Access Database

In subject area: Computer Science

An 'Access Database' refers to the tier in a system that handles interactions between the business logic code and the database, performing I/O and persistence operations using technologies like JDBC.

AI generated definition based on: Information Systems Transformation, 2010

How useful is this definition?

Add to Mendeley

Chapters and Articles

You might find these chapters and articles relevant to this topic.

2010, Information Systems TransformationPhilip H. Newcomb, Robert Couch

Application Database Access

Figure 12.4 depicts the system and database access logic. The database access tier sits between the business logic code and the database. It is written in Java using JDBC and performs I/O and related persistence operations of the original application.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9780123749130000123

Sharing an Access database

Sharing an Access database with other staff can be done several ways.

1.

Put the database on a shared drive and map staff computers to the drive. Only one staff member can use the database at a time.

2.

Upsize (to make a database shareable through hardware and/or software enhancements) all database objects from an Access database to an Access project, creating a client/server application. Additional application changes and modification to code and complex queries will be needed.

3.

Upsize only data or data definitions from an Access database to a SQL Server database.

4.

Create an Access database front-end to a SQL Server database backend, creating a front-end/back-end application. Little modification is needed since the code is still using the Access database engine (Microsoft, 2011h).

The method of sharing will depend on factors such as the availability of SQL server space and supporting technical resources.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781843346722500093

Database Access

The native database system that comes with IMS is based on a hierarchical model, which preceded the development of relational database systems. The higher performance of the hierarchical model is one of the reasons IMS-based applications are still in production. Today's IMS applications can also use DB2, in addition to or in place of the IMS DB database. The database access runs using the application's thread. A data propagation utility is available that moves data updates from IMS DB to DB2, or vice versa, automatically. Java library support allows IMS DB to invoke stored procedures hosted in DB2. Other tools allow data to be moved between IMS and non-IBM relational databases.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B978155860623400010X

MS Access Database Data Store

If you use a Microsoft Access database as your XenApp data store the default password must be changed. During the installation of the first XenApp server in a new farm that is utilizing an Access database as the data store, a database is created with the default username of “citrix” and the default password of “citrix.” The credentials should be changed by using the dsmaint config command. Additionally, NTFS permissions should be set to prevent unauthorized user access and modification to the database.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781597492812000056

Access

The Microsoft database product Access is widely available in the Microsoft Office Suite. Access stores data in tables, similar to spreadsheets; each row is a record, each column is a field. One may want to think ahead and change the default column heading in, say a COUNTER Journal 1 table, to include the year, such as 2011_YTD_Total. In this way, where each year’s COUNTER report is stored in the table, and more than one year is queried, it is easy to see what the total is for each year.

Good database design decrees that data is stored only once. This not only saves memory and storage space, but also reduces maintenance and update issues. The idea is for each item in each entity to have a unique field, a key, either a number self-assigned by the database or another unique identifier. ISSNs, ISBNs, record numbers and the like make good keys. Titles do not make good keys because there are differing alphabetization practices (for example, using “The” in a journal title first, or putting it last after a comma) and different systems handle diacritics and foreign languages in various ways.

A well-designed database stores data in its simplest form, having only one kind of information in a field. For example, if an ILS stores multiple ISSNs in the 022 field, these should be separated. Avoid calculations and other manipulations, also. For some system reports that may mean cleaning up the data to separate the ISSN from the journal title or the place of publication from the publisher, depending on the data need. Data clean-up is essential to having a clean, robust database. In fact, probably many clean-up projects will be found while moving data into the database. Inconsistent coding, changing practices and mistakes – all will be revealed. Every clean-up project, while burdensome, leads to better data and best practices. It is worth carrying them out and raises staff awareness for diligence and discipline as they perform their duties. As a librarian’s technical skills increase, clean-up becomes less daunting. It is hoped that staff will embrace new skills, also, and join in the commitment to data quality.

Understanding Access terminology will help with the design of the database. Every table of data will need to have a key assigned, even if it is an auto-number assigned by the database. For queries, tables are joined on common elements like ISSNs or ILS record numbers. This refers to the relationships between entities. The nature of the joins can be adjusted.

Views in Access

Access has several views, as shown in Figure 9.4.

BERJAYA

Figure 9.4. Views available in Microsoft Access, Home tab

© Microsoft Corporation. All rights reserved. Used with permission from Microsoft Corporation.

1.

Design View shows the list of fields in the table and their properties (Figure 9.5).

BERJAYA

Figure 9.5. Access Design View

© Microsoft Corporation. All rights reserved. Used with permission from Microsoft Corporation.

2.

SQL View shows the SQL database code, as shown in Figure 9.6.

BERJAYA

Figure 9.6. Access SQL View for a query from two tables

© Microsoft Corporation. All rights reserved. Used with permission from Microsoft Corporation.

3.

PivotChart View shows a designable chart. Desired fields are dragged and dropped onto the chart. Using the same fictional table in all examples, two discipline areas were chosen, art and biology, and their costs. Figure 9.7 is unfinished but one can see the power of this tool.

BERJAYA

Figure 9.7. Access Pivot Chart View comparing costs for Art and Biology titles

© Microsoft Corporation. All rights reserved. Used with permission from Microsoft Corporation.

4.

PivotTable View, using the same data, shows the table view, automatically summing the amount paid in each discipline (Figure 9.8). Again, one can choose which fields to display, even the values in the fields.

BERJAYA

Figure 9.8. Access Pivot Table View summarizing the amount paid for various print disciplines

© Microsoft Corporation. All rights reserved. Used with permission from Microsoft Corporation.

5.

Datasheet View shows the “spreadsheet” (Figure 9.9).

BERJAYA

Figure 9.9. Access Datasheet View showing electronic journal information

© Microsoft Corporation. All rights reserved. Used with permission from Microsoft Corporation.

Everyone has their own method of working, but many people spend most of their time in Design View while they adjust their work, switching to Datasheet View to check their work and results. Take your time to set up carefully, with a thought for all uses for the data. It is easier not to use a field than to add a field later (Microsoft, 2011b).

Queries are used in Access to review data, extract specific data, delete data or update or change data in the database. Queries can be used to view data, combine data from different tables, make calculations and/or summarize data (Microsoft, 2011e).

Reports in Access allow formatting of query results. Access forms are used to display, edit or enter data into a database. Access forms are for end-users of the database, also for displaying, editing or entering data, making access to data easier and more attractive. Forms allow binding the field to the values in the database, called a control source value. In Access, events are related to designer-defined macros as they are used on forms. For example, an event can move the end-user’s mouse from one input box to the next once a choice is made on a form input box.

Sharing an Access database

Sharing an Access database with other staff can be done several ways.

1.

Put the database on a shared drive and map staff computers to the drive. Only one staff member can use the database at a time.

2.

Upsize (to make a database shareable through hardware and/or software enhancements) all database objects from an Access database to an Access project, creating a client/server application. Additional application changes and modification to code and complex queries will be needed.

3.

Upsize only data or data definitions from an Access database to a SQL Server database.

4.

Create an Access database front-end to a SQL Server database backend, creating a front-end/back-end application. Little modification is needed since the code is still using the Access database engine (Microsoft, 2011h).

The method of sharing will depend on factors such as the availability of SQL server space and supporting technical resources.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781843346722500093

Databases and access

The data used to train a supervised machine learning model for activity prediction is nearly always reused data from past large-scale assays. Access to large internal databases is an advantage for those affiliated with major pharmaceutical companies and their collaborators, but there are several publicly available or pay-to-access databases which offer data on the scale needed for machine learning. Some of the most widely used are as follows:

(1)

ChEMBL53—A manually curated (and so high-quality) public database of bioactivity data, with data on 1.9 m compounds and 12,000 targets from 1.1 M assays at the time of writing.

(2)

GOSTAR (Global Online Structure Activity Relationship Database)54—Another manually curated SAR database, larger still, but pay-to-access: check whether your organization is a client. 7.8 m compounds, 9000 targets, 8.7 m assays.

(3)

PubChem BioAssay55—268 m bioactivity measurements on 18,000 targets from 1.1 m assays. Freely available, but not manually curated—so some caution suggested.

Databases such as these are often best accessed through their purpose-built API, which will provide functions for selecting and filtering their contents, or through a custom web-scraping script which programmatically accesses pages.

The data that must be compiled can be thought of as a table with three fields: the compound, the target, and an observed measure of activity. Each of these is discussed in turn in the following sections. While these are the fields used directly in modeling, practitioners are encouraged to retain all available fields, even if just in raw form, during collection and curation if possible: the importance of this additional data may only be realized at a later stage in the project.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9780128200452000064

Data Access APIs

Many data access Application Programming Interfaces (APIs) are used in information access and data integration. The most common protocols include:

Open Database Connectivity (ODBC): standard middleware API used to access databases. ODBC was developed to be database and operating system independent, replacing database-specific APIs.

Java Database Connectivity (JDBC): data access API used by Java programming languages.

XML for Analysis (XML/A): industry standards for accessing analytical data sources such as OLAP and data mining. It is based on industry-standard Extensible Markup Language (XML), SOAP, and HTTP. It can execute several query languages such as Multidimensional eXpressions (MDX), SQL, Data Analysis eXpressions (DAX), and Data Mining eXtensions (DMX).

XQuery: query language used to extract and transform data from XML data sources and Simple Object Access Protocol (SOAP) and Representational State Transfer (REST) web services. There is a variety of structured and unstructured data sources that can be viewed as XML.

Native database or data APIs: these APIs access specific data or database sources whose providers may feel these APIs provide better functionality than industry standard APIs, or that they cannot conform to those standards.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9780124114616000071
2010, Information Systems TransformationMark Kramer, Philip H. Newcomb

Application Database Access

The VAX flat file database implementation is replaced by a modern relational database system. The transformed EOSS business logic accesses this database through a Data Access API which uses JDBC and SQL to interface with the database. During normal operation, the application logic might open an indexed file using a certain channel and perform I/O operations on it.

To open a new file, it calls an open_File() API function with the channel number, file name, file access mode, associated record buffer, etc. The data access API takes this information and creates a “File” object and associates it with a database table with the same name. Depending on the specified open mode and the existence of the database table, it can be created, appended, or truncated at this point. Other file behaviors are also replicated by the file object. Upon a successful “open,” the API uses a Java map language construct to associate the channel number to the file object so it can be referred to later by the channel number.

To write a record to a file, the application prepares the record buffer and invokes the file object .put() method to transfer data from the record buffer to a row in the database table. The opposite occurs when reading from a file using the .get() method. Other file operations such as delete and insert are handled similarly by other API methods using JDBC and SQL. Both sequential and indexed data files are stored in the database and treated in a similar manner with the exception that all operations are not valid for all file types. Figure 10.7 diagrams the application database access.

BERJAYA

Figure 10.7. Application database access.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B978012374913000010X

SQL and Oracle

Along with e-mail, databases are one of the most crucial network-based services an organization will come to rely on. Beyond the standard server attributes of name, IP address, and so on, you should include a number of additional pieces of information when diagramming and documenting SQL Server, the most obvious of which are instances and databases. As illustrated in Figure 5.5, a single physical server may have multiple instances, or copies of the SQL Server database engine, running. Each instance is unrelated the another instance, allowing two copies of a database called APPDATA to exist, one in the DEVELOPMENT instance and one in the TESTING instance.

BERJAYA

Figure 5.5. One SQL Server with Two Instances of the Engine

Each instance of the SQL Server engine maintains discrete listings of user accounts granted permission to log on to the server to access databases, and permission listings for each database as to which users have been granted which roles, and consequently which permissions. It is also possible to specify which mechanisms are open to clients to access the engine—TCP/IP access to port 1433, and named pipes access. As such, it is useful to document which mechanisms are in use.

A variety of third-party tools and utilities are available to assist with the complete documentation of a SQL server, covering everything from database schemas to stored procedures to permissions. The key considerations for this chapter are “where are the SQL servers?” and “who may access them?” Visio 2007 Professional and Visio 2007 for Enterprise Architects include the ability to connect to a preexisting SQL server and extract configuration information about a database to create a model of it, but this information does not include security information such as logins or permissions.

As with the SQL servers on the network, Oracle servers offer up a vital resource to an organization in the form of databases, so documentation of where these servers are and who may access them is very useful to have.

Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781597494182000053
2013, Logging and Log ManagementAnton Chuvakin, ... Chris Phillips

Resource Access Reports

These reports identify various system, application, and database resource access patterns across the organization and can be used for both activity audit, trending, and incident detection.

Why They Are Important

Tracking resource access can be used to reveal insider abuse and even fraud. They are valuable during incident response for determining which resources the attacker has accessed and possibly corrupted or modified (see section Change Reports). In addition, resource access can be used for purposes outside of security, such as capacity planning and other purposes.

Specifics Reports

Key reports in this category are:

Access to resources on critical systems after office hours / “off” hours: similar to the above “off” of network access and Logins, this report can be used to track access and activities on critical and regulated system during unusual times.

Top internal users blocked by proxy from accessing prohibited sites, malware sources, etc.: this versatile Web access report can be used for our multiple purposes from tracking compromised systems to the data leakage tracking to improved productivity.

File, network share, or resource access (success, failure): this report can only be useful if run for specific audited resources; enabling logging of file access (Windows) and system calls (Unix) will always lead to data overflow.

Top database users: to be useful for security activity tracking it must exclude known application access to the database; ideally, a production database should have no direct access from users or developers.

Summary of query types: similarly, excluding known application queries have turned this report into anomaly detection tool that show anomalous database access.

All privileged database user access: as with servers and application, all privileged user activities should be recorded and analyzed periodically.

All users executing INSERT, DELETE database commands: in addition to tracking application and user access, it makes sense to separately track more damaging commands that can destroy data; excluding known application queries is a useful practice here.

All users executing CREATE, GRANT, schema changes on a database: in addition to tracking application and user access, it makes sense to separately track more damaging commands that can destroy data and change the database instance itself.

Summary of database backups: backups present a clean way to extract massive quantities of data from a database and thus commit data theft; this report will allow you to review which are the old database backups and catch those who performed without authorization.

Top internal Email addresses sending attachments to outside: across many email access reports, this stands out in the it’s less a teller key and usefulness for both detecting and investigating insider abuse and data theft.

All Emailed attachment content types, sizes, names: similar to the above report, this can be used to track information leakage as well as detect users emailing potentially sensitive information.

All internal systems sending mail excluding known mail servers: a basic way to find systems infected with spam-sending bots across your environment.

Log access summary: logging and then reviewing access to logs is prescribed by regulations; this basic report should allow you to exclude your own viewing of log data.

Who Can Use These Reports

These reports have universal applicability, depending on scope of systems covered. A chief security officer (CSO) may review resource access summaries across the entire organization, security analyst may use these reports during daily log review, and incident responders may run them while investigating an incident. Resource owners can use these reports to plan capacity and make other business decisions.

Example

Table 12.4 shows a report on all file access across multiple servers.

Table 12.4. File Access Across Multiple Servers

DateServerUserNameFile NameAccess TypeStatusCount
1/11/11Win1antonExpenses.xlsxReadSuccess1
1/12/11Win2antonRoadmap.pptReadSuccess1
1/13/11NFSantonBlank.docxWriteFailure37
Read full chapter
URL: https://www.sciencedirect.com/science/article/pii/B9781597496353000129