Abstract:
The present invention is generally directed to a system, method and article of manufacture for accessing data represented abstractly through an abstraction model (512). In one embodiment, a data abstraction model (512) provides a logical view of an underlying data repository (518) that is independent of the particular manner of data representation. For a given abstract query (506) the abstract query (506) is augmented with additional computer-selected result fields (520). In addition, the data abstraction model (512) is also augmented with fields (528) corresponding to the result fields (514) of the previously executed abstract query.
Abstract:
A method, apparatus and article of manufacture provide a user interface allowing user selection and arrangement of result fields selected, in one embodiment, from a logical model. In one embodiment, the user interface is a graphical user interface (1400) and comprises input cells for user-selected logical result fields (1402). The cells are arranged to define a geometric relationship between logical result fields (1402) which dictates the combinatorial statement type by which the logical result fields (1402) in the cells are related in a query.
Abstract:
A system, method and article of manufacture are provided for securing data. Security rules (162) are defined for fields and/or field values. The security rules (162) specify one or more users to which the rules (162) apply. A query (202) is examined for content and a determination is made as to whether security action is required based on the content (e.g., a field and/or a value of the field) and user-specific data.
Abstract:
System, method and article of manufacture for securing data. Queries are analyzed to detect security violation efforts. In one embodiment, algorithms for detecting selected security violation patterns are implemented. Generally, patterns may be detected prior to execution of a query and following execution of a query. Illustrative patterns include union query analysis, pare down analysis, non-overlapping and others.
Abstract:
Verfahren zum Verwalten von Funktionsübernahme-Operationen in einem Cluster von Computern (120) in einer medizinischen Cloud-Bild- und Datenverarbeitungsumgebung (100), wobei das Verfahren aufweist:Identifizieren (502), durch ein Funktionsübernahme-Haltemodul (236), eines fehlgeschlagenen Zugriffs auf einen Datenspeicher in dem Cluster von Computern;Verhindern (512) des Ausführens sämtlicher an den Datenspeicher gerichteten Leseoperationen, die empfangen wurden, nachdem der fehlgeschlagene Zugriff auf einen Datenspeicher identifiziert wurde; undAusführen (514) sämtlicher an den Datenspeicher gerichteten Schreiboperationen, die empfangen wurden, nachdem der fehlgeschlagene Zugriff auf einen Datenspeicher identifiziert wurde, einschließlich des Schreibens von Daten in einen Cache-Speicher (237);Identifizieren (516), dass eine Funktionsübernahme auf einen alternativen Datenspeicher vollständig ist;Kopieren (518), von einem Cache-Speicher auf den alternativen Datenspeicher, der Daten, die als Teil der Schreiboperationen in den Cache-Speicher geschrieben wurden; undAusführen (520) gehaltener Leseoperationen, einschließlich des Lesens von Daten von dem alternativen Datenspeicher, wobei sich das Funktionsübernahme-Haltemodul, der Datenspeicher, der alternative Datenspeicher, der Cache-Speicher in einem Computer-Netzwerk (150) befinden, das durch ein DMZ-Netzwerk (152) von einem anderen Netzwerk (154) getrennt ist, aus welchem die Lese- und Schreiboperationen empfangen werden.
Abstract:
A method, system and article of manufacture for processing queries that are executed against a database (156) and, more particularly, for restricting queryable data in a database (156) to a subset of all available data in the database when a query is executed against the database (156). One embodiment comprises providing a logical representation (148) of all the available data defining a plurality of logical fields (208) abstractly describing associate d physical entities of all the available data, receiving an abstract query (20 2) comprising at least one logical field of the plurality of logical fields, retrieving at least one condition (722) defining at least one property commo n to a plurality of physical entities of the queryable data, associating the a t least one condition (722) with the abstract query (202) and, in accordance with the at least one condition (722), restricting the queryable data (732) to the subset of all the available data (730) when executing the abstract query (202).
Abstract:
System, method and article of manufacture for securing data. Queries (202) a re analyzed to detect security violation efforts. In one embodiment, algorithms (151) for detecting selected security violation patterns are implemented. Generally, patterns may be detected prior to execution of a query (202) and following execution of a query (202). Illustrative patterns include union query analysis (340), pare down analysis (342), non-overlapping (338) and others.
Abstract:
A system, method and article of manufacture are provided for securing data. Security rules (162) are defined for fields and/or field values. The securit y rules (162) specify one or more users to which the rules (162) apply. A quer y (202) is examined for content and a determination is made as to whether security action is required based on the content (e.g., a field and/or a val ue of the field) and user-specific data.