Database Connectivity

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 9555 Experts worldwide ranked by ideXlab platform

Narinder Kumar Sharma - One of the best experts on this subject based on the ideXlab platform.

  • Remote Database Connectivity
    International Journal of Research, 2014
    Co-Authors: Narinder Kumar Sharma
    Abstract:

    Much of the programming done today requires data access. With large amounts of data being maintained in Databases, access mechanisms that allow manipulation of this data are vital. Visual Basic is a popular programming package because of its user-friendly interface and data access features. Two popular data access mechanisms are data bound controls with data access objects, and remote data controls with remote data objects. The main difference between these methods are that data bound controls are usually used to connect to desktop Databases, and remote data objects are used to connect to client/server data (for client Database manipulation of a remote Database).

Gou Jiyuan - One of the best experts on this subject based on the ideXlab platform.

Jerrod C. Frost - One of the best experts on this subject based on the ideXlab platform.

  • ICDEM - Using MySQL and JDBC in new teaching methods for undergraduate Database systems courses
    Lecture Notes in Computer Science, 2012
    Co-Authors: Anil L. Pereira, Mehdi Raoufi, Jerrod C. Frost
    Abstract:

    This paper describes how the open source Database software MySQL and Java Database Connectivity (JDBC) are used in new teaching methods for undergraduate Database Systems courses. Traditionally, the content of these courses include Database design and an implementation using SQL. The wide spread use of Database in ecommerce demands a different approach for teaching students, who, are not only interested in Database, but also in programming Database in Web application development. We have complementarily blended SQL and Java to enhance students' learning and understanding of Database Systems and its programming. The lab component uses MySQL which can be installed on different operating systems. Java is used for building GUIs and transaction processing in the term project. Database Connectivity and transaction processing via embedding SQL statements in Java are achieved using JDBC and MySQL Connector/J driver. Course components are evaluated based on feedback from students who completed the course.

Aguiar, Rui L. - One of the best experts on this subject based on the ideXlab platform.

  • SPDC: Secure Proxied Database Connectivity
    SCITEPRESS, 1
    Co-Authors: Regateiro, Diogo Domingues, Pereira, Óscar Mortágua, Aguiar, Rui L.
    Abstract:

    In the business world, Database applications are a predominant tool where data is generally the most important asset of a company. Companies use Database applications to access, explore and modify their data in order to provide a wide variety of services. When these applications run in semi-public locations and connect directly to the Database, such as a reception area of a company or are connected to the internet, they can become the target of attacks by malicious users and have the hard-coded Database credentials stolen. To prevent unauthorized access to a Database, solutions such as virtual private networks (VPNs) are used. However, VPNs can be bypassed using internal attacks, and the stolen credentials used to gain access to the Database. In this paper the Secure Proxied Database Connectivity (SPDC) is proposed, which is a new methodology to enhance the protection of the Database access. It pushes the credentials to a proxy server and separates the information required to access the Database between a proxy server and an authentication server. This solution is compared to a VPN using various attack scenarios and we show, with a proof-of concept, that this proposal can also be completely transparent to the user

  • BTA: architecture for reusable business tier components with access control
    Springer Berlin Heidelberg, 1
    Co-Authors: Pereira, Óscar Narciso Mortágua, Aguiar, Rui L., Santos, Maribel Yasmina
    Abstract:

    Currently, business tiers for relational Database applications are mostly built from software artifacts, among which Java Persistent API, Java Database Connectivity and LINQ are three representatives. Those software artifacts were mostly devised to address the impedance mismatch between the oobject-oriented and the relational paradigms. Key aspects as reusable business tier components and access control to data residing inside relational Databases have not been addressed. To tackle the two aspects, this research proposes an architecture, referred to here as Business Tier Architecture (BTA), to develop reusable business tier components which enforce access control policies to data residing inside relational Databases management systems. Besides BTA, this paper also presents a proof of concept based on Java and on Java Database Connectivity (JDBC)

Rui L. Aguiar - One of the best experts on this subject based on the ideXlab platform.

  • DATA - SPDC: Secure Proxied Database Connectivity.
    Proceedings of the 6th International Conference on Data Science Technology and Applications, 2017
    Co-Authors: Diogo Domingues Regateiro, Óscar Mortágua Pereira, Rui L. Aguiar
    Abstract:

    In the business world, Database applications are a predominant tool where data is generally the most important asset of a company. Companies use Database applications to access, explore and modify their data in order to provide a wide variety of services. When these applications run in semi-public locations and connect directly to the Database, such as a reception area of a company or are connected to the internet, they can become the target of attacks by malicious users and have the hard-coded Database credentials stolen. To prevent unauthorized access to a Database, solutions such as virtual private networks (VPNs) are used. However, VPNs can be bypassed using internal attacks, and the stolen credentials used to gain access to the Database. In this paper the Secure Proxied Database Connectivity (SPDC) is proposed, which is a new methodology to enhance the protection of the Database access. It pushes the credentials to a proxy server and separates the information required to access the Database between a proxy server and an authentication server. This solution is compared to a VPN using various attack scenarios and we show, with a proof-of concept, that this proposal can also be completely transparent to the user

  • ICCSA (3) - BTA: architecture for reusable business tier components with access control
    Computational Science and Its Applications – ICCSA 2012, 2012
    Co-Authors: Óscar Mortágua Pereira, Rui L. Aguiar, Maribel Yasmina Santos
    Abstract:

    Currently, business tiers for relational Database applications are mostly built from software artifacts, among which Java Persistent API, Java Database Connectivity and LINQ are three representatives. Those software artifacts were mostly devised to address the impedance mismatch between the object-oriented and the relational paradigms. Key aspects as reusable business tier components and access control to data residing inside relational Databases have not been addressed. To tackle the two aspects, this research proposes an architecture, referred to here as Business Tier Architecture (BTA), to develop reusable business tier components which enforce access control policies to data residing inside relational Databases management systems. Besides BTA, this paper also presents a proof of concept based on Java and on Java Database Connectivity (JDBC).