, dynamic prefix labeling scheme of SemCrypt [3] not only allows to determine structural relationships between nodes, but also encodes schema labels, identifying paths and types. The Document Engine is further responsible for storing and updating content and structure of documents. It fragments documents to minimize the amount of data retrieved from the Storage Provider for query processing and it maintains a condensed representation of the document structure capturing the relationships between the fragments. Example 3 Figure 5 depicts the representations of a document in the SCAdmin tool when an insurance contract is uploaded. Node label
9 Figure 5: Document view. internally identifies the insurance contract of John Doe and consists of (i) the internal document id 1, (ii) the schema label 2 4 encoding the path 2 (insurances/insurance) and the subtype 4 (CarInsurance), and (iii) the instance label 1 denoting that this is the first insurance contract with respect to document order. 3.4 Index processing SemCrypt uses a special index framework to directly support queries on encrypted documents by adjusting secondary index structures to the query workload. The specific characteristic of this framework is that it allows indexing the content and structure of arbitrary document fragments. It provides indices for exact match, range queries and text retrieval as well as for hierarchical queries on the document structure and type hierarchies. While the Index Manager abstracts index definition and index selection from the index structures per se, the Index Engine maintains and traverses the indices and stores them via the Storage Engine using the same encrypted storage structure as used for documents. Example 4 Figure 6 shows how to define a hash index in the SemCrypt Query Language (SCQL). The index (i1) associates with each insurant name the node 7
10 Figure 6: Index view. labels of their contracts. The logical representation of an index corresponds to a logical query with variables. Internally, an index has the form of a tree pattern whose nodes contain schema labels and variables. Tree patterns are used for index selection and maintenance. 3.5 Query processing The Query Engine performs query optimization based on a logical query algebra, which represents each query as a graph of logical operators. The particularities of this algebra are (i) independence of specific query execution techniques and (ii) support for types, type hierarchies and XPath-like function calls. To select appropriate indices for executing queries, the Query Engine exploits schema information to match index definitions with logical query plans. The Execution Engine evaluates query plans compiled into an internal query algebra, which incorporates performance boosting techniques such as node labels, schema information and index structures. Example 5 Figure 7 depicts the query view of the SCAdmin tool when a query on the insurance terms of insurant Jane Doe is submitted. Based on the XPath query, a corresponding logical query plan is derived and optimized. The resulting internal query plan specifies to process the query as follows: (1) access the sample index with search condition Jane Doe to retrieve the label of the respective insurance contract in document 1, i.e. label ; (2) navigate from the retrieved contract to its terms by modifying its node label based on schema information, i.e. exchanging its schema label 2 to 8, and retrieve the encrypted fragment identified by the corresponding label The value of this fragment corresponds to the queried insurance terms. The XML fragment returned by this query is depicted at the very bottom of Figure 7. 8
11 Figure 7: Query view. 4 Summary Recapitulating, SemCrypt uses the following techniques to efficiently process outsourced XML documents without revealing their content or structure to the untrustworthy storage provider: (i) encrypt all data with a cryptographic hash function and an encryption algorithm, (ii) exploit schema information to identify encrypted fragments and perform query operations on labels instead of accessing encrypted data, (iii) define specific index structures based on the expected query workload, enabling to exactly retrieve the encrypted fragments needed to answer the queries. References [1] R. Brinkman, L. Feng, J. Doumen, P. Hartel, and W. Jonker. Efficient Tree Search in Encrypted Data. In Proc. 2nd Int. Workshop on Security In Information Systems, pages , [2] K. Fong. Potential Security Holes in Hacigümüs Scheme of Executing SQL over Encrypted Data. kfong/research/database.pdf. [3] K. Grün, M. Karlinger, and M. Schrefl. Schema-aware Labelling of XML Documents for Efficient Query and Update Processing in SemCrypt. Computer Systems Science and Engineering, 21(1):65,
12 [4] H. Hacigümüs, B. Iyer, C. Li, and S. Mehrotra. Executing SQL over Encrypted Data in the Database-Service-Provider Model. In Proc ACM SIGMOD Int. Conf. on Management of Data, pages , [5] M. Schrefl, J. Dorn, and K. Grün. SemCrypt - Ensuring Privacy of Electronic Documents through Semantic-based Encrypted Query Processing. PDM 2005 International Workshop on Privacy Data Management, 8,
13 Bisher erschienene Institutsberichte (seit 1996) Nr / Februar 1996 P. Brandl, H. S. Huber: Diagnose der Informationsverarbeitung: Der DASIE- Benchmark Nr / Oktober 1996 M. Schrefl, G. Kappel, P. Lang: Modeling Collaborative Behavior Using Cooperation Contracts Nr / Dezember 1996 I. Wiesinger, B. Hemetsberger: Evaluierung von Managementunterstützungssystemen Nr / Januar 1997 P. Lang, W. Obermair, M. Schrefl: Modeling Business Rules with Situation/Activation Diagrams Nr / Februar 1997 P. Bichler, G. Preuner, M. Schrefl: Workflow Transparency Nr / Jänner 1998 A. Mittelmann: Organisationales Lernen und Geschäftsprozessmanagement Nr / Mai 1999 M. Gappmaier, J. Siller: Partizipative Interaktionsanalyse Videogestützte Methoden für ganzheitliches Geschäftsprozessmanagement Nr / Mai 1999 M. Gappmaier, H. Merl, V. Pilsl: Das Organisationsgesundheitsbild Nr / Mai 1999 M. Gappmaier, M. Ruzicka: Partizives Gestalten von Geschäftsprozessen mit der Bildkartengestaltungsmethode (BKM) Nr / September 1999 I. Häntschel, H. Schmidt: Methoden zur Ermittlung des Informationsbedarfs des Managements Nr / September 1999 I. Häntschel, W. Erhart: Ein Vorgehensmodell zur strategiegeleiteten Einführung von Managementunterstützungssystemen (VEM) Nr / März 2000 G. Preuner, S. Conrad, M. Schrefl: View Integration of Behavior in Object-oriented Databases Nr / März 2000 G. Preuner, S. Conrad: View Integration of Life-cycles in Object-oriented Design Nr / April 2000 M. Schrefl, M. Stumptner: Behavior Consistent Refinement of Object Life Cycles
14 Bisher erschienene Institutsberichte (seit 1996, Fortsetzung) Nr / April 2000 A. Felfernig, G. Friedrich, D. Jannach, M. Stumptner: An Integrated Development Environment for the Design and Maintenance of Large Configuration Knowledge Bases Nr / April 2001 T. Thalhammer, M. Schrefl, M. Mohania: Active Data Warehouses: Complementing OLAP with Active Rules Nr / April 2001 C. Thonabauer, L. J. Heinrich: Ein Messsystem zur Erfassung von Potenzial und Nutzung von E-Commerce / E-Business Nr / Mai 2002 M. Bernauer, M. Schrefl: Bringing Life into Self-Maintaining Web Pages Nr / September 2002 G. Preuner, M. Schrefl: Behavior-consistent Composition of Business Processes from Internal and External Services Nr / Mai 2003 T. Auinger: Wissensmanagement-Audit Nr / Juni 2003 S. Lechner, M. Schrefl: By-example schema transformers for supporting the process of conceptual web application modelling Nr / Jänner 2004 T. Auinger, M. Kobler: Laborstudie eine Evaluierung des Wissensmanagement- Audits Nr / April 2005 R. Riedl, M. Kobler, F. Roithmayr: An Action Model for Business Strategy Creation in IT-related SMEs Nr / August 2005 R. Riedl: Auswahl eines Application Service Providers: Analytic Hierarchy Process oder Nutzwertanalyse? Nr / August 2007 A. Bögl: pmodeler: Ein System zu semantischen Prozessmodellanalyse Nr / November 2007 M. Karlinger, M. Vincent, M. Schrefl: On the Definition and Axiomatization of Inclusion Dependencies for XML Nr / August 2008 K. Grün, M. Schrefl: Extensible Indexing in XML Databases
Extensible Indexing in XML Databases
Institute für Wirtschaftsinformatik Nr. 08.01 / August 2008 Extensible Indexing in XML Databases Katharina Grün Michael Schrefl Forschungsbericht Research Report 08.01 Vorbemerkung der Herausgeber / Editors
More informationNavigation Consistency in Web Site Families
Institute für Wirtschaftsinformatik Nr. 09.04 / Oktober 2009 Navigation Consistency in Web Site Families Christian Eichinger Michael Schrefl Forschungsbericht Research Report 09.04 Vorbemerkung der Herausgeber
More informationComparison Criteria for Ontological Multi-Level Modeling
Institute für Wirtschaftsinformatik Nr. 08.03 / November 2008 Comparison Criteria for Ontological Multi-Level Modeling Presented at Dagstuhl-Seminar on The Evolution of Conceptual Modeling Bernd Neumayr
More informationMulti-models: New potentials for the combined use of planning and controlling information
M.Sc. Sven-Eric Schapke, Institut für Bauinformatik, Technische Universität Dresden Dr.-Ing. Christoph Pflug, Max Bögl Multi-models: New potentials for the combined use of planning and controlling information
More informationXML-based EIS A Meta Schema for Mapping XML Schema to Relational DBS
XML-based EIS A Meta Schema for Mapping XML Schema to Relational DBS Elisabeth Kapsammer Information Systems Group (IFS), Department of Bioinformatics Johannes Kepler University Linz, Austria ek@ifs.uni-linz.ac.at
More informationSTATUS UPDATE ON THE INTEGRATION OF SEE-GRID INTO G- SDAM AND FURTHER IMPLEMENTATION SPECIFIC TOPICS
AUSTRIAN GRID STATUS UPDATE ON THE INTEGRATION OF SEE-GRID INTO G- SDAM AND FURTHER IMPLEMENTATION SPECIFIC TOPICS Document Identifier: Status: Workpackage: Partner(s): Lead Partner: WP Leaders: AG-DM-4aA-1c-1-2006_v1.doc
More informationEnhancing Security With SQL Server How to balance the risks and rewards of using big data
Enhancing Security With SQL Server 2016 How to balance the risks and rewards of using big data Data s security demands and business opportunities With big data comes both great reward and risk. Every company
More informationFedDW Global Schema Architect
UML based Design Tool for the Integration of Data Mart Schemas Dr. Stefan Berger Department of Business Informatics Data & Knowledge Engineering Johannes Kepler University Linz ACM 15 th DOLAP 12 November
More informationSynthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures
Synthesizing Communication Middleware from Explicit Connectors in Component Based Distributed Architectures Dietmar Schreiner 1,2 and Karl M. Göschka 1 1 Vienna University of Technology Institute of Information
More informationA Generic Framework for Realizing Semantic Model Differencing Operators
A Generic Framework for Realizing Semantic Model Differencing Operators Philip Langer, Tanja Mayerhofer, and Gerti Kappel Business Informatics Group, Vienna University of Technology, Vienna, Austria {langer,mayerhofer,gerti}@big.tuwien.ac.at
More informationAutomated Visualization Support for Linked Research Data
Automated Visualization Support for Linked Research Data Belgin Mutlu 1, Patrick Hoefler 1, Vedran Sabol 1, Gerwald Tschinkel 1, and Michael Granitzer 2 1 Know-Center, Graz, Austria 2 University of Passau,
More informationCyber Security. Activities of an national insurance association based on the example of VVO
Cyber Security Activities of an national insurance association based on the example of VVO Michael Brandstetter EU and International Affairs Austrian Insurance Association (VVO) IIF Insurance in the Digital
More informationCONCEPTUAL DESIGN EHANCEMENT OF A DESIGN ASSISTANT SYSTEM FOR LIGHTWEIGHT STRUCTURES
INTERNATIONAL DESIGN CONFERENCE - DESIGN 2004 Dubrovnik, May 18-21, 2004. CONCEPTUAL DESIGN EHANCEMENT OF A DESIGN ASSISTANT SYSTEM FOR LIGHTWEIGHT STRUCTURES C. Hauck and H. Meerkamm Keywords: early stages
More informationMobile and Secure Healthcare: Encrypted Objects and Access Control Delegation
Mobile and Secure Healthcare: Encrypted Objects and Access Control Delegation PRESENTATION TITLE GOES HERE January 28, 206 SNIA Presenters Alex McDonald Chair - SNIA Cloud Storage NetApp Martin Rosner
More informationHow to Automatically Unterstand and Integrate System-models and how SpecIF can help.
Working How to Automatically Unterstand and Integrate System-models and how SpecIF can help. Oskar von Dungern, Dr.-Ing., adesso AG 2 Topics Today 1. The idea behind model integration and SpecIF Purpose
More informationInnovations in V6.5 Consolidation
Innovations in V6.5 Consolidation 2013-07-15 2013 APIS IT GmbH IQ Software Update Tutorial Excerpt: Consolidation 1 Copyright / authors: Version: July 01, 2013 Authors: Training team of APIS Informationstechnologien
More informationCourse 40045A: Microsoft SQL Server for Oracle DBAs
Skip to main content Course 40045A: Microsoft SQL Server for Oracle DBAs - Course details Course Outline Module 1: Database and Instance This module provides an understanding of the two major components
More informationNational Identity Exchange Federation. Terminology Reference. Version 1.0
National Identity Exchange Federation Terminology Reference Version 1.0 August 18, 2014 Table of Contents 1. INTRODUCTION AND PURPOSE... 2 2. REFERENCES... 2 3. BASIC NIEF TERMS AND DEFINITIONS... 5 4.
More informationOutlook-Based Concept for the Population and Updating of a Meta-Information System in Environmental Administration
Outlook-Based Concept for the Population and Updating of a Meta-Information System in Environmental Administration P. Fischer-Stabel a, R. Krieger a and E.Rietzke b a Umwelt-Campus, University of Applied
More informationIdentification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Johannes Loinig 1, Christian Steger 1, Reinhold Weiss 1, and Ernst Haselsteiner
More informationAn ECA Engine for Deploying Heterogeneous Component Languages in the Semantic Web
An ECA Engine for Deploying Heterogeneous Component s in the Semantic Web Erik Behrends, Oliver Fritzen, Wolfgang May, and Daniel Schubert Institut für Informatik, Universität Göttingen, {behrends fritzen
More informationTitelmasterformat durch Klicken bearbeiten Formatvorlage des Untertitelmasters durch Klicken bearbeiten
COmmunication Network VEhicle Road Global Extension Proposal for a Car2X Systems Network CONVERGE Project presentation Titelmasterformat durch Klicken bearbeiten Formatvorlage des Untertitelmasters durch
More informationVoid main Technologies
Sno Title Domain 1. A Cross Tenant Access Control (CTAC) Model for Cloud Computing: Formal Specification and Verification 2. A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing 3. A Modified
More informationAnalytics: Server Architect (Siebel 7.7)
Analytics: Server Architect (Siebel 7.7) Student Guide June 2005 Part # 10PO2-ASAS-07710 D44608GC10 Edition 1.0 D44917 Copyright 2005, 2006, Oracle. All rights reserved. Disclaimer This document contains
More informationA Framework for Processing Complex Document-centric XML with Overlapping Structures Ionut E. Iacob and Alex Dekhtyar
A Framework for Processing Complex Document-centric XML with Overlapping Structures Ionut E. Iacob and Alex Dekhtyar ABSTRACT Management of multihierarchical XML encodings has attracted attention of a
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2015 Roadmap: Trusted Computing Motivation Notion of trust
More informationOracle Database 18c and Autonomous Database
Oracle Database 18c and Autonomous Database Maria Colgan Oracle Database Product Management March 2018 @SQLMaria Safe Harbor Statement The following is intended to outline our general product direction.
More informationTrustworthy user authentication, authorization, data integrity AND consent management
RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY
More informationOverview of the Multi-Payer Claims Database (MPCD)
Overview of the Multi-Payer Claims Database (MPCD) Genesis of the MPCD The MPCD project is one of a number of initiatives related to comparative effectiveness research (CER) funded by the American Recovery
More informationAttribute-based encryption with encryption and decryption outsourcing
Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2014 Attribute-based encryption with encryption and decryption outsourcing
More informationTowards a Theory of Genericity Based on Government and Binding
Towards a Theory of Based on Government and Binding ER 2006 Tucson Alexander Bienemann, Klaus-Dieter Schewe, Bernhard Thalheim Ariva.de Kiel & Massey University & Kiel University Our main contributions
More informationManaging Data Resources
Chapter 7 Managing Data Resources 7.1 2006 by Prentice Hall OBJECTIVES Describe basic file organization concepts and the problems of managing data resources in a traditional file environment Describe how
More informationStatic Dynamic Integration of External Services into Generic Business Processes
Static Dynamic Integration of External Services into Generic Business Processes Günter Preuner 1, Christian Eichinger 1, Michael Schrefl 2 1 Institut für Wirtschaftsinformatik Data & Knowledge Engineering,
More informationGATE: Big Data for Smart Society Dessislava Petrova-Antonova Sofia University St. Kliment Ohridski Faculty of Mathematics and Informatics
GATE: Big Data for Smart Society Dessislava Petrova-Antonova Sofia University St. Kliment Ohridski Faculty of Mathematics and Informatics Johann Wolfgang von Goethe Big Data provides the pipes, and AI
More informationWeb Portal : Complete ontology and portal
Web Portal : Complete ontology and portal Mustafa Jarrar, Ben Majer, Robert Meersman, Peter Spyns VUB STARLab, Pleinlaan 2 1050 Brussel {Ben.Majer,Mjarrar,Robert.Meersman,Peter.Spyns}@vub.ac.be, www.starlab.vub.ac.be
More informationTrends in Database Research
Trends in Database Research Mukesh Mohania 1, Yahiko Kambayashi 2, A. Min Tjoa 3, Roland Wagner 4, and Ladjel Bellatreche 5 1 Dept of Computer Science, Western Michigan University, Kalamazoo, MI 49008,
More informationCategorization and Recognition of Ontology Refactoring Pattern
Categorization and Recognition of Ontology Refactoring Pattern Gerd Gröner Steffen Staab Nr. 9/2010 Arbeitsberichte aus dem Fachbereich Informatik Die Arbeitsberichte aus dem Fachbereich Informatik dienen
More informationLecture Embedded System Security Introduction to Trusted Computing
1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Summer Term 2012 Roadmap: Trusted Computing Motivation Notion of trust
More informationData Partnerships to Improve Health Frequently Asked Questions. Glossary...9
FAQ s Data Partnerships to Improve Health Frequently Asked Questions BENEFITS OF PARTICIPATING... 1 USING THE NETWORK.... 2 SECURING THE DATA AND NETWORK.... 3 PROTECTING PRIVACY.... 4 CREATING METADATA...
More informationA NOVEL APPROACH FOR DATA HIDING IN PLAIN FILE
A NOVEL APPROACH FOR DATA HIDING IN PLAIN FILE Phillipe Shasha National University College, Singapore ABSTRACT: * Imagine that you have been entrusted with private data, such as corporate product information,
More informationAn approach to the model-based fragmentation and relational storage of XML-documents
An approach to the model-based fragmentation and relational storage of XML-documents Christian Süß Fakultät für Mathematik und Informatik, Universität Passau, D-94030 Passau, Germany Abstract A flexible
More informationCommon Language Resources and Technology Infrastructure REVISED WEBSITE
REVISED WEBSITE Responsible: Dan Cristea Contributing Partners: UAIC, FFGZ, DFKI, UIB/Unifob The ultimate objective of CLARIN is to create a European federation of existing digital repositories that include
More informationImproving Adaptive Hypermedia by Adding Semantics
Improving Adaptive Hypermedia by Adding Semantics Anton ANDREJKO Slovak University of Technology Faculty of Informatics and Information Technologies Ilkovičova 3, 842 16 Bratislava, Slovak republic andrejko@fiit.stuba.sk
More informationVisual Intranet Interfaces and Architecture of Unified Information Space in the Concept of Virtual University at ZSU
Visual Intranet Interfaces and Architecture of Unified Information Space in the Concept of Virtual University at ZSU Vadim A. Ermolayev Zaporozhye State University, 66, Zhukovskogo st., 330600, Zaporozhye,
More informationResearch and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen SUN
2016 International Conference on Wireless Communication and Network Engineering (WCNE 2016) ISBN: 978-1-60595-403-5 Research and Design of Crypto Card Virtualization Framework Lei SUN, Ze-wu WANG and Rui-chen
More informationMensch-Maschine-Interaktion 1
1 Mensch-Maschine-Interaktion 1 Chapter 10 (July 21st, 2011, 9am-12pm): User-Centered Development Process Overview Introduction Basic HCI Principles (1) Basic HCI Principles (2) User Research & Requirements
More informationOLAP Introduction and Overview
1 CHAPTER 1 OLAP Introduction and Overview What Is OLAP? 1 Data Storage and Access 1 Benefits of OLAP 2 What Is a Cube? 2 Understanding the Cube Structure 3 What Is SAS OLAP Server? 3 About Cube Metadata
More information... Chair of Mobile Business & Multilateral Security. Lecture 11 Business Informatics 2 (PWIN)
Lecture 11 Business Informatics 2 (PWIN) Database Management I Databases & Dataoriented Modelling WS 2015/16 Prof. Dr. Kai Rannenberg www.m-chair.de Chair of Mobile Business & Multilateral Security Jenser
More informationSecurity Considerations in M2M Communications
Security Considerations in M2M Communications Applied Research Issues & Projects in the Austrian Institute of Technology (AIT) Dr. Markus Tauber Project Manager, ICT Security, Future Networks and Services,
More informationFit für die MATLAB EXPO
Fit für die MATLAB EXPO Eine kurze Einführung in MATLAB Michael Glaßer 2015 The MathWorks, Inc. 1 Hinweise für Betrachter der PDF Version Die Folien sind eher eine unterstützende Zusammenfassung Der Vortrag
More informationI. Khalil Ibrahim, V. Dignum, W. Winiwarter, E. Weippl, Logic Based Approach to Semantic Query Transformation for Knowledge Management Applications,
I. Khalil Ibrahim, V. Dignum, W. Winiwarter, E. Weippl, Logic Based Approach to Semantic Query Transformation for Knowledge Management Applications, Proc. of the International Conference on Knowledge Management
More informationInformation Technology Engineers Examination. Database Specialist Examination. (Level 4) Syllabus. Details of Knowledge and Skills Required for
Information Technology Engineers Examination Database Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination Version 3.1
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More informationFundamentals of. Database Systems. Shamkant B. Navathe. College of Computing Georgia Institute of Technology PEARSON.
Fundamentals of Database Systems 5th Edition Ramez Elmasri Department of Computer Science and Engineering The University of Texas at Arlington Shamkant B. Navathe College of Computing Georgia Institute
More information51. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium
51. IWK Internationales Wissenschaftliches Kolloquium International Scientific Colloquium PROCEEDINGS 11-15 September 2006 FACULTY OF ELECTRICAL ENGINEERING AND INFORMATION SCIENCE INFORMATION TECHNOLOGY
More informationGovernment of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard
Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.6 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's
More informationUsing XML Learning Objects Current and Future Benefits for Web Based Training Scenarios
Using XML Learning Objects Current and Future Benefits for Web Based Training Scenarios Maik Stührenberg Applied and Computational Linguistics Group Justus-Liebig-Universität Gießen maik.stuehrenberg@uni-giessen.de
More informationImproving data integrity on cloud storage services
International Journal of Engineering Science Invention Volume 2 Issue 2 ǁ February. 2013 Improving data integrity on cloud storage services Miss. M.Sowparnika 1, Prof. R. Dheenadayalu 2 1 (Department of
More informationOASIS Standards Development Supporting Identity Management, Privacy and Trust in Cloud Computing Services
OASIS Standards Development Supporting Identity Management, Privacy and Trust in Cloud Computing Services John Sabo Director, Global Government Relations Chair, OASIS IDtrust Member Section Steering Committee
More informationGovernment of Ontario IT Standard (GO ITS)
Government of Ontario IT Standard (GO ITS) GO-ITS Number 56.3 Information Modeling Standard Version # : 1.5 Status: Approved Prepared under the delegated authority of the Management Board of Cabinet Queen's
More informationModels in Conflict Towards a Semantically Enhanced Version Control System for Models
Models in Conflict Towards a Semantically Enhanced ersion Control System for Models Kerstin Altmanninger Department of Telecooperation, Johannes Kepler University Linz, Austria kerstin.altmanninger@jku.at
More informationBeyond ERP Systems: An Outline of Self-Referential Enterprise Systems ICB-RESEARCH REPORT
ICB Institut für Informatik und Wirtschaftsinformatik Ulrich Frank Stefan Strecker Beyond ERP Systems: An Outline of Self-Referential Enterprise Systems ICB-RESEARCH REPORT Requirements, Conceptual Foundation
More informationOracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017
Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationEine für Alle - Oracle DB für Big Data, In-memory und Exadata Dr.-Ing. Holger Friedrich
Eine für Alle - Oracle DB für Big Data, In-memory und Exadata Dr.-Ing. Holger Friedrich Agenda Introduction Old Times Exadata Big Data Oracle In-Memory Headquarters Conclusions 2 sumit AG Consulting and
More informationDesign Patterns for Description-Driven Systems
Design Patterns for Description-Driven Systems N. Baker 3, A. Bazan 1, G. Chevenier 2, Z. Kovacs 3, T Le Flour 1, J-M Le Goff 4, R. McClatchey 3 & S Murray 1 1 LAPP, IN2P3, Annecy-le-Vieux, France 2 HEP
More informationChapter 17 Web Services Additional Topics
Prof. Dr.-Ing. Stefan Deßloch AG Heterogene Informationssysteme Geb. 36, Raum 329 Tel. 0631/205 3275 dessloch@informatik.uni-kl.de Chapter 17 Web Services Additional Topics Prof. Dr.-Ing. Stefan Deßloch
More informationSmart Data and its impact for Germany
Smart Data and its impact for Germany Dr. Alexander Tettenborn i-know, 19.10.2016, Graz www.bmwi.de The German Digital Economy * 221 bn. turnover (ICT sector) 100 bn. turnover (internet economy) 5.6 %
More informationBoundary control : Access Controls: An access control mechanism processes users request for resources in three steps: Identification:
Application control : Boundary control : Access Controls: These controls restrict use of computer system resources to authorized users, limit the actions authorized users can taker with these resources,
More informationCourse Book Academic Year
Nawroz University College of Computer and IT Department of Computer Science Stage: Third Course Book Academic Year 2015-2016 Subject Advanced Database No. of Hours No. of Units 6 Distribution of Marks
More informationDATA INTEGRATION AND ANALYSIS IN PRECISION DAIRY FARMING: A SEMANTIC DATA WAREHOUSING APPROACH
F o r s c h u n g f ü r d e n l ä n d l i c h e n R a u m J o s e p h i n u m R e s e a r c h DATA INTEGRATION AND ANALYSIS IN PRECISION DAIRY FARMING: A SEMANTIC DATA WAREHOUSING APPROACH Martin Wischenbart
More informationProtection of the National Cultural Heritage in Austria
Protection of the National Cultural Heritage in Austria Mag. Protection notice / Copyright notice The Domesday Book Domesday Book A survey of England completed 1086 and still readable National Archives
More informationDas Fraunhofer. Fraunhofer MOEZ 1 Fraunhofer MOEZ
Das Fraunhofer 1 Enhancing Ukraine`s Competitiveness in RI on the way to the Association to Horizon 2020-2nd Stakeholders Forum of BILAT-UKR*AINA Technology Transfer: Framework Conditions And Good Practices
More informationSurvey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationSangam: A Framework for Modeling Heterogeneous Database Transformations
Sangam: A Framework for Modeling Heterogeneous Database Transformations Kajal T. Claypool University of Massachusetts-Lowell Lowell, MA Email: kajal@cs.uml.edu Elke A. Rundensteiner Worcester Polytechnic
More informationExecutive Summary SOLE SOURCE JUSTIFICATION. Microsoft Integration
Executive Summary Commvault Simpana software delivers the unparalleled advantages and benefits of a truly holistic approach to data management. It is one product that contains individually licensable modules
More informationInformation Technology Document Schema Definition Languages (DSDL) Part 1: Overview
ISO/IEC JTC 1/SC 34 Date: 2008-09-17 ISO/IEC FCD 19757-1 ISO/IEC JTC 1/SC 34/WG 1 Secretariat: Japanese Industrial Standards Committee Information Technology Document Schema Definition Languages (DSDL)
More informationAdvanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours
Advanced Solutions of Microsoft SharePoint Server 2013 Course 20332 36 Contact Hours Course Overview This course examines how to plan, configure, and manage a Microsoft SharePoint Server 2013 environment.
More informationSDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data
SDD: A Novel Technique for Enhancing Cloud Security with Self Destructing Data Kishore K, Ramchand V M.Tech Student, Dept. of CSE, The Oxford College Of Engineering, Bangalore, India Associate Professor,
More informationQM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS
QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives
More informationAdvanced Solutions of Microsoft SharePoint 2013
Course 20332A :Advanced Solutions of Microsoft SharePoint 2013 Page 1 of 9 Advanced Solutions of Microsoft SharePoint 2013 Course 20332A: 4 days; Instructor-Led About the Course This four-day course examines
More informationIdentify and cluster touchpoints in several ways Identify risks and initiatives associated to touchpoints
ARIS ARIS 9.8 SR4 OVERVIEW ARIS Architect / ARIS Designer Use CXM specific queries and spreadsheets to retrieve information and receive a graphical overview of the journey or its related objects. CXM queries
More informationJAVA PERFORMANCE. PR SW2 S18 Dr. Prähofer DI Leopoldseder
JAVA PERFORMANCE PR SW2 S18 Dr. Prähofer DI Leopoldseder OUTLINE 1. What is performance? 1. Benchmarking 2. What is Java performance? 1. Interpreter vs JIT 3. Tools to measure performance 4. Memory Performance
More informationBridging Versioning and Adaptive Hypermedia in the Dynamic Web
Bridging Versioning and Adaptive Hypermedia in the Dynamic Web Evgeny Knutov, Mykola Pechenizkiy, Paul De Bra Eindhoven University of Technology, Department of Computer Science PO Box 513, NL 5600 MB Eindhoven,
More informationTHIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA
THIRD PARTY AUDITING FOR SECURE DATA STORAGE IN CLOUD THROUGH DIGITAL SIGNATURE USING RSA ABSTRACT K.Govinda #1, V.Gurunathaprasad #2, H.Sathishkumar #3 Cloud computing is the way of providing computing
More informationSecure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM
Secure Role-Based Access Control on Encrypted Data in Cloud Storage using ARM Rohini Vidhate, V. D. Shinde Abstract With the rapid developments occurring in cloud computing and services, there has been
More informationSecurity Specification for Cloud Data Services. Enterprise Cloud Customer Council Technical Working Group
Security Specification for Cloud Data Services Enterprise Cloud Customer Council Technical Working Group October 2017 Preamble Overview The Enterprise Cloud Customer Council (E3C) is a group of enterprise
More informationProject CAPKOM: Fostering Web Literacy of People with Cognitive Disabilities
114 Project CAPKOM: Fostering Web Literacy of People with Cognitive Disabilities Andrea Petz and Nicoleta Radu andrea.petz@jku.at, nicoleta.radu@jku.at Johannes Kepler University Linz, Institute Integriert
More informationWeb Services Security. Dr. Ingo Melzer, Prof. Mario Jeckle
Web Services Security Dr. Ingo Melzer, Prof. Mario Jeckle What is a Web Service? Infrastructure Web Service I. Melzer -- Web Services Security 2 What is a Web Service? Directory Description UDDI/WSIL WSDL
More informationDB Basic Concepts. Rab Nawaz Jadoon DCS. Assistant Professor. Department of Computer Science. COMSATS IIT, Abbottabad Pakistan
DB Basic Concepts DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS IIT, Abbottabad Pakistan Management Information Systems (MIS) Database Management System (DBMS)
More informationGenerating A Digital Signature Based On New Cryptographic Scheme For User Authentication And Security
Indian Journal of Science and Technology, Vol 7(S6), 1 5, October 2014 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Generating A Digital Signature Based On New Cryptographic Scheme For User Authentication
More informationONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017
ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM 12 July 2017 Time Isolated Aggregated Massively Connected Cloud / Data Centres Rich Devices / Gateways Constrained Devices The architecture will need to achieve
More informationRaunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering Amravati
Analytical Representation on Secure Mining in Horizontally Distributed Database Raunak Rathi 1, Prof. A.V.Deorankar 2 1,2 Department of Computer Science and Engineering, Government College of Engineering
More informationBusiness to Consumer Markets on the Semantic Web
Workshop on Metadata for Security (W-MS) International Federated Conferences (OTM '03) Business to Consumer Markets on the Semantic Web Prof. Dr.-Ing. Robert Tolksdorf, Dipl.-Kfm. Christian Bizer Freie
More informationCASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)
CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic
More informationSECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS
International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6
More informationProf. Christos Xenakis
From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering
More informationContent Management for the Defense Intelligence Enterprise
Gilbane Beacon Guidance on Content Strategies, Practices and Technologies Content Management for the Defense Intelligence Enterprise How XML and the Digital Production Process Transform Information Sharing
More informationWhat s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013
What s New? SAP HANA SPS 07 Administration & Monitoring (Delta from SPS 06 to SPS 07) SAP HANA Product Management November, 2013 Content This presentation provides an overview of the changes regarding
More informationSecure coding practices
Secure coding practices www.infosys.com/finacle Universal Banking Solution Systems Integration Consulting Business Process Outsourcing Secure coding practices Writing good code is an art but equally important
More informationAdvanced Solutions of Microsoft SharePoint Server 2013
Course Duration: 4 Days + 1 day Self Study Course Pre-requisites: Before attending this course, students must have: Completed Course 20331: Core Solutions of Microsoft SharePoint Server 2013, successful
More information