The OVAL Community Guidelines

Total Page:16

File Type:pdf, Size:1020Kb

The OVAL Community Guidelines The OVAL Community Guidelines The OVAL community with notable contributions by David Ries (jovalcm.com), Adam Montville (cisecurity.org), and Bill Munyan (cisecurity.org). Aug 06, 2019 The Guidelines 1 What is OVAL? 3 2 Who is the OVAL Community?5 3 Learn More 7 4 Get Involved 9 5 License 11 5.1 Getting Started.............................................. 11 5.2 OVAL Schema Documentation..................................... 17 5.3 OVAL Design Principles......................................... 523 5.4 OVAL Specifications........................................... 525 5.5 Community Organization........................................ 525 5.6 Proposal Process............................................. 530 5.7 Developer Guides............................................ 539 5.8 Release Streams............................................. 540 5.9 OVAL Versioning............................................ 541 5.10 OVAL Content Repositories....................................... 541 5.11 OVAL Support Declarations....................................... 544 5.12 OVAL Mailing Lists........................................... 554 5.13 Additional Resources........................................... 554 5.14 Terms of Use............................................... 555 i ii The OVAL Community Guidelines Welcome to the guidelines for OVAL, the Open Vulnerability and Assessment Language. These guidelines are de- signed to explain everything you need to know to start contributing to OVAL (or link you to places to ask questions, should the explanations not suffice), as well as provide a variety of standards and resources to the community. The Guidelines 1 The OVAL Community Guidelines 2 The Guidelines CHAPTER 1 What is OVAL? OVAL is an open language built by security experts, system administrators, and software developers to universalize assessment and reporting on the state of computer systems. 3 The OVAL Community Guidelines 4 Chapter 1. What is OVAL? CHAPTER 2 Who is the OVAL Community? The OVAL Community is the group responsible for proposals about anything and everything OVAL related. It com- prises Members, Area Supervisors, the Leadership Board, and the Sponsor. The community maintains, fixes, and improves OVAL through an established governance process. 5 The OVAL Community Guidelines 6 Chapter 2. Who is the OVAL Community? CHAPTER 3 Learn More OVAL Community Repository Registry CIS OVAL Repository (GitHub) CIS OVAL Repository (Static Site) Mailing Lists 7 The OVAL Community Guidelines 8 Chapter 3. Learn More CHAPTER 4 Get Involved Language Development Language Proposal Process OVAL Community GitHub Content Development Contributing OVAL Content CIS OVAL Repository Discussion Forums Mailing Lists 9 The OVAL Community Guidelines 10 Chapter 4. Get Involved CHAPTER 5 License Terms of Use 5.1 Getting Started Are you new to OVAL? Wondering what it is and how it’s used? Read on! 5.1.1 What is OVAL? OVAL is an open, standardized assertion language written in XML that standardizes how to assess and report on the machine state of computer systems. Used by the U.S. Government, the Center for Internet Security, Cisco, and McAfee, among many others, it is the most mature and widely adopted open source standard for security assessment. With the goal of easing interoperability between security tools, it includes content for vulnerability assessment, config- uration management, system inventory, and patch management. Security experts, system administrators, and software developers from industry, government, and academia have collaborated to write OVAL, and this consensus is one of its greatest attributes. Anyone can write OVAL, and we always welcome new contributors. 5.1.2 OVAL Use Cases OVAL is primarily used for assessing vulnerabilities in security configurations. OVAL content can also be used in other ways, documented in the Use Cases. 5.1.3 OVAL Structure OVAL can be broken down into a series of components that together represent a check, validation, or idea. This can generally be expressed as a prose sentence: 11 The OVAL Community Guidelines This is expressed as a definition, which references or includes the other components as seen below. definitions Definitions are specifications of what endpoint information should be checked and what corresponding values are expected to be found, as well as how to interpret the results of that comparison. They comprise one or more tests, which taken together represent an externally meaningful datum, such as a vulnerability state or inventory status. tests Tests are the concrete building blocks of definitions. They specify the relationship between an OVAL Object and zero or more OVAL States, matching the information to be collected with the corresponding values expected to be found. 12 Chapter 5. License The OVAL Community Guidelines objects Objects define what should be collected from an endpoint. A concrete OVAL Object may define a set of 0 or more OVAL Behaviors. OVAL Behaviors are actions that can further specify the set of OVAL Items that match an OVAL Object. states States are the expected values from an object that are compared to the information collected from an endpoint. variables Variables provide a way to group one or more values for consistent reference within other OVAL content. 5.1.4 An Annotated Sample Below is a sample OVAL definition file: <?xml version="1.0" encoding="UTF-8"?> <oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" ,!xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:xsi="http://www.w3. ,!org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/ ,!oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval- ,!definitions-5 oval-definitions-schema.xsd"> (continues on next page) 5.1. Getting Started 13 The OVAL Community Guidelines (continued from previous page) <generator> <!-- The generator element provides metadata about the tool/application used to develop ,!the OVAL Content. --> <oval:schema_version>5.11.2</oval:schema_version> <oval:timestamp>2018-07-31T17:30:20</oval:timestamp> </generator> <definitions> <!-- The definitions element contains the OVAL definition(s) to be exchanged. --> <definition class="compliance" id="oval:org.oval-community.example:def:1" version="1 ,!"> <!-- This definition checks compliance. --> <metadata> <!-- The metadata element contains information about the definition, including its ,!title and description. This definition checks whether WinRM traffic is encrypted or ,!not. --> <title>WinRM Traffic Must be Encrypted</title> <affected family="windows"> <platform>Microsoft Windows Server 2016</platform> </affected> <reference ref_id="CCE-46378-6" ref_url="http://cce.mitre.org" source="CCE"/> <description>The Windows Remote Management (WinRM) client must not allow ,!unencrypted traffic.</description> </metadata> <notes> <note>This sample was based on an OVAL definition included in the Windows Server ,!2016 STIG available at https://iase.disa.mil/ </note> </notes> criteria operator="AND"> <!-- The criteria element specifies the assertion to be tested using information ,!gathered from the endpoint. --> <criterion comment="Verifies 'WinRM Client: Allow unencrypted traffic' is set ,!to 'Disabled'" test_ref="oval:org.oval-community.example:tst:1"/>\ <!-- The criterion elements define logical terms in the assertion. This criteria ,!only uses 1 criterion element to check if 'WinRM Client: Allow unencrypted traffic' ,!is set to 'Disabled'. By default, the truth values returned by the tests are AND'ed to determine ,!the truth value of the assertion. --> </criteria> </definition> </definitions> <tests> <!-- (continues on next page) 14 Chapter 5. License The OVAL Community Guidelines (continued from previous page) The tests element contains the OVAL Test(s). OVAL Tests specify what to search for ,!on an endpoint (i.e., objects) and what is expected to be found (i.e., states). The registry_test is used to check information in the Windows registry. --> <registry_test check="all" check_existence="at_least_one_exists" comment="WinRM ,!Client: Allow unencrypted traffic is set to 'Disabled'" id="oval:org.oval-community. ,!example:tst:1" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5 ,!#windows"> <!-- This registry_test checks that 'Allow unencrypted traffic' is set to 'Disabled ,!'. --> <object object_ref="oval:org.oval-community.example:obj:1"/> <state state_ref="oval:org.oval-community.example:ste:1"/> </registry_test> </tests> <objects> <!-- The objects element contains the OVAL Object(s). The registry_object is used to search for information in the Windows registry. --> <registry_object comment="WinRM Cl ient: AllowUnencryptedTraffic registry key" id= ,!"oval:org.oval-community.example:obj:1" version="1" xmlns="http://oval.mitre.org/ ,!XMLSchema/oval-definitions-5#windows"> <!-- This registry_object specifies that the registry key containing the policy ,!definition for 'WinRM Client: Allow unencrypted traffic' should be checked. --> <hive datatype="string" operation="equals">HKEY_LOCAL_MACHINE</hive> <key datatype="string" operation="equals"> ,!Software\Policies\Microsoft\Windows\WinRM\Client</key> <name datatype="string" operation="equals">AllowUnencryptedTraffic</name> </registry_object> </objects> <states> <!-- The states element contains the OVAL State(s). The registry_state is used to describe information expected to be found in the ,!Windows registry. --> <registry_state comment="Reg_Dword equals 0" id="oval:org.oval-community. ,!example:ste:1" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5
Recommended publications
  • Features and Functionality History Mimer SQL, Features and Functionality History © Copyright Mimer Informationtechnology AB, August 2017
    Mimer SQL Features and Functionality History Mimer SQL, Features and Functionality History © Copyright Mimer InformationTechnology AB, August 2017 The contents of this manual may be printed in limited quantities for use at a Mimer SQL installation site. No parts of the manual may be reproduced for sale to a third party. Information in this document is subject to change without notice. All registered names, product names and trademarks of other companies mentioned in this documentation are used for identification purposes only and are acknowledged as the property of the respective company. Companies, names and data used in examples herein are fictitious unless otherwise noted. Produced and published by Mimer InformationTechnology AB, Uppsala, Sweden. P.O. Box 1713, SE-751 47 Uppsala, Sweden. Tel +46(0)18-780 92 00. Fax +46(0)18-780 92 40. Mimer Web Sites: http://developer.mimer.com http://www.mimer.com Mimer SQL i Features and Functionality History Contents Chapter 1 New Features and Functions ........................................................... 1 The Mimer SQL Database Server..................................................................................1 Internal Databank Identifier Invalid (V9.3.8B) ............................................................... 1 Background Dbcheck Hang (V9.3.8).............................................................................. 1 LOGDB Restart (V9.3.8).................................................................................................. 1 Improved Control of LOB References
    [Show full text]
  • Database Access Via Programming Languages 5DV119 — Introduction to Database Management Ume˚Auniversity Department of Computing Science Stephen J
    Database Access via Programming Languages 5DV119 | Introduction to Database Management Ume˚aUniversity Department of Computing Science Stephen J. Hegner [email protected] http://www.cs.umu.se/~hegner Database Access via Programming Languages 20150213 Slide 1 of 20 The Limitations of Stand-Alone SQL • SQL is primarily a language for data definition, retrieval, and update. • It is not designed for complex computation. • Enhancements such as OLAP are useful for certain specific tasks, but still leave many important tasks difficult or impossible to achieve. Theoretical shortcoming: Unlike most programming languages, it is not Turing complete. • There are computations which cannot be expressed in SQL at all. Interoperability shortcoming: Stand-alone SQL clients are generally vendor specific. • Concurrent access to databases of different vendors is not possible with a single client. • Access to multiple databases via the same client is usually awkward, requiring vendor-specific directives. Database Access via Programming Languages 20150213 Slide 2 of 20 The Limitations of Stand-Alone SQL: 2 Practical shortcomings: There is also a host of practical reasons why stand-alone SQL does not suffice: Accessibility: Most users of databases are not computer scientists. • They need a custom interface for non-experts. • Even experts can often work more effectively via custom interfaces. Simplicity: Real-world database schemata are often very large and complex. • Users often need to work with custom views which present what they need to know and are allowed to know. Security: The correct management of access rights is a very complex task. • It is often easier to manage access by admitting access via specific interfaces.
    [Show full text]
  • Openvms Guide
    Mimer SQL OpenVMS Guide Version 11.0 Mimer SQL, OpenVMS Guide, Version 11.0, January 2018 © Copyright Mimer Information Technology AB. The contents of this manual may be printed in limited quantities for use at a Mimer SQL installation site. No parts of the manual may be reproduced for sale to a third party. Information in this document is subject to change without notice. All registered names, product names and trademarks of other companies mentioned in this documentation are used for identification purposes only and are acknowledged as the property of the respective company. Companies, names and data used in examples herein are fictitious unless otherwise noted. Produced and published by Mimer Information Technology AB, Uppsala, Sweden. Mimer SQL Web Sites: https://developer.mimer.com https://www.mimer.com Contents i Contents .............................................................................................................................. i Chapter 1 Introduction .......................................................................................1 About Mimer SQL for OpenVMS...................................................................................1 The Mimer SQL Database Server .................................................................................. 1 Embedded SQL................................................................................................................. 1 Module SQL......................................................................................................................
    [Show full text]
  • Database Proxies: a Data Management Approach for Component-Based Real-Time Systems∗
    Database Proxies: A Data Management approach for Component-Based Real-Time Systems¤ Andreas Hjertström, Dag Nyström, Mikael Sjödin Mälardalen Real-Time Research Centre, Västerås, Sweden {andreas.hjertstrom, dag.nystrom, mikael.sjodin}@mdh.se Abstract ture to share global data safely and efficiently by provid- ing concurrency-control, temporal consistency, and over- We present a novel concept, database proxies, which en- load and transaction management. Furthermore the typical able the fusion of two disjoint productivity-enhancement interface provided by the RTDBMS opens up for a whole techniques; Component Based Software Engineering new range of possibilities, much needed by industry, such (CBSE) and Real-Time Database Management Systems as dynamic run-time queries which could be a welcome (RTDBMS). This fusion is neither obvious nor intuitive contribution to aid in logging, diagnostics, monitoring [18], since CBSE and RTDBMS promotes opposing design goals; compared to the pre defined static data access often used by CBSE promotes encapsulation and decoupling of compo- developers today. nent internals from the component environment, whilst RT- CBSE promotes encapsulation of functionality into DBMS provide mechanisms for efficient and safe global reusable software entities that communicates through well data sharing. Database proxies decouple components from defined interfaces and that can be mounted together as an underlying database thus retaining encapsulation and building blocks. This enable a more efficient and structured component reuse, while providing temporally predictable development where available components can be reused or access to data maintained in database. We specifically tar- COTS components effectively can be integrated in the sys- get embedded systems with a subset of functionality with tem to save cost and increase quality.
    [Show full text]
  • Datasheet: Rapidrep® Test Suite
    Datasheet: RapidRep® Test Suite Overview: Test automation for the back-end The RapidRep® Test Suite is an innovative solution Test objects: Programs (non-GUI), data storage, data for the automated testing of objects that do not require processing, Web services, processes any user interaction (back-end). Test types: Function tests, migration tests, data com- parison tests, regression tests, and others RapidRep® is universally applicable and complies with all relevant ISO/IEC/IEEE testing standards. Further information: www.rapidrep.com/test-suite Important product features ● Rule Engine for the determination of expected re- XPath or Javascript sults (model-based testing with the help of sets of ● Integration of MS Excel as tool for test case design, rules) result presentation, management of rules ● Configurable solution for rule-based data quality ● Seamless connection to various test and defect evaluations and automated data comparison (with a management systems (see below) wizard) ● Version control of all states of development in a ● Integrated, efficient development environment for repository SQL and 2 script languages, incl. syntax highligh- ● Central administration of all settings for authentica- ting, proposal lists, business API tion and authorization ● Wizard for the connection to and further processing ● Documentation, Help, program surface are all avail- of Web services by means of SQL, XQuery, XSLT, able completely in German and English Supported systems Test management systems Repository databases ● HP Quality Center / ALM:
    [Show full text]
  • Openvms Guide
    Mimer SQL OpenVMS Guide Version 10.1 Mimer SQL, OpenVMS Guide, Version 10.1, December 2017 © Copyright Mimer Information Technology AB. The contents of this manual may be printed in limited quantities for use at a Mimer SQL installation site. No parts of the manual may be reproduced for sale to a third party. Information in this document is subject to change without notice. All registered names, product names and trademarks of other companies mentioned in this documentation are used for identification purposes only and are acknowledged as the property of the respective company. Companies, names and data used in examples herein are fictitious unless otherwise noted. Produced and published by Mimer Information Technology AB, Uppsala, Sweden. P.O. Box 1713, SE-751 47 Uppsala, Sweden. Tel +46(0)18-780 92 00. Fax +46(0)18-780 92 40. Mimer SQL Web Sites: http://developer.mimer.com http://www.mimer.com Contents i Contents .............................................................................................................................. i Chapter 1 Introduction ....................................................................................... 1 About Mimer SQL for OpenVMS...................................................................................1 The Mimer SQL Database Server .................................................................................. 1 Embedded SQL................................................................................................................. 1 JDBC Driver......................................................................................................................
    [Show full text]
  • What Is Mimer SQL 11 C
    WHAT IS MIMER SQL 11 Mimer is a company with a strong foundation in standards and innovation. The Mimer SQL dataBase server has from the start been built with scalability and flexiBility in mind, which is why it is, in the true sense of the word, the Swiss Army Knife of dataBases. With Mimer SQL you can freely mix between various technologies for replication, database partitioning, distribution, physical hardware, in-memory operation, operating systems, all depending on your applications’ needs. Thanks to this flexiBility, and an extremely compact code Base, Mimer SQL has an unsurpassed support for multiple computing platforms where we can provide the exact same functions and capabilities, regardless if Mimer SQL runs in an emBedded system such as an IoT device, or a vehicle, in the cloud, or in the datacenter of an enterprise. Being a true 64-bit solution, the only thing that limits the size of data that Mimer SQL can handle is the hardware. Our codeBase is designed with this flexiBility in mind which explains the Broad range of operating systems and architectures Mimer SQL is ported to, and the range of computing environments we support. The way we can offer a complete, Core SQL-2016 compliant dataBase over the whole range of products, is unique in the market. Mimer SQL is used for enterprise, cloud, desktop, emBedded systems, and real time applications, and we have versions for operating systems such as Windows, Linux, macOS, and VMS as well as support for emBedded and real time operating systems such as INTEGRITY from Green Hills Software, QNX from BlackBerry, VxWorks, and Android.
    [Show full text]
  • Mimer SQL on Openvms Present and Future
    Mimer SQL on OpenVMS Present and Future Bengt Gunne, CTO 1 Agenda . Background . Mimer customers . Platforms . Technical features . Mimer SQL on OpenVMS . Ongoing development . Q&A 2 Bengt Gunne . Started working with Mimer in 1981 – Have worked with many parts of the system such as: . Database kernel . Transaction handling . Client/server communications . Clients such as ODBC and ADO.NET . Overall design . Multiuser systems for PDP, VMS, HP-UX, Windows etc. Most recently written a new SQL optimizer – Head of development since 1991 – Chief Technical Officer 3 Who was Mimer? Mimer was a giant in the Norse Mythology who guarded the well of wisdom. The gods came to Mimer for advice. When they looked into the well they could see everything that happened in the world. The god Oden even took out one of his eyes and put it in the well to be able to see everything at all times. Today, ordinary people come to Mimer for advice… 4 Mimer Information Technology AB . HQ in Uppsala, Sweden – Office in Stockholm and Beijing – Partners in China, Japan, Korea, Central Europe, and USA . World class experts in relational database technology . Developer of the Mimer SQL product family – Enterprise Solutions – Industrial/Automotive/Embedded Solutions – Mobile Solutions . Mimer SQL used in mission critical systems world wide since the 1970s 5 What is Mimer SQL? . Relational database management system . Standard SQL . Runs on many platforms – Tight integration with OpenVMS 6 Company focus . The company focuses solely on Mimer SQL – Tools are through third party integrations . How is this possible/facilitated? – Standard SQL – Standard programming interfaces Requires a truly open system 7 Mimer SQL background .
    [Show full text]
  • Data Management in Component-Based Embedded Real-Time Systems
    Mälardalen University Doctoral Thesis No. 125 Data Management in Component-Based Embedded Real-Time Systems Andreas Hjertström June 2012 School of Innovation, Design and Engineering Copyright ⃝c Andreas Hjertström, 2012 ISSN 1651-4238 ISBN 978-91-7485-064-2 Printed by Mälardalen University, Västerås, Sweden Distribution: Mälardalen University Press Abstract This thesis presents new data management techniques for run-time data in component-based embedded real-time systems. These techniques enable data to be modeled, analyzed and structured to improve data management dur- ing system development, maintenance, and execution. The foundation of our work is a case-study that identifies a number of problems with current state-of- practice in data management for industrial embedded real-time systems. We introduce two novel concepts: the data entity and the database proxy. The data entity is a design-time concept that allows designers to manage data objects throughout different design and maintenance activities. It includes data-type specification, documentation, specification of timing and quality pro- perties, tracing of dependencies between data objects, and enables analysis and automated validation. The database proxy is a run-time concept designed to allow the use of state- of-the-art database technologies in contemporary software-component tech- nologies for embedded systems. Database proxies decouple components from an underlying database residing in the component framework. This allows components to remain encapsulated and reusable, while providing temporally predictable access to data maintained in a database, thus enabling the use of database technologies, which has previously excluded, in these systems. To validate our proposed techniques, we present a tool implementation of the data entity as well as implementations of the database proxy approach, using commercial tools, the AUTOSAR standardized automotive software ar- chitecture, and automotive hardware.
    [Show full text]
  • Downloads/PDF for Archive.Pdf
    European Space Agency Symposium “Ensuring Long-Term Preservation and Adding Value to Scientific and Technical Data”, 5 - 7 October 2004, Frascati, Italy Providing Authentic Long-term Archival Access to Complex Relational Data Stephan Heuscher a, Stephan J¨armann b, Peter Keller-Marxer c, and Frank M¨ohle d Swiss Federal Archives, Archivstrasse 24, CH-3003 Bern, Switzerland [email protected], [email protected], [email protected], [email protected] (Dated: July 19, 2004) We discuss long-term preservation of and access to relational databases. The focus is on national archives and science data archives which have to ingest and integrate data from a broad spectrum of vendor-specific relational database management systems (RDBMS). Furthermore, we present our solution SIARD which analyzes and extracts data and data logic from almost any RDBMS. It enables, to a reasonable level of authenticity, complete detachment of databases from their vendor-specific environment. The user can add archival descriptive metadata according to a customizable schema. A SIARD database archive integrates data, data logic, technical metadata, and archival descriptive information in one archival information package, independent of any specific software and hardware, based upon plain text files and the standardized languages SQL and XML. For usage purposes, a SIARD archive can be reloaded into any current or future RDBMS which supports standard SQL. In addition, SIARD contains a client that enables ‘on demand’ reload of archives into a target RDBMS, and multi-user remote access for querying and browsing the data together with its technical and descriptive metadata in one graphical user interface.
    [Show full text]
  • User Manual for Sql
    User manual for sql click here to download User's Guide. Release E August Provides conceptual and usage information about Oracle. SQL Developer, a graphical tool that enables. SQL Developer is a powerful SQL client for querying and administration of databases. The application has been completely implemented in Java and therefore. SQL Statement Syntax This manual describes features that are not included in every edition of MySQL ; such features may not be the MySQL Forums or MySQL Mailing Lists, where you can discuss your issues with other MySQL users.​Installing and Upgrading MySQL · ​Tutorial · ​Preface and Legal Notices · ​Data Types. EMS Database Management Solutions, Ltd. SQL Management Studio for SQL Server. User's Manual. SQL i. About the Tutorial. SQL is a database computer language designed for Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or. Using SQL Workbench/J specific annotations in SQL comments · Parameters for type SQLUPDATE, SQLINSERT or SQLDELETEINSERT · This manual is intended primarily for users of Mimer SQL who have little or Refer to the Mimer SQL Reference Manual for a complete syntax. SQL Payroll User Guide. Learn how to use and Master SQL Payroll. Browse and download all of our SQL Payroll User Guide in PDF format. If you have any. Learn how to use and Master SQL Accounting. Browse and download all of our SQL Accounting User Guide in PDF format. The correct bibliographic citation for this manual is as follows: SAS Institute Inc SAS® SQL Procedure User's Guide. Cary, NC: SAS. Institute Inc. SQL Server Management Studio presents a graphical interface for configuring, You must have the following installed to use this tutorial.
    [Show full text]
  • Database Management Systems Ebooks for All Edition (
    Database Management Systems eBooks For All Edition (www.ebooks-for-all.com) PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sun, 20 Oct 2013 01:48:50 UTC Contents Articles Database 1 Database model 16 Database normalization 23 Database storage structures 31 Distributed database 33 Federated database system 36 Referential integrity 40 Relational algebra 41 Relational calculus 53 Relational database 53 Relational database management system 57 Relational model 59 Object-relational database 69 Transaction processing 72 Concepts 76 ACID 76 Create, read, update and delete 79 Null (SQL) 80 Candidate key 96 Foreign key 98 Unique key 102 Superkey 105 Surrogate key 107 Armstrong's axioms 111 Objects 113 Relation (database) 113 Table (database) 115 Column (database) 116 Row (database) 117 View (SQL) 118 Database transaction 120 Transaction log 123 Database trigger 124 Database index 130 Stored procedure 135 Cursor (databases) 138 Partition (database) 143 Components 145 Concurrency control 145 Data dictionary 152 Java Database Connectivity 154 XQuery API for Java 157 ODBC 163 Query language 169 Query optimization 170 Query plan 173 Functions 175 Database administration and automation 175 Replication (computing) 177 Database Products 183 Comparison of object database management systems 183 Comparison of object-relational database management systems 185 List of relational database management systems 187 Comparison of relational database management systems 190 Document-oriented database 213 Graph database 217 NoSQL 226 NewSQL 232 References Article Sources and Contributors 234 Image Sources, Licenses and Contributors 240 Article Licenses License 241 Database 1 Database A database is an organized collection of data.
    [Show full text]