Skip to main content

Questions tagged [access]

2votes
2answers
107views

How to Design a Secure Script for Conditional File Access Based on Time and API Conditions?

I want to create a secure script that grants access to files based on specific conditions. The access should be controlled by both time-based and API-based conditions. The script should only allow ...
edge selcuk's user avatar
0votes
1answer
87views

What will the best way to manage access to the app projects Git repositories with shared service classes within one solution?

I have been programming in C#/.Net and other languages as a hobby for over 6 years, so I do not have adequate knowledge about application architecture, hence my request for advice. The current ...
bakunet's user avatar
0votes
3answers
797views

Which is the best data structure to use when you want to randomly pick elements & use them, but also delete them after use

I have 1000 lines in a text file. I want to read them into some data structure[DS]. After reading them, I will be randomly picking 50 lines from the DS (using a Random Number Generator). Next time 50 ...
user93353's user avatar
-3votes
1answer
3kviews

Difference between read and write access (data, IoT)

i am a lawyer and currently writing an essay about data access in ioT environments. I often stumble over the distinction between read access and write access. Could someone provide me with an example, ...
Liam Liam's user avatar
1vote
1answer
228views

What are ways to manage secrets in a big organisation?

Many articles on the internet focus on methods to keep secrets outside public-access (like mobile apps, website frontend etc). But let's take the example of a really big organisation. It has secrets ...
Siddharth Venu's user avatar
3votes
2answers
872views

Is Excel data model as good as or better than Microsoft Access?

I'm working with several Excel worksheets and workbooks that need to consolidated or linked to each other. These workbooks will track client interactions for different team members. I did the initial ...
Jasterix's user avatar
1vote
1answer
652views

Git strategy for separate teams in one project without access to eachother source

We have one project and separate teams which work on separate modules. What we need is a strategy that allows our teams to work on one project but without access to each other source codes. one ...
Hamid's user avatar
2votes
0answers
208views

Viable ways to handle an access token on the resource/web application server

Use case: We have a product which ties a set of resources to a concrete user. Now we would like to provide the customers with an API so that an automated client application can have access to a ...
Lyudmil Grigorov's user avatar
0votes
1answer
117views

How you can deal with making invalid a list of JWTs?

I design a new Rest API for a personal project and I am trying to implement the authentication and authorization mechanism as a separate project, so I ended up with a couple of problems which I am ...
pik4's user avatar
  • 385
0votes
0answers
1kviews

Single users database for many apps

I'm designing a database that holds the information for users of three diferentes apps that share the access to the data trough an API. For every user i'm storing credentials, profile and roles. What ...
Francisco Hanna's user avatar
3votes
2answers
1kviews

Insertion sort vs Merge sort - memory access

I am a computer science sophomore doing a data structures and algorithms course. My professor said that insertion sort requires random access, while merge sort does not. According to him, the ...
James Bond's user avatar
0votes
1answer
128views

Access Database Migration: Sharepoint or Custom solution [closed]

In order to migrate a local Access database and make it available on-line I'm considering two solutions: Migrate the database to SQL and build a custom ASP application in order to add/edit/delete ...
cap7's user avatar
  • 287
5votes
2answers
4kviews

Alternative locking strategies

I'm having a problem with the design of my application, that neither optimistic nor pessimistic locking tends to solve. Here is a simplified/altered version of the problem that describes the situation....
Limbo Exile's user avatar
0votes
1answer
99views

Multiuser's impact on Access Database

Can someone explain to me how are effected the performances of an Access 2003 DB when it's used by a lot (30) of users on the same LAN? I'm working on a vb6 project with this access 2003 DB wich ...
SilentRage47's user avatar
0votes
1answer
2kviews

Should I label class diagram variables as private or public?

In my program, I have several class variables whose access specifier is known as private package. The default accessor specifier in Java is known as private package where it is accessible within the ...
Computernerd's user avatar

153050per page
close