Database access from the Web
Dean, Andrew S.
Wu, C. Thomas
Fargues, Monique P.
MetadataShow full item record
Determining the best method for granting World Wide Web (Web) users access to remote relational databases is difficult. Choosing the best supporting Web/database link method for implementation requires an in-depth understanding of the methods available and the relationship between the link designer's goals and the underlying issues of Performance and Functionality, Cost, Development Time and Ease, Serviceability, Flexibility and Openness, Security, State and Session. This thesis examined existing methods for enabling Web-client access to remote regional databases and found that most fall within the general categories of Common Gateway Interface scripts, Server Application Programming Interfaces, Web-enabled Database Management Systems exporting query results in Hypertext Markup Language, and independent client-based processes such as Java applets. To determine the best database access category we compared each one to the underlying link issues and conducted a case study for the IEEE Signal Processing Society. The results of this thesis are: (1) a taxonomy of existing Web.
Showing items related by title, author, creator and subject.
Valdez, Michael T. (Monterey, CA; Naval Postgraduate School, 2022-06);U.S. strategy to counter China in the Indo-Pacific requires military access to key defense partners in the region. Access in the region varies widely, and creates challenges for U.S. naval forces to conduct expeditionary ...
Possible Geographical Barriers to Trauma Center Access for Vulnerable Patients in the United States: An Analysis of Urban and Rural Communitie Hsia, Renee; Shen, Yu-Chu (American Medical Association, 2011-01);Objective—To study whether traditionally vulnerable populations have worse geographic access to trauma centers. Design—A cross-sectional analysis using data from the American Hospital Association Annual Survey from 2005 ...
LaFrenier, Kevin J. (Monterey, California. Naval Postgraduate School, 2011-09);There are currently no access control methods to permit personnel, such as military members, government agencies, or first-responders, access to restricted resources and applications that are only available when certain ...