CN113505126A - Information management security visualization method and system based on domestic database - Google Patents

Information management security visualization method and system based on domestic database Download PDF

Info

Publication number
CN113505126A
CN113505126A CN202110679142.5A CN202110679142A CN113505126A CN 113505126 A CN113505126 A CN 113505126A CN 202110679142 A CN202110679142 A CN 202110679142A CN 113505126 A CN113505126 A CN 113505126A
Authority
CN
China
Prior art keywords
database
domestic
business object
visualization
information management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110679142.5A
Other languages
Chinese (zh)
Inventor
杜萍
李焱
邵子龙
张逸飞
郭书宇
任心瑜
王硕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Normal University
Original Assignee
Shandong Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Normal University filed Critical Shandong Normal University
Priority to CN202110679142.5A priority Critical patent/CN113505126A/en
Publication of CN113505126A publication Critical patent/CN113505126A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/26Visual data mining; Browsing structured data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases

Abstract

The invention belongs to the technical field of database development and provides a method and a system for visualizing information management security based on a domestic database. The method comprises the steps that a normal business object is adopted to inherit a universal abstract object of a set industry so as to ensure the universality of the business object; determining the corresponding relation between the business object attribute and the domestic database field according to the logical structure of the domestic database; and the relevance visualization operation of the domestic database and the business object is realized based on a unified database and object visualization operation model, and the business object is stored in the domestic database in a verification mode for later-stage display of the business object.

Description

Information management security visualization method and system based on domestic database
Technical Field
The invention belongs to the technical field of database development, and particularly relates to a method and a system for visualizing information management security based on a domestic database.
Background
The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art.
In the world, with the rapid development of various electronic government affairs and the gradual emphasis on network information security, the requirement on the product security of corresponding business undertaking companies is higher and higher, and products such as a domestic operating system, a domestic middleware, a domestic database and the like are used in a large part of electronic government affair projects.
The traditional information management database product development generally selects three main flow databases: MSSQL, ORACLE, MYSQL. MSSQL has the defects that strict database architecture design is needed in the face of high concurrency and mass data, otherwise, the performance is problematic; the defects of ORACLE are that the management and maintenance are troublesome, the database connection is slow, and the requirement on hardware is high; the biggest disadvantage of MYSQL is that its security system is mainly complex and not standard, and in addition, it changes only until MYSQLADMIN is called to reread the user rights, and it can only run on windows without any opening.
In addition, most importantly, the system does not support domestic databases, is closed-source and commercial, so that the safety and the stability of the system are uncertain, the development difficulty is invisibly increased, the development efficiency is influenced, the maintenance cost is increased, and the like. Meanwhile, the inventor finds that the current database is incomplete in the Hanhua work, most domestic databases are only in a half visualization stage, and the operation experience of a user is influenced. Most domestic databases are not well operated by non-professionals who are not very often using professional products.
Disclosure of Invention
In order to solve the technical problems in the background art, the invention provides a method and a system for visualizing information management security based on a domestic database.
In order to achieve the purpose, the invention adopts the following technical scheme:
the invention provides a method for visualizing information management security based on a domestic database.
A home-made database-based information management security visualization method comprises the following steps:
a normal business object is adopted to inherit a universal abstract object of a set industry so as to ensure the universality of the business object;
determining the corresponding relation between the business object attribute and the domestic database field according to the logical structure of the domestic database;
and the relevance visualization operation of the domestic database and the business object is realized based on a unified database and object visualization operation model, and the business object is stored in the domestic database in a verification mode for later-stage display of the business object.
The second aspect of the invention provides an information management security visualization system based on a domestic database.
An information management security visualization system based on a domestic database, comprising:
the business object inheritance module is used for adopting a normal business object to inherit a universal abstract object of a set industry so as to ensure the universality of the business object;
the object and database corresponding module is used for determining the corresponding relation between the business object attribute and the domestic database field according to the logical structure of the domestic database;
and the visual association module is used for realizing the association visual operation of the domestic database and the business object based on the unified visual operation model of the database and the object, and storing the business object into the domestic database in a verification mode for later-stage display of the business object.
A third aspect of the invention provides a computer-readable storage medium.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method for visualizing security of information management based on a domestic database as described above.
A fourth aspect of the invention provides a computer apparatus.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps in the method for domestic database based information management security visualization as described above when executing the program.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides an information management security visualization method based on a domestic database, which adopts a normal business object to inherit a general abstract object of a set industry so as to ensure the universality of the business object; determining the corresponding relation between the business object attribute and the domestic database field according to the logical structure of the domestic database; the method is characterized in that the relevance visualization operation of a domestic database and a business object is realized based on a unified database and object visualization operation model, the business object is stored in the domestic database in a verification mode for later display of the business object, the problems that the operation experience of a user is influenced due to incomplete Chinese work of the current database are solved, the information management of the domestic database is realized by adopting a visualization thought method, the domestic database is convenient to understand and easy to operate, the related operation and method of the database are packaged and realized, and the problems that the development difficulty of the current database is high and the cost is high are also solved.
Advantages of additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, are included to provide a further understanding of the invention, and are incorporated in and constitute a part of this specification, illustrate exemplary embodiments of the invention and together with the description serve to explain the invention and not to limit the invention.
FIG. 1 is a flow chart of a method for visualizing information management security based on a domestic database according to an embodiment of the present invention;
FIG. 2 is a system architecture of a business object in an embodiment of the invention;
FIG. 3 is a diagram of student user functionality of a business object in an embodiment of the invention;
FIG. 4 is a diagram of teacher user functionality for a business object in an embodiment of the invention;
FIG. 5 is a diagram of an administrator user function for a business object in an embodiment of the invention.
Detailed Description
The invention is further described with reference to the following figures and examples.
It is to be understood that the following detailed description is exemplary and is intended to provide further explanation of the invention as claimed. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments according to the invention. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, and it should be understood that when the terms "comprises" and/or "comprising" are used in this specification, they specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof, unless the context clearly indicates otherwise.
Example one
As shown in fig. 1, the information management security visualization method based on a domestic database of this embodiment specifically includes the following steps:
step S101: a normal business object is adopted to inherit a universal abstract object of a set industry so as to ensure the universality of the business object.
In the concrete implementation, a normal business object is used for inheriting a universal abstract object in a certain industry, the universality of the business object is ensured, and a batch of various object attributes which have the maximum content probability and are required to be used by the business are abstracted by combining information systems such as related content, a text library, a picture library, a video library and the like to form an abstract object. For example, when a passenger sits in an airplane, the boarding card of the passenger is a business object, different airlines have different boarding cards, but the information in the boarding cards is approximately the same: the information including the name, sex, flight number, gate, etc. of the passenger can be used as the field of the database. Within this industry, all boarding passes contain almost all of this general information, and we can easily inherit this business object.
Step S102: and determining the corresponding relation between the business object attribute and the domestic database field according to the logical structure of the domestic database.
Specifically, a physical structure design scheme of a domestic database is provided according to a logical structure design of the database, a normal business object in the previous step is applied to the database design to set the relation between the database and the business object, so that an operator can know the corresponding relation between object attributes and database fields through the logical structure, and forms, triggers, sequences and the like and a series of common addition, deletion, modification and search sentences built in the database are generated by combining the purpose of the operator.
The method comprises the following steps:
the name of a database table corresponding to the object, the field type, the field name, the default value and the like are determined, and the fields of the database are determined to be indexed, and related foreign keys and the like are determined. This part of the work is the underlying logical implementation of the domestic database.
Specifically, the field type supports INT, LONG, big, DOUBLE, close, FLOAT, VARCHAR, CHAR, etc., and these types are types stored in the database, such as a field corresponding to "age", and it is reasonable that the data type is INT.
Various database statements generated from annotations, including but not limited to:
SELECT, INSERT, UPDATE, DELETE, etc. basic statements and more advanced statements that add constraints.
The SELECT, INSERT, UPDATE, DELETE correspond to query, add, UPDATE, DELETE statements of the database respectively, and are basic statements used in the database, which are collectively referred to as "add, DELETE, modify, and check".
When the database is operated, addition, deletion, modification and check are often performed according to conditions, some keywords are often added to the part of sentences for conditional constraint, and the part of sentences is temporarily called high-level sentences, such as a having (filtering keyword), an order by (sorting keyword), an inner join and the like. This statement is instead the most common and also an important design consideration.
It should be noted that there are sentences and keywords such as create table (create new table) in addition to the above sentences and keywords, and the description is not necessary here.
Step S103: and the relevance visualization operation of the domestic database and the business object is realized based on a unified database and object visualization operation model, and the business object is stored in the domestic database in a verification mode for later-stage display of the business object.
In a specific implementation, the unified database and object visualization operation model is: the object comprises a plurality of general databases and object relation operation methods. The business data operation object inheriting the object can directly call the operation method of the relation between the database and the object.
The business objects are stored in a domestic database in a verification mode, data can be taken out from the database and become object display, and the problems of automatic paging, dynamic table updating and the like are solved.
And operating the unified database and the visual operation model of the object by adopting the database statement.
The template of the course selection system for students is given below, and is to be realized by adopting a domestic database and a pyqt5 technology. The specific implementation steps are as follows:
all business objects inheriting the abstract objects are determined, and the data objects of the example are various items of information of students, such as school numbers, sexes, selected courses and the like.
The system structure of the subject business object is specified, as shown in FIG. 2.
The various user functions of the business object are specified, as shown in fig. 3, a student user function diagram, fig. 4, a teacher user function diagram, and fig. 5, an administrator user function diagram.
And (3) according to the logical structure design of the database, giving a physical structure design scheme of the domestic database, such as table 1, table 2, table 3, table 4, table 5, table 6 and table 7. So that the operator can know the corresponding relation between the object attribute and the database field through the logic structure. On the basis, the strict logic establishment of the database bottom layer is realized in a domestic database.
TABLE 1 college Table (t _ college) -entity Attribute Table
Figure BDA0003121888290000071
Note 1: the college numbers are 2-digit integers, such as "08" and "11".
TABLE 2 Administrator Table (t _ admin) -entity Attribute Table
Figure BDA0003121888290000072
Figure BDA0003121888290000081
Note 2: the work number of the administrator is the user name.
Note 3: the administrator user's password defaults to "123456", the user can modify himself after logging in, as can student and teacher users.
Note 4: 0: male, 1: a woman.
Table 3 student table (t _ student) -entity attribute table
Figure BDA0003121888290000082
Note 5: the student's school number is the login name of the student user.
Note 6: the student password defaults to '123456', and can be modified by students.
And 7, note: 0: male, 1: a woman.
Note 8: and an foreign key associated to the college number (f _ college _ id) field of the college table (t _ college).
Note 9: f _ pic stores the photo image information of the student, and because the photo file is small, bytea (variable binary) is used here as the data type of the photo field for easy access to the image.
TABLE 4 teacher Table (t _ teacher) -entity Attribute Table
Figure BDA0003121888290000083
Figure BDA0003121888290000091
Note 10: the job number of the teacher is the login name of the teacher user.
Note 11: the password of the teacher user is defaulted to '123456', and can be modified by the teacher.
Note 12: 0: male, 1: a woman.
Note 13: the job title can be selected, including: teaching aids, instructors, secondary professors, and others.
Note 14: and an foreign key associated to the college number (f _ college _ id) field of the college table (t _ college).
TABLE 5 curriculum schedule (t _ course) -entity Attribute Table
Figure BDA0003121888290000092
Note 15: the course number is an identification column and is sequentially increased by 1 from 1.
Note 16: in order to facilitate course selection of students, all course names can not be repeated. If two schools or professions with the same name are opened, the school or professions are added with the names of the schools or the professions to show differences, for example: "data structure and algorithm (computer academy)", "data structure and algorithm (math academy)".
Note 17: the course is directly taken as a first course, namely the course can be learned only after 'first course repair'; a foreign key associated to the course number (f _ course _ id) field of the course table (t _ course).
Note 18: the score is 0-10 decimal, and the precision is 1 decimal place.
TABLE 6 teacher course table (t _ teach _ course) -entity Attribute Table
Figure BDA0003121888290000093
Figure BDA0003121888290000101
Note 19: course number and teacher's job number are jointly made into the main key.
Note 20: a foreign key associated to the course number (f _ course _ id) field of the course table (t _ course).
Note 21: a foreign key associated to the course number (f _ course _ id) field of the course table (t _ course).
Note 22: in the form of "ZhouSan 1, 2 and ZhouWu 5-7".
TABLE 7 student curriculum Table (t _ stu _ course) -entity Attribute Table
Figure BDA0003121888290000102
Note 23: course number, teacher's work number and student's study number jointly do the main key.
Note 24: a foreign key associated to the course number (f _ course _ id) field of the course table (t _ course).
Note 25: and a foreign key associated to the job number (f _ teach _ id) field of the teacher table (t _ teacher).
Note 26: and a foreign key associated to the student number (f _ stu _ id) field of the student table (t _ student).
And constructing related database statements according to the types of the local database through mapping relations, and generating general operation statements or general classes by adopting a packaging idea.
For example, a student score is queried, a select statement is corresponded, teacher information is added, and an insert statement is corresponded. And each time different instance objects are operated, only parameters need to be adjusted.
Development of the visualization part was performed using pyqt 5.
a. And generating and laying out the controls in the software by using a built-in qt-designer tool of pyqt.
b. The interface designed using qt-designer is a ui document, which is converted to an editable py document using pyuic. Therefore, the whole code adjustment is carried out on the py file, such as: naming of the canonical class and the object, adjusting parameters of the method, adjusting inherited parent classes, and the like.
c. And setting a layout method of the visualization program. Such as:
the qstapedlayout class (stack layout) in pyqt is applied to achieve the setup of different pages.
stacked _ layout — qstapdlayout (), this code may generate an instance of the stack layout.
Locked _ layout. setcurrentindex (3), which can jump the current page of the software to page 3.
d. Adding a mechanism such as the response of the button, i.e. using qt's signal (signal) and slot setting.
Therefore, after the response page button is clicked, the corresponding page is jumped to.
Such as: and clicking a student page button and then jumping to a student page.
stu_window_buttom.triggered.connect(self.open_stu_window).
Thereby realizing the connection between the windows.
e. And adding the code of the authentication part into the code of the login interface. The essence of identity verification is to find corresponding data from a database, and the "in" keyword of the sql statement can be used.
f. And adding the database statement into the code to realize the butt joint of the interface and the database.
g. And (3) perfecting an integral code, such as password input of a login interface, wherein a user name (job number) can be only a number, and a password can be only a number or a letter, and whether the password is in accordance with the specification or not can be judged by adopting a qt regular expression.
Figure BDA0003121888290000111
Figure BDA0003121888290000121
h. And adding structures such as try-catch and the like to enhance the robustness and safety of the code, and popping up a window to prompt when an exception occurs.
Example two
The embodiment provides an information management security visualization system based on a domestic database, which specifically includes:
the business object inheritance module is used for adopting a normal business object to inherit a universal abstract object of a set industry so as to ensure the universality of the business object;
the object and database corresponding module is used for determining the corresponding relation between the business object attribute and the domestic database field according to the logical structure of the domestic database;
and the visual association module is used for realizing the association visual operation of the domestic database and the business object based on the unified visual operation model of the database and the object, and storing the business object into the domestic database in a verification mode for later-stage display of the business object.
It should be noted that, each module in the information management security visualization system based on the domestic database of the present embodiment corresponds to each step in the information management security visualization method based on the domestic database of the first embodiment one by one, and the specific implementation process is the same, and will not be described here again.
EXAMPLE III
The present embodiment provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the steps in the method for visualizing security of information management based on a domestic database as described above.
Example four
The present embodiment provides a computer device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the steps in the method for visualizing information management security based on a domestic database as described above are implemented.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A home-made database-based information management security visualization method is characterized by comprising the following steps:
a normal business object is adopted to inherit a universal abstract object of a set industry so as to ensure the universality of the business object;
determining the corresponding relation between the business object attribute and the domestic database field according to the logical structure of the domestic database;
and the relevance visualization operation of the domestic database and the business object is realized based on a unified database and object visualization operation model, and the business object is stored in the domestic database in a verification mode for later-stage display of the business object.
2. The information management security visualization method based on the domestic database according to claim 1, wherein the visualization operation model of the unified database and object is: the object comprises a plurality of general databases and object relation operation methods.
3. The information management security visualization method based on a domestic database according to claim 1, wherein a database statement is used to operate the visualization operation model of the unified database and object.
4. A method for domestic database based information management security visualization as claimed in claim 3, wherein said database statements are generated from annotations.
5. The method for visualizing the security of information management based on domestic databases of claim 1, wherein the method for visualizing the security of information management based on domestic databases further comprises:
and constructing a table, a trigger and a sequence in the domestic database according to the corresponding relation between the service object attribute and the domestic database field and by combining a preset purpose.
6. An information management security visualization system based on a domestic database, comprising:
the business object inheritance module is used for adopting a normal business object to inherit a universal abstract object of a set industry so as to ensure the universality of the business object;
the object and database corresponding module is used for determining the corresponding relation between the business object attribute and the domestic database field according to the logical structure of the domestic database;
and the visual association module is used for realizing the association visual operation of the domestic database and the business object based on the unified visual operation model of the database and the object, and storing the business object into the domestic database in a verification mode for later-stage display of the business object.
7. The domestic database-based information management security visualization system of claim 6, wherein in said visualization association module, said unified database-to-object visualization operation model is: the object comprises a plurality of general databases and object relation operation methods.
8. A domestic database based information management security visualization system according to claim 6, wherein in said visualization association module, database statements are used to operate the visualization operation model of unified database and object.
9. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the steps of the method for domestic database based security visualization according to any one of claims 1-5.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps in the method for domestic database based information management security visualization according to any of claims 1-5 when executing the program.
CN202110679142.5A 2021-06-18 2021-06-18 Information management security visualization method and system based on domestic database Pending CN113505126A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110679142.5A CN113505126A (en) 2021-06-18 2021-06-18 Information management security visualization method and system based on domestic database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110679142.5A CN113505126A (en) 2021-06-18 2021-06-18 Information management security visualization method and system based on domestic database

Publications (1)

Publication Number Publication Date
CN113505126A true CN113505126A (en) 2021-10-15

Family

ID=78010488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110679142.5A Pending CN113505126A (en) 2021-06-18 2021-06-18 Information management security visualization method and system based on domestic database

Country Status (1)

Country Link
CN (1) CN113505126A (en)

Similar Documents

Publication Publication Date Title
JP7419244B2 (en) Learning ETL rules by example
Loney Oracle database 10g: the complete reference
Fagin et al. Schema mapping evolution through composition and inversion
Konstantinou et al. The VADA architecture for cost-effective data wrangling
Letkowski Doing database design with MySQL
US20220035847A1 (en) Information retrieval
CN108228762B (en) Method and system for configuring master database universal templates
Batra SQL primer
Gorman Database management systems: understanding and applying database technology
US20070067254A1 (en) Business model data management
US20150026081A1 (en) Method and system for managing standards
AU2016100156A4 (en) Data Structure, Model for Populating a Data Structure and Method of Programming a Processing Device Utilising a Data Structure
Pinkwart et al. Partial generation of contextualized metadata in a collaborative modeling environment
CN113505126A (en) Information management security visualization method and system based on domestic database
Yannakoudakis The architectural logic of database systems
Schmitt et al. A comprehensive database schema integration method based on the theory of formal concepts
Bai SQL Server Database Programming with Java: Concepts, Designs and Implementations
Bai SQL Server Database Programming with Visual Basic. NET: Concepts, Designs and Implementations
Ivkovic et al. Using formal concept analysis to establish model dependencies
Gupta et al. Database management system Oracle SQL and PL/SQL
Ristic et al. Form-driven Application Development
Cavoto et al. ReGraph: bridging relational and graph databases
Kötters et al. Granada: Relational Database Navigation and Scaling.
Kurnaz et al. Automatic combination of user views for database creation
Bhoyar A Case Study of RDBMS and OODBMS: Importance in Business

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination