摘要:
A system and method is provided for processing XQuery Updates on an Extensible Markup Language (XML) document. The XQuery Updates are processed in three phases. The first phase includes creating a pending update list (PUL) including all update operations to be performed on nodes in a fragment of the Extensible Markup Language (XML) document. The second phase includes sorting the PUL. The third phase includes applying the sorted PUL to each node in the XML fragment during a single traversal of the XML fragment.
摘要:
A method that may include detecting, by a processor of a computing device, a network communication regarding transmission of a file to an external storage provider. The method may include causing encryption of the file to obtain an encrypted file, and associating authorization information with the encrypted file. The authorization information may include one or more restrictions on access to the encrypted file. The method may include transmitting the encrypted file to the external storage provider, and intercepting a request for access to the file. The method may include identifying requestor information regarding a requestor associated with the request, and determining, using the requestor information and a portion of the authorization information, that the requestor is authorized to access the encrypted file. The method may include causing decryption of the encrypted file to obtain the original file, and providing, to the requestor, by the processor, access to the original file.
摘要:
According to exemplary embodiments, a method and system for generating binary Extensible Markup Language (XML) data is provided. The generating includes acquiring an XML data source and generating a first child distance (FCD) token and a next sibling distance (NSD) token of an element node in the XML data source. The generating also includes generating binary XML data of the XML data source by using the FCD token and the NSD token, where the binary XML data includes the FCD token and the NSD token.
摘要:
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment bootable from an external media device. A host computing device loads and boots a common operating system image stored on an external media device. A client agent stored on the external media device and executing in the common operating system image creates an adapted operating system image by copying the operating system of the host computing device, eliminating all unnecessary files and data and storing the adapted operating system image to the external media device. The host computing device provides a secure virtualized environment by booting the adapted operating system image.
摘要:
According to exemplary embodiments, a method and system for generating binary Extensible Markup Language (XML) data is provided. The generating includes acquiring an XML data source and generating a first child distance (FCD) token and a next sibling distance (NSD) token of an element node in the XML data source. The generating also includes generating binary XML data of the XML data source by using the FCD token and the NSD token, where the binary XML data includes the FCD token and the NSD token.
摘要:
Methods and systems for creating a secure virtualization environment on a host device, without modifying the host device, the secure virtualization environment bootable from an external media device. A host computing device loads and boots a common operating system image stored on an external media device. A client agent stored on the external media device and executing in the common operating system image creates an adapted operating system image by copying the operating system of the host computing device, eliminating all unnecessary files and data and storing the adapted operating system image to the external media device. The host computing device provides a secure virtualized environment by booting the adapted operating system image.
摘要:
A method that may include detecting, by a processor of a computing device, a network communication regarding transmission of a file to an external storage provider. The method may include causing encryption of the file to obtain an encrypted file, and associating authorization information with the encrypted file. The authorization information may include one or more restrictions on access to the encrypted file. The method may include transmitting the encrypted file to the external storage provider, and intercepting a request for access to the file. The method may include identifying requestor information regarding a requestor associated with the request, and determining, using the requestor information and a portion of the authorization information, that the requestor is authorized to access the encrypted file. The method may include causing decryption of the encrypted file to obtain the original file, and providing, to the requestor, by the processor, access to the original file.
摘要:
A fault tolerant computer system distributes audit trail files containing audit records, across an arbitrary number of disk volumes. After one audit trail file becomes full, audit records are directed toward a next audit trail file stored on a different disk volume. Storage of newly generated audit rotates through the disk volumes in roundrobin fashion. Full audit trail files are eventually archived and their space becomes available again for renaming and storage of newly generated audit records. The number of audit records available for on-line recovery after a failure is not limited to the storage capacity of any single disk volume. Furthermore, there is no contention for disk access between archiving of full audit trail files and storage of newly generated audit records.