• Title/Summary/Keyword: SQL-database

Search Result 428, Processing Time 0.027 seconds

Schema- and Data-driven Discovery of SQL Keys

  • Le, Van Bao Tran;Sebastian, Link;Mozhgan, Memari
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.3
    • /
    • pp.193-206
    • /
    • 2012
  • Keys play a fundamental role in all data models. They allow database systems to uniquely identify data items, and therefore, promote efficient data processing in many applications. Due to this, support is required to discover keys. These include keys that are semantically meaningful for the application domain, or are satisfied by a given database. We study the discovery of keys from SQL tables. We investigate the structural and computational properties of Armstrong tables for sets of SQL keys. Inspections of Armstrong tables enable data engineers to consolidate their understanding of semantically meaningful keys, and to communicate this understanding to other stake-holders. The stake-holders may want to make changes to the tables or provide entirely different tables to communicate their views to the data engineers. For such a purpose, we propose data mining algorithms that discover keys from a given SQL table. We combine the key mining algorithms with Armstrong table computations to generate informative Armstrong tables, that is, key-preserving semantic samples of existing SQL tables. Finally, we define formal measures to assess the distance between sets of SQL keys. The measures can be applied to validate the usefulness of Armstrong tables, and to automate the marking and feedback of non-multiple choice questions in database courses.

Defining and Processing XML View of Relational Data with Publication Functions of SQL/XML (SQL/XML의 출판 함수를 이용한 관계 데이터의 XML 뷰 정의 및 처리)

  • Lee, Sang-Wook;Kim, Jin;Kang, Hyun-Chul
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.245-261
    • /
    • 2009
  • Since XML emerged as a standard for data exchange on the web, it has been widely used for applications like e-Commerce, CRM, and BI. However, it is common that most of business data is stored in relational database systems, and it is expected that business data management would still be centered around the relational database systems. As such, the technique of viewing relational data as XML and processing XML queries against it is required. To meet such a need, in the SQL/XML standard, the functions to publish relational data as XML are provided. In this paper, we propose the techniques of providing an XML view of relational data defined by an SQL/XML statement in DTD(Document Type Definition), and of processing XPath queries against the XML view by translating them into SQL/XML statements, and describe the validation of such techniques through implementation and tests.

  • PDF

Transforming XML DTD to SQL Schema based on JDBC (XML DTD의 JDBC 기반 SQL 스키마로의 변환)

  • 이상태;주경수
    • Journal of Internet Computing and Services
    • /
    • v.3 no.1
    • /
    • pp.29-40
    • /
    • 2002
  • The information exchange on the using of XML such as B2B electronic is common. So the efficient method to store XML message in database is needed. Because the ORDBMS is extended to ORDBMS for supporting multimedia application such as Oracle8i, 9i, Informix and SQL2000 server, SQL2, the standard RDB is extended to SQL3 for ORDB, And the XML application based on java such as J2EE is extended. Therefor it is necessary for the efficient connection methods based on JDBC between XML application and database system. In this paper, the methodology a transformation XML DTD to SQL3 schema is proposed. For the transformation, first the methods of transformation XML DTD to object model in UML class diagram are proposed. And then the methods of mapping transferred object models to SQL3 schema are proposed. This approach for transform::1lion XML. DTD to SQL3 schema such as Oracle8i, 9i, Informix and SQL2000 server based on java is proposed in this paper, can be used in database design to build XML applications based on ORDB.

  • PDF

A Study of Step-by-step Countermeasures Model through Analysis of SQL Injection Attacks Code (공격코드 사례분석을 기반으로 한 SQL Injection에 대한 단계적 대응모델 연구)

  • Kim, Jeom-Goo;Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.17-25
    • /
    • 2012
  • SQL Injection techniques disclosed web hacking years passed, but these are classified the most dangerous attac ks. Recent web programming data for efficient storage and retrieval using a DBMS is essential. Mainly PHP, JSP, A SP, and scripting language used to interact with the DBMS. In this web environments application does not validate the client's invalid entry may cause abnormal SQL query. These unusual queries to bypass user authentication or da ta that is stored in the database can be exposed. SQL Injection vulnerability environment, an attacker can pass the web-based authentication using username and password and data stored in the database. Measures against SQL Inj ection on has been announced as a number of methods. But if you rely on any one method of many security hole ca n occur. The proposal of four levels leverage is composed with the source code, operational phases, database, server management side and the user input validation. This is a way to apply the measures in terms of why the accident preventive steps for creating a phased step-by-step response nodel, through the process of management measures, if applied, there is the possibility of SQL Injection attacks can be.

Research on Countermeasure of SQL Injection Attack (SQL Injection 공격을 효율적으로 방어하는 대응책 연구)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.10
    • /
    • pp.21-26
    • /
    • 2019
  • At present, it is indispensable to utilize data as an information society. Therefore, the database is used to manage large amounts of data. In real life, most of the data in a database is the personal information of a group of members. Because personal information is sensitive data, the role of the database administrator who manages personal information is important. However, there is a growing number of attacks on databases to use this personal information in a malicious way. SQL Injection is one of the most known and old hacking techniques. SQL Injection attacks are known as an easy technique, but countermeasures are easy, but a lot of efforts are made to avoid SQL attacks on web pages that require a lot of logins, but some sites are still vulnerable to SQL attacks. Therefore, this study suggests effective defense measures through analysis of SQL hacking technology cases and contributes to preventing web hacking and providing a secure information communication environment.

SQL Tuning Techniques to Improve the Performance of Integrated Information Systems (정보시스템 성능 향상을 위한 SQL 튜닝 기법)

  • Kim, Yang-Jin;Joo, Bok-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.27-33
    • /
    • 2010
  • One of the most critical success factor in introducing and operating an integrated information system is the performance management. In this study, we propose some SQL tuning techniques, applicable to optimize the performance of relational database systems. We showed effectiveness of the techniques by applying to a database system of a medium scale company.

A Study on Web SQL Database technology using Ubiquitous Fire Prevention Monitoring System (Web SQL Database 기술을 이용한 유비쿼터스 화재 방재 모니터링 시스템 연구)

  • Kang, Seung-Gu;Kim, Young-Hyuk;Lim, Il-Kwon;Gui, Li Qi;Lee, Jun-Woo;Kim, Myung-Jin;Lee, Jae-Kwang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1268-1271
    • /
    • 2011
  • 유비쿼터스 화재 방재 시스템은 온도, 습도, CO, CO2 등의 다양한 센서로부터 얻는 값을 이용해 화재를 판별하여 관리자에게 전달하고 시스템 설정 값에 따라 소화설비를 동작시키는 지능형 화재 탐지 시스템이다. 기존의 시스템은 센서로부터 얻는 값을 서버의 데이터베이스에 저장하였으며, 모니터링 시스템은 모든 정보를 MS-SQL, MySql, Oracle 등의 서버측의 데이터베이스에 의존하였다. 앞선 방법들을 분석하고, 서버의 부하를 줄이기 위하여 HTML5부터 지원하는 Web SQL Database를 이용하는 방법을 제안한다.

Digital Forensic Investigation of MongoDB (MongoDB에 대한 디지털 포렌식 조사 기법 연구)

  • Yoon, Jong-Seong;Jung, Doo-Won;Kang, Chul-Hoon;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.123-134
    • /
    • 2014
  • As the data gets bigger recently, the demand for relational database management system (RDBMS) and NoSQL DBMS to process big data has been increased consistently. The digital forensic investigation method for RDBMS has been studied actively, but that for NoSQL DBMS, which is popularly used nowadays, has almost no research. This paper proposes the digital forensic investigation process and method for MongoDB, the most popularly used among NoSQL DBMS.

Comparative study on NoSQL for Processing a Big Data (빅데이터 처리에 관한 NoSQL 비교연구)

  • Jang, Rae-Young;Bae, Jung-Min;Jung, Sung-Jae;Soh, Woo-Young;Sung, Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.351-354
    • /
    • 2014
  • The emergence of big data has brought many changes to the database management environment. the each amount of big data will increase, but each data size is smaller and simpler. This feature was required to a new data processing techniques. Accordingly, A variety database technology was provided to Specializing in big data processing. It is defined as NoSQL. NoSQL is how to use each different, according to the data characteristics. It is difficult to define one. In this paper, Classified according to the characteristics of each type of NoSQL Appropriate NoSQL is proposed.

  • PDF