Mobile wallpaper 1Mobile wallpaper 2Mobile wallpaper 3Mobile wallpaper 4Mobile wallpaper 5Mobile wallpaper 6Mobile wallpaper 7Mobile wallpaper 8
821 字
4 分钟
Databases Week5 Lecture
2025-10-27
无标签

Legal Issues and Web Services#

Table of content#

  • Review Week4 Tutorial.
  • Look at some:
  • Legal issues
  • Company policies
  • Standards.
  • Introduce Web services.
  • Introduce JSON.

Where can we use XML#

XML files can be used for:

  • Storing data
  • Transforming data
  • Describing data
  • Representing data
  • Transferring data
  • Displaying data

Languages#

  • Most languages contain tools to create and consume XML
    • Java
    • Php
    • .Net (ado.net)
    • Javascript (AJAX)
  • Can staff / developers access the XML data?
  • What volume of data will you be processing?
  • Different countries have different rules that may be applicable.
  • Company policies: You need to tell people how to use your data (Be aware of the use of 3rd parties.)

The Main Acts#

The Data Protection Act (1998)#

  • Protects people’s information held by others.
  • Any data you collect must be :
    • Obtained and used for a specific (lawful) purpose.
    • Adequate, relevant and not excessive.
    • Accurate and up to date.
    • Kept only for as long as necessary.
    • Processed in accordance with a person’s rights.
    • Protected from unauthorized processing and accidental loss or destruction.
    • Kept in the EEA (European Economic Area)

Privacy and Electronic Communications Regulations#

  • “The Cookie Law”:
    • Designed to protect online privacy.
    • Aims to make consumers aware of how their information is being collected and used.
    • Websites must get permission to collect, store and retrieve data about site visitors.
    • Covers all methods of storage and retrieval, not just cookies.
    • Also covers marketing communications (such as calls and emails) and customer privacy (i.e. location services and identification).

The Computer Misuse Act (1990)#

  • The act creates the following offenses:
    • Unauthorized access / modification of computer materials.
    • Unauthorized access with intent to commit or facilitate a crime.
    • Making, supplying or obtaining anything which can be used in an offense under the Act.
  • Protects original works, recordings and their presentation from unauthorized copying and distribution.
  • Defines authorship and ownership.
  • Sets out the duration of copyright for different media types.
  • Sets out the rights of copyright owners.

PCI DSS (Payment Card Industry Data Security Standard)#

  • Developed to enhance the cardholder data security.
  • Applies to merchants and service providers that process, transmit or store card holders data.
  • Began In 2004 as the payment Processing rules from major credit card brands: Visa, Mastercard, Amex (American Express), Discover, and JCB.
  • Consists of 12 regulations.
Control objectives Requirements
Build and maintain a secure network 1. Install and maintain a firewall configuration to protect cardholder data
2. Do not use vendor supplied defaults for system passwords and other security parameters
Protect cardholder data 3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, public networks
Maintain a vulnerability management program 5. Use and regularly update anti-virus software on all systems commonly affected by malware
6. Develop and maintain secure systems and applications
Implement strong access control measures 7. Restrict access to cardholder data by business need-to-know
8. Assign a unique ID to each person with computer access
9. Restrict physical access to cardholder data
Regularly monitor and test networks 10. Track and monitor all access to network resources and cardholder data
11. Regularly test security systems and processes.
Maintain an information security policy 12. Maintain a policy that addresses information security

Web Services#

What is a Web service?#

  • “A Web service is a software system designed to support interoperable machine-to-machine interaction over a network.

Web Services#

URL or URI ?#

HTTP (Hypertext Transfer Protocol)#

3rd Party Web Services#

When using 3rd party web services bear in mind:

  • Legal issues.
    • Do you have a license to use the data as intended?
  • Data governance.
    • Where are the servers located?
    • Can you share personal data with the service if needed?
  • Security.
    • Is the service going to properly protect your data? Will need to abide by terms and conditions – may include requirements such as displaying their logo.

JSON#

  • JSON (JavaScript Object Notation).
  • Commonly used to create dynamic screen elements on websites, or transfer data over the web.
  • The syntax is taken from JavaScript but JSON is portable with other languages.
  • It is easy for humans to read and write.
  • It is easy for machines to parse and generate.

JSON Data Types#

JSON Data Array#

JSON Objects#

JSON Types Examples#

  • Object
{ "key": "value" }
{ "name": "John" }
{ "age": 35 }
  • Arrays
[1, 2, 3]
["Apples", "Oranges"]
  • Strings
"Raghav"
"Paris"
  • Numbers
1
10
1.5
-10
4.5e70
  • Boolean
true
false
  • Null
null

JSON Pros and Cons#

ProsCons
Very smallLimited data types
Easy to parseNo comment syntax
Widely supportedNot self describing
Tightly integrated with JavaScriptNo JSON schema*
(No validation)
TIP

self describing
e.g., the attribute in xml
<actor prefix="Mr.">Macauley Culkin</actor>

schema
e.g., DTD

if you are asked to validate json, you just need to check if there are any errors in the json, because json doesn’t have DTD

JSON Vs. XML#

JSON Syntax Rules#

  • Data is in name / value pairs separated by a colon :
  • Data is separated by commas.
  • Curly braces hold objects.
  • Square braces hold arrays.

JSON Testing and Validation#

  • Creating your JSON file
    • Notepad++ can be used.
    • Make sure your document follows the Key JSON specification rules.
  • Testing your file
    • JSON codes should be validated – i.e., we should be able to automatically check its structure and syntax.
  • Validate your JSON code at https://jsonlint.com/

Warmer Part 1#

Convert the Scholars XML code into an identical JSON file and validate your answer.

For CourseWork1#

  • DTD
  • XML
  • XSLT
  • JSON
Databases Week5 Lecture
https://mizuki.anka2.top/posts/l5-db-week5-lecture/
作者
🐦‍🔥不死鸟Anka
发布于
2025-10-27
许可协议
MIT

部分信息可能已经过时

封面
示例歌曲
示例艺术家
封面
示例歌曲
示例艺术家
0:00 / 0:00