Flexible Update Management in Peer-to-Peer Database Systems

Author(s):  
D.D. Vecchio ◽  
S.H. Son
2014 ◽  
pp. 56-65
Author(s):  
M. B. Al-Mourad ◽  
Rozalina Mohamed ◽  
Yaser M. A. Khalifa

This document presents the required layout of papers to be submitted for publication in the “Computing” International journal. The abstract may not be longer than 150 words. Peer-to-peer (P2P) systems are revival paradigm for information sharing among distributed nodes in the network. A P2P network is a network that relies primarily on the computing power and bandwidth of the participants in the network rather than concentrating it in a relatively low number of servers. P2P software systems like Kazaa and Napster rank amongst the most popular software applications ever. Numerous web businesses and sites have promoted "peer to peer" technology as the future of Internet networking for E-commerce. Multiple views for data are created for mediating between data sources on the Semantic Web. Our goal is to support users’ different needs. This is due to the fact that different users have different needs for joining the P2P community and their requirements may change over time as new information become available. Hence the same information may participate in many different ways in multiple data sources’ mapping efforts. The idea of creating multiple data views has been adopted in federated database systems. However, it is not yet implemented in peer-to-peer systems. This is due to the lack of shared knowledge among peers. Moreover, it is not trivial task to create multiple data views in an unpredictable environment such as P2P. This work investigates the possibility to construct multiple data views in P2P environment. This will be achieved through the development of a tourism application framework. The described framework would benefit small businesses by participating in the P2P network without being forced to use compatible standard indexable-web data-bases provided by large corporations.


PADUA ◽  
2016 ◽  
Vol 11 (1) ◽  
pp. 65-71 ◽  
Author(s):  
Jörg Haslbeck

Zusammenfassung. In der Gesundheitsversorgung von Menschen, die mit chronischen Krankheiten leben, wird soziale Unterstützung durch «peers» immer bedeutsamer, d. h. durch Personen, die aufgrund ähnlicher Krankheits- und Alltagserfahrungen in einer vergleichbaren Lebenssituation sind. Welche Potenziale, Chancen sowie Grenzen hat «peer-to-peer healthcare» im Kontext von Selbstmanagementförderung? Der Beitrag diskutiert dies anhand von Erfahrungen mit dem Stanford Kursprogramm «Gesund und aktiv leben».


1993 ◽  
Vol 32 (04) ◽  
pp. 265-268 ◽  
Author(s):  
D. J. Essin

AbstractLoosely structured documents can capture more relevant information about medical events than is possible using today’s popular databases. In order to realize the full potential of this increased information content, techniques will be required that go beyond the static mapping of stored data into a single, rigid data model. Through intelligent processing, loosely structured documents can become a rich source of detailed data about actual events that can support the wide variety of applications needed to run a health-care organization, document medical care or conduct research. Abstraction and indirection are the means by which dynamic data models and intelligent processing are introduced into database systems. A system designed around loosely structured documents can evolve gracefully while preserving the integrity of the stored data. The ability to identify and locate the information contained within documents offers new opportunities to exchange data that can replace more rigid standards of data interchange.


1979 ◽  
Vol 18 (04) ◽  
pp. 214-222
Author(s):  
K. Sauter

The problems encountered in achieving data security within computer-supported information systems increased with the development of modern computer systems. The threats are manifold and have to be met by an appropriate set of hardware precautions, organizational procedures and software measures which are the topic of this paper. Design principles and software construction rules are treated first, since the security power of a system is considerably determined by its proper design. A number of software techniques presented may support security mechanisms ranging from user identification and authentication to access control, auditing and threat monitoring. Encryption is a powerful tool for protecting data during physical storage and transmission as well.Since an increasing number of health information systems with information-integrating functions are database-supported, the main issues and terms of database systems and their specific security aspects are summarized in the appendix.


Sign in / Sign up

Export Citation Format

Share Document