{"id":"https://openalex.org/W2088991188","doi":"https://doi.org/10.1145/2047594.2047674","title":"Parasitic databases","display_name":"Parasitic databases","publication_year":2011,"publication_date":"2011-10-20","ids":{"openalex":"https://openalex.org/W2088991188","doi":"https://doi.org/10.1145/2047594.2047674","mag":"2088991188"},"language":"en","primary_location":{"id":"doi:10.1145/2047594.2047674","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2047594.2047674","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 conference on Information technology education","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://scholarworks.rit.edu/cgi/viewcontent.cgi?article=9500&context=theses","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031393342","display_name":"Svetlin Tzolov","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Svetlin Tzolov","raw_affiliation_strings":["Rochester Institute of technology, Rochester, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of technology, Rochester, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048536077","display_name":"Dianne P. Bills","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dianne Bills","raw_affiliation_strings":["Rochester Institute of Technology, Rochester, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, Rochester, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031393342"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16730807,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"303","last_page":"304"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8303208351135254},{"id":"https://openalex.org/keywords/internet-control-message-protocol","display_name":"Internet Control Message Protocol","score":0.6242794394493103},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5900077223777771},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5448479652404785},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5109092593193054},{"id":"https://openalex.org/keywords/xml-database","display_name":"XML database","score":0.5048390030860901},{"id":"https://openalex.org/keywords/data-redundancy","display_name":"Data redundancy","score":0.4927082359790802},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4233197569847107},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.41913938522338867},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.33802634477615356},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21322757005691528}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8303208351135254},{"id":"https://openalex.org/C195219913","wikidata":"https://www.wikidata.org/wiki/Q13162","display_name":"Internet Control Message Protocol","level":3,"score":0.6242794394493103},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5900077223777771},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5448479652404785},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5109092593193054},{"id":"https://openalex.org/C183068750","wikidata":"https://www.wikidata.org/wiki/Q357393","display_name":"XML database","level":3,"score":0.5048390030860901},{"id":"https://openalex.org/C7545210","wikidata":"https://www.wikidata.org/wiki/Q838123","display_name":"Data redundancy","level":2,"score":0.4927082359790802},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4233197569847107},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.41913938522338867},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.33802634477615356},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21322757005691528}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2047594.2047674","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2047594.2047674","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 conference on Information technology education","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarworks.rit.edu:theses-9500","is_oa":true,"landing_page_url":"https://scholarworks.rit.edu/theses/8487","pdf_url":"https://scholarworks.rit.edu/cgi/viewcontent.cgi?article=9500&context=theses","source":{"id":"https://openalex.org/S4306402456","display_name":"RIT Scholar Works (Rochester Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I155173764","host_organization_name":"Rochester Institute of Technology","host_organization_lineage":["https://openalex.org/I155173764"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Theses","raw_type":"text"},{"id":"pmh:oai:repository.rit.edu:theses-9500","is_oa":false,"landing_page_url":"https://repository.rit.edu/theses/8487","pdf_url":null,"source":{"id":"https://openalex.org/S4306402456","display_name":"RIT Scholar Works (Rochester Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I155173764","host_organization_name":"Rochester Institute of Technology","host_organization_lineage":["https://openalex.org/I155173764"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Theses","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:scholarworks.rit.edu:theses-9500","is_oa":true,"landing_page_url":"https://scholarworks.rit.edu/theses/8487","pdf_url":"https://scholarworks.rit.edu/cgi/viewcontent.cgi?article=9500&context=theses","source":{"id":"https://openalex.org/S4306402456","display_name":"RIT Scholar Works (Rochester Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I155173764","host_organization_name":"Rochester Institute of Technology","host_organization_lineage":["https://openalex.org/I155173764"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Theses","raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W2088991188.pdf"},"referenced_works_count":3,"referenced_works":["https://openalex.org/W1608036680","https://openalex.org/W2025411672","https://openalex.org/W2158737870"],"related_works":["https://openalex.org/W2392196971","https://openalex.org/W2504080848","https://openalex.org/W2354256422","https://openalex.org/W2385660420","https://openalex.org/W1578823772","https://openalex.org/W2046270155","https://openalex.org/W1534326833","https://openalex.org/W1839529939","https://openalex.org/W4393775445","https://openalex.org/W2351021960"],"abstract_inverted_index":{"A":[0],"parasitic":[1,8,41,80],"database":[2,13,25,102,129,162],"combines":[3],"the":[4,108,113,142,158,180,189,195],"fundamental":[5],"principles":[6],"of":[7,12,115,123,145,160,182,191],"storage":[9,20,43,82],"with":[10],"those":[11],"theory":[14],"to":[15,31,54,120,154,193],"create":[16],"a":[17,28,61,100],"distributed":[18],"data":[19,34,81,86,130,168,196],"strategy":[21],"that":[22,84],"provides":[23],"basic":[24],"functionality":[26],"in":[27,44,57,128,141],"design":[29,103],"intended":[30],"maintain":[32],"high":[33],"security.":[35],"This":[36],"approach":[37,111],"is":[38,47,83,87,104,117,126],"inspired":[39],"by":[40,89,136,200],"network":[42,58,95,134,177],"which":[45],"information":[46],"stored":[48],"across":[49,132],"many":[50],"machines,":[51],"usually":[52],"unbeknownst":[53],"their":[55],"owners,":[56],"traffic":[59],"using":[60],"communication":[62],"protocol":[63],"such":[64,185],"as":[65,186],"Internet":[66],"Control":[67],"Message":[68],"Protocol":[69,75],"(ICMP)":[70],"or":[71],"Simple":[72],"Mail":[73],"Transfer":[74],"(SMTP).":[76],"The":[77],"basis":[78],"for":[79],"user":[85],"\"stored\"":[88,127],"being":[90,198],"continually":[91],"transferred":[92],"between":[93],"various":[94,151],"nodes.":[96],"For":[97],"this":[98,121],"investigation,":[99],"XML":[101,116],"used":[105],"rather":[106],"than":[107],"traditional":[109,161],"RDMBS":[110],"because":[112],"structure":[114],"more":[118],"suited":[119],"kind":[122],"deployment.":[124],"Data":[125],"packets":[131],"multiple":[133],"nodes":[135],"splitting":[137],"and":[138,164,170,174,179,188],"distributing":[139],"it":[140],"\"Data\"":[143],"fields":[144],"ICMP":[146],"packets.":[147],"To":[148],"be":[149,155],"successful,":[150],"issues":[152],"need":[153],"addressed,":[156],"including:":[157],"implementation":[159,181],"DDL":[163],"DML":[165],"functionality;":[166],"maintaining":[167],"integrity":[169],"providing":[171],"ACID;":[172],"calculating":[173],"handling":[175],"sufficient":[176],"redundancy;":[178],"security":[183],"features,":[184],"encryption":[187],"use":[190],"salt,":[192],"prevent":[194],"from":[197],"viewed":[199],"unauthorized":[201],"parties.":[202]},"counts_by_year":[],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
