Platform management of integrated access of public and privately-accessible datasets utilizing federated query generation and query schema rewriting optimization

ABSTRACT

Various techniques are described for platform management of integrated access of public and privately-accessible datasets utilizing federated query generation and query schema rewriting optimization, including receiving at a dataset access platform a query formatted according to a first data schema, generating a copy of the query, saving the query and the copy to a datastore, parsing the copy of the query in the first schema using an inference engine, determining whether the query comprises data associated with an access control condition associated with accessing the dataset, the access control condition being configured to indicate whether the query is permitted to access the dataset, and rewriting, using a proxy server, the copy of the query in a second schema by converting the copy of the query into a triple associated with the query and another triple associated with the access control condition.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation application (“CON”) of U.S.Nonprovisional patent application Ser. No. 15/439,908, filed Feb. 22,2017; U.S. patent application Ser. No. 15/439,908 is acontinuation-in-part application (“CIP”) of U.S. patent application Ser.No. 15/186,514, filed Jun. 19, 2016, which issued as U.S. Pat. No.10,102,258; U.S. patent application Ser. No. 15/439,908 is also acontinuation-in-part application of U.S. Nonprovisional patentapplication Ser. No. 15/186,515, filed Jun. 19, 2016; U.S. patentapplication Ser. No. 15/439,908 is also a continuation-in-partapplication of U.S. Nonprovisional patent application Ser. No.15/186,516, filed Jun. 19, 2016; U.S. patent application Ser. No.15/439,908 is also a continuation-in-part application of U.S.Nonprovisional patent application Ser. No. 15/186,517, which issued asU.S. Pat. No. 10,324,925, filed Jun. 19, 2016; U.S. patent applicationSer. No. 15/439,908 is also a continuation-in-part application of U.S.Nonprovisional patent application Ser. No. 15/186,519, filed Jun. 19,2016; U.S. patent application Ser. No. 15/439,908 is also acontinuation-in-part application of U.S. patent application Ser. No.15/186,520, filed Jun. 19, 2016; U.S. patent application Ser. No.15/439,908 is also a continuation-in-part application of U.S. patentapplication Ser. No. 15/454,923, filed Mar. 9, 2017; U.S. patentapplication Ser. No. 15/439,908 is also a continuation-in-partapplication of U.S. Nonprovisional patent application Ser. No.15/454,955, filed Mar. 9, 2017; U.S. patent application Ser. No.15/439,908 is also a continuation-in-part application of U.S. patentapplication Ser. No. 15/454,969, filed Mar. 9, 2017; U.S. patentapplication Ser. No. 15/439,908 is also a continuation-in-partapplication of U.S. patent application Ser. No. 15/454,981, filed Mar.9, 2017; all of which are hereby incorporated by reference in theirentirety for all purposes.

FIELD

The present invention relates generally to data science, machine anddeep learning computer algorithms, data graph modeling, and analysis oflinked data. More specifically, techniques for management of integratedaccess to public and privately-accessible datasets are described.

BACKGROUND

As demand for data and data science expands rapidly, significantresearch into potential uses of data in various applications are alsoincreasing at a dramatic rate. With enormous amounts of data andinformation becoming increasingly available, utilizing data is becominga greater focus of both consumer and commercial activities alike.Datasets (i.e., sets or groups of logically-related data and/orinformation) are being created to provide statistical information thatresearchers are using to discover new innovations and applications inalmost every aspect of contemporary life and lifestyles. However,utilizing data also involves addressing a growing problem, whichincludes identifying data, sources thereof, and managing theever-increasing amount of data becoming available. Moreover, as theamount and complexity of data, datasets, databases, datastores and datastorage facilities increase, the ability to identify, locate, retrieve,analyze, and present data in useful ways is also becoming increasinglydifficult. Today, managing large amounts of data for useful purposesposes a significant problem for individual users, organizations, andentities alike. Conventional techniques are problematic in that theseare neither capable nor configured to manage large scale problems suchas providing integrated access to data that is both available on publicresources as well as those that are hosted or stored on private (i.e.,secure (i.e., requiring authentication or authorization before access ispermitted)) data storage resources. More importantly, users aretypically burdened by conventional techniques in that access to dataoften requires not only proficient, if not expert, knowledge of bothcomputer programming languages commonly known and used by dataresearchers and scientists (e.g., Python™, or others), but knowledge ofcomplex computer databases, datastores, data repositories, datawarehouses, data and object schema, data modeling, graph modeling, graphdata, linked data, and numerous other data science topics is alsorequired. Queries executed to retrieve data using conventionaltechniques typically require knowledge of specific programming orformatting languages, which can limit the usability of data.Specifically, conventional techniques are problematic because these lackintrinsic knowledge or technical functionality to permit a user such asa data scientist to locate, manage, access, and execute queries toretrieve data from various disparate and often dissimilar dataresources.

Thus, what is needed is a solution for managing consolidated, integratedaccess to public and/or privately-accessible (i.e., secure) data withoutthe limitations of conventional techniques.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments or examples (“examples”) of the invention aredisclosed in the following detailed description and the accompanyingdrawings:

FIG. 1 illustrates an exemplary topology for platform management ofintegrated access to public and privately-accessible datasets utilizingfederated query generation and schema rewriting optimization;

FIG. 2 illustrates an exemplary platform architecture for a platform formanaging integrated access to public and privately-accessible datasetsutilizing federated query generation and schema rewriting optimization;

FIG. 3 illustrates an exemplary layered architecture for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization;

FIG. 4 illustrates an exemplary data flow for platform management ofintegrated access to public and privately-accessible datasets utilizingfederated query generation and schema rewriting optimization;

FIG. 5 illustrates an exemplary data operations model illustratingvarious processes for platform management of integrated access to publicand privately-accessible datasets utilizing federated query generationand schema rewriting optimization;

FIG. 6A illustrates an exemplary process flow for platform management ofintegrated access to public and privately-accessible datasets utilizingfederated query generation and schema rewriting optimization;

FIG. 6B illustrates a further exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization;

FIG. 6C illustrates another exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization;

FIG. 6D illustrates an additional exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization;

FIG. 6E illustrates yet a further exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization;

FIG. 7A illustrates an alternative exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization;

FIG. 7B illustrates a further alternative exemplary process flow foroptimization of rewritten queries using platform management ofintegrated access to public and privately-accessible datasets utilizingfederated query generation and schema rewriting optimization; and

FIG. 8 illustrates an exemplary computer system suitable for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization.

DETAILED DESCRIPTION

Various embodiments or examples may be implemented in numerous ways,including as a system, a process, an apparatus, a user interface, or aseries of program instructions on a computer readable medium such as acomputer readable storage medium or a computer network where the programinstructions are sent over optical, electronic, or wirelesscommunication links. In general, operations of disclosed processes maybe performed in an arbitrary order, unless otherwise provided in theclaims.

A detailed description of one or more examples is provided below alongwith accompanying figures. The detailed description is provided inconnection with such examples, but is not limited to any particularexample. The scope is limited only by the claims and numerousalternatives, modifications, and equivalents are encompassed. Numerousspecific details are set forth in the following description in order toprovide a thorough understanding. These details are provided for thepurpose of example and the described techniques may be practicedaccording to the claims without some or all of these specific details.For clarity, technical material that is known in the technical fieldsrelated to the examples has not been described in detail to avoidunnecessarily obscuring the description.

FIG. 1 illustrates an exemplary topology for platform management ofintegrated access to public and privately-accessible datasets utilizingfederated query generation and schema rewriting optimization. Here,topology 100 includes dataset access platform (“platform”) 102,databases 104-106, data networks 108-112 (as used herein, “data network”and “network” may be used interchangeably without limitation orrestriction and are intended to be interpreted similarly with respect tothis Detailed Description and/or the accompanying claims), databases114-118, access control module 120, database 122, and datastore 123(including databases 124-128). In some examples, “topology” may refer toa computer network topology that represents a map or aggregation ofcomputing resources that are used to implement a feature, function, orset or group of functionality, including identified resources, technicalspecifications, protocols, languages, formats, and other elements. Asused herein, “database” (e.g., databases 104-106, 114-118, 122, 124-128)may refer to any type of data storage facility, including, but notlimited to, a standalone, web, networked, or computing cloud-baseddatabase, datastore, data repository, data warehouse, or any other typeof facility or resource that may be used to store and/or retrieve dataand information stored in accordance with a structured, unstructured,relational, or non-relational data schema or data object schema. As usedherein, the terms “computing cloud” or “cloud” may be usedinterchangeably without limitation and may refer to any logicalcollection, grouping, assembly, or identified set of data computingbased resources that provide various types of processing, storage, orother data operation and are not limited to any specific topology orgeographic restriction and may be deployed over a distributed area orset of resources such as a collection of computers or servers located indisparate facilities distributed geographically, without limitation. Insome examples, “datastore” (e.g., datastore 123) may refer to one ormore databases (e.g., databases 104-106, 114-118, 122, 124-128) that aregrouped or otherwise rendered interoperable using logical layers toprovide management or overriding layers of management functionality forpurposes of accessing, storing, and/or retrieving data and informationstored within one or more databases within a given datastore. Adatastore (e.g., datastore 123) does not need to topologically orlogically reside on a single or individual network resource, as anexample, and may be distributed in a widespread or disparatearchitecture using networked resources such as those found within apublic or private (i.e., secured using authentication, authorization,token, password, or any other form of data security technique) datanetwork, a computing cloud, or logical collection of networked datastorage resources. For example, datastore 123 is shown includingdatabases 124-128, but may, in other examples, also include one, some,or none of databases 104-106 and 114-118. Datastore 123 may also beimplemented as a computing cloud and are not limited to any specifictypes of network architectures or topologies and the examples shown hereare provided for purposes of exemplary illustration and description,without limitation. In other examples, other designs and implementationsbeyond those set forth and described herein may be used, withoutlimitation or restriction to any specific design, architecture,implementation, embodiment, or example (i.e., collectively, “example”).

As illustrated in exemplary topology 100, in some examples, datasetaccess platform 102 may be configured to access public and/orprivately-accessible datasets that are hosted on one or more databases,some, all, or none of which may be hosted on data networks such asnetworks 108-112. As used herein, “dataset access platform,” “accessplatform,” and “platform” may be used interchangeably without limitationand, in some examples, refers to a computer program, software, firmware,circuitry, algorithms, logic, hardware, or a combination thereof inorder to implement techniques (e.g., systems, processes, or the like)for providing integrated query, access, retrieval, and other dataoperations using public and private datasets. As shown in topology 100,platform 102 may be configured to access databases 104-106, 114-118, 122and/or datastore 123 including databases 124-128 in order to execute aquery to retrieve one or more datasets stored in these elements.Datasets may be retrieved by, for example, data scientists, researchers,or any other user who may be interested in querying and retrieving adataset for a given purpose. Datasets may include any type, form,format, or amount of publicly-accessible sources of data such as thoseavailable from Data.Gov, the U.S. Department of Defense, oceanographicdata from the National Oceanic and Atmospheric Administration (NOAA), aswell as privately collected, curated, managed, and created datasets suchas those found on corporate, non-profit, research, scientific, oracademic data networks. Datasets may be retrieved from a large number ofsources and, as used herein, are not intended to be limited to anyspecific type, source, or format of data. In some examples, network 108may be a publicly-accessible data network that includes one or moredatabases such as databases 114-118.

In some examples, databases 104-106, 114-118, 122 and datastore 123including databases 124-128 may be accessed or used by dataset accessplatform 102 using a “farm” or collection of graph database engines (seeelement 228 (FIG. 2) below) that are configured to execute queriesreceived by (e.g., queries sent in SQL or other structured orunstructured programming or formatting languages to) platform 102 toretrieve datasets from one or more of 104-106, 114-118, 122 anddatastore 123, which includes databases 124-128, each database of whichmay be configured for public (i.e., open) or private (i.e., secure,authentication required, access controlled, or the like) access, withoutlimitation. In some examples, a dataset may reside on a private database(e.g., within a data network that requires authentication or accesscontrol conditions (e.g., tokens, certificates, passwords, hashes, orthe like) in order to access the data network (e.g., network 112) and/orthe dataset (i.e., which may be stored on database 122 or datastore 123including databases 124-128). Private datasets (e.g., database 122) mayreside on a secure network in order to prevent access to data that maybe sensitive, confidential, private, personal, or otherwise not desiredor intended for public viewing.

As shown, platform 102 may be configured to access datasets stored onpublicly-accessible (i.e., public or open) databases 104-106 and 114-118or, in some examples, private database 122 and/or datastore 123 anddatabases 124-128. Platform 102, in some examples, may be a platform orapplication such as that developed by Data.World of Austin, Tex.,including various features and functionality, as described in some ofthose properties incorporated by reference as set forth above. As shown,datastore 123 includes databases 124-128, although the number, type,format, data schema, and other characteristics may be varied and are notlimited to the examples shown and described. For example, datastore 123may use a database management system (not shown) to manage databases124-128. As shown here, platform 102 may be configured to communicateover one or more other data networks such as the Internet, a privatedata network, or a computing cloud, without limitation to the type ofdata network provided a layered topology is used to communicate queriesto/from platform 102 and a destination or target database (e.g.,databases 104-106, 114-118, 122 and datastore 123 including databases124-128). Platform 102 may also be configured to access datastore 123,which could be housed and operated on a separate data network (e.g.,data network 112) than another data network through which a query orrequest is transmitted, passed, or sent (e.g., data network 110). Inother words, platform 102 may be a standalone, distributed, local,remote, or cloud-based application, process, algorithm(s), computerprogram, software, firmware, hardware, server, or the like (hereafter“application”) that may be a standalone or distributed application, thelatter of which may have one or more resources housed, stored in memory,executed from, or reside on disparate physical resources (e.g., servers,computers, or the like) in different geographic locations. However, whena query or request to query (the terms “query,” “request,” or “requestto query” may be used interchangeably herein) is received by platform102 for one or more of databases 104-106, 114-118, 122 and datastore 123including databases 124-128, platform 102 may be configured to receive,parse, interpret, convert, rewrite, optimize, and execute the query inorder to retrieve a dataset from one of the aforementioned data sources(i.e., databases 104-106, 114-118, 122 and datastore 123 includingdatabases 124-128).

In some examples, a query (e.g., sent in SQL, MySQL, R, XML, Python, orany other programming or formatting language that is used to generateand send queries for retrieving datasets) may be received by platform102 and sent to access control module 120 (as with platform 102, accesscontrol module 120 may be a standalone, distributed, local, remote, orcloud-based application, process, algorithm(s), computer program,software, firmware, hardware, server, or the like (hereafter“application”)), which provides access control functionality andprevents unauthorized access to datasets stored on one or more ofdatabases 122 and 124-128 and datastore 123. In other words, accesscontrol module 120 receives queries on behalf of, for example, a privatedata network (e.g., network 112), which could be a scientific, academic,research, governmental, military, financial, corporate, non-profit, orany other type of data network in which non-public access is desired orsecurity measures including, but not limited to access control module120, are intended to limit, deter, or prevent access. If the queryreceived by platform 102 and sent to network 112, which is an exemplaryprivate data network, is rejected due to a lack of authorization orpermission to access the dataset and/or data network (i.e., an accesscontrol condition is not met), platform 102 can notify a user (notshown) on a display or user interface that indicates a status of thequery (also not shown). For example, a query written in SQL may bereceived by platform 102, which may be a standalone (e.g., hosted,remote, or local) or distributed (e.g., server, network, or cloud-based)software platform composed of multiple programs or scripts (e.g., Java®,JavaScript®, and/or other programming or formatting languages,structured or unstructured, or the like) that is configured to parse andanalyze the query to determine through inference (as described ingreater detail below) attributes, one of which may include an accesscontrol condition that permits the query to be run (i.e., executed)against an access-controlled (e.g., password, encryption,authentication, token-based, or any other form of electronic or digitalsecurity measure intended to limit or prevent access to a given dataset)database, datastore, dataset, network, or the like. Once authenticated(i.e., an access control condition matches or is approved by accesscontrol module 120), a query (not shown) from platform 102 may bepermitted access in order to retrieve a dataset from database 122 ordatastore 123 (and, subsequently, databases 124-128). Due toconventional solutions being problematic in handling and executingqueries in one format against databases that may be in another format,platform 102 is configured to receive, parse, and run inferenceoperations (as described in greater detail below) in order to determineand identify any attributes that may be related to the query, thedataset(s), or the database or datastore in which the dataset(s) arestored. More specifically, platform 102 includes, among other modulesand functionality, an inference engine (not shown) that is configured toinfer one or more attributes of a query, the target dataset (i.e., thedataset requested once the query has been executed), and the sourcedatabase or datastore on which the dataset(s) are stored. Further,platform 102 may also be configured to convert a query from one format(e.g., SQL or another structured or unstructured query language) into adifferent “atomic” format (e.g., RDF™ (as developed by W3C®, or anothertriple-oriented language (i.e., languages and protocols such as SPARQL™(as also developed by W3C®) that may be used to convert data associatedwith queries into subject-predicate-object-oriented data structuresotherwise known as “triples”) that can be used to generate, by platform102, rewritten queries that incorporate other triple data directed toattributes such as type, format, access control conditions, or in anintegrated manner against various types and formats of databases,datastores, data repositories, data warehouses, and the like.

As an example, platform 102 may be configured to rewrite a query (e.g.,programmed or formatted in SQL, Python, R, or other statistical or dataanalytical software) from one format, structure, or schema to another inorder to execute a query against multiple disparate types of datastorage facilities (e.g., databases, datastores, data repositories, datawarehouses, and the like), which may each be of a different schema,structure, and/or type, without restriction. Further, in some examples,platform 102 may be configured to rewrite a query from one format,structure, or schema into another, but also “optimize” a rewritten query(as described in further detail below), by converting data associatedwith one or more inferred attributes that were determined during theparsing of the query upon its receipt by platform 102. “Optimizing” aquery before, during, or after it has been rewritten by platform 102,may, in some examples, refer to optimizing a copy of a query or a masterof a query. Optimizing a query may occur during or after a rewritingoperation has been performed by platform 102, which could include, butis not limited to, rewriting a query (i.e., master or a copy) from onequery language to another format that can then be used to generatefurther downstream queries for different target or disparate databasesthat may include datasets that are either sought, in accordance with theoriginal query, or logic incorporated into platform 102 may execute toinfer there may be other datasets that are indexed or linked (i.e., aslinked data) by platform 102 that, although not known or targeted by theoriginal query, could be returned with the intended target dataset. Insome examples, queries may be optimized after being written from SQL totriples using RDF™, SPARQL™, or the like because the rewritten tripledata, which may be stored in a datastore accessed by platform 102, butintended to store converted triple data from incoming queries (i.e., a“triple store”) may be retrieved with other triple data that has beengenerated resultantly from inferred attributes. In other words, inferredattributes such as type, data types (i.e., specific types of data thatare typically identified by columnar or row headings in a tabularformat, but could also be found in a multi-dimensional grid storagestructure such as name, date, value, postal code, country, state, or anyother type that can be used to identify a logical grouping of data,without limitation or restriction), data structure, data schema, objectschema, addresses (e.g., Uniform Resource Locator (URL), UniformResource Identifier (URI), web address, and the like), layout, design,style, format, language, structure, and others without limitation to anyparticular attribute or type or category thereof. The triple datarewritten from the query and the triple data associated with attributesrelated to the query (hereafter, “query” may refer to a copy of a queryor a master (i.e., original or originally received by platform 102)query, without limitation or restriction) may be specifically rewrittenfor a database housing or storing the intended target dataset database.In some examples, an original query or a copy of an original query maybe subject to various data operations by platform 102, withoutrestriction or limitation. If a copy of an original query is used byplatform 102, the original query may itself be identified as a “master”and saved to one or more of databases 104-106 or another database,datastore, data warehouse, data repository, or other data facility orstructure used by platform 102 to store internal data. Thus, a masterquery or master (hereafter “master”) may be preserved in the event querydata used by platform 102 becomes corrupted or unusable.

In some examples, other databases that are “known” through previousqueries or discovery by platform 102 that may store or house datasetssimilar, related, or associated with the intended dataset may beidentified as a linked dataset or linked data and included in part of adata model or graph that can be used to retrieve data or datasets inresponse to various queries. In other words, platform 102 may use agraph (i.e., data model) that, once a query is received, logic (e.g., alogic module that may employ rules, machine learning, artificialintelligence, deep learning, natural language processing, or otheralgorithms, software, computer programs, applications, or the like toimplement decision-based processing of data) then determines otherlinked data may be related to the dataset sought by the query anddelivered to the user in response. Further, the linked datasets may alsobe included in a modified or new graph that may be created to includethe intended target dataset as a new node within the graph. Varioustypes of graph generation techniques may be used, without limitation orrestrictions, such as mapping different data types (e.g., usingspecification such as comma separated values (“csv”) to RDF, R2RML,among others) and storing these maps as graphs within a database ordatastore (e.g., databases 104-106 and 114-118). Other graph generationtechniques may be used and are not limited to any particular algorithm,process, or methodology.

In some examples, although a SQL-based query may have a SELECT statement(i.e., a programmatic query command or query statement intended to fetchan intended dataset or data stored within a given database), platform102 may be configured to convert the query statement (e.g., SELECT inSQL, and other comparable commands in any other type of query language,structured or unstructured) intro triple data and, using the attributes,include other triple data that can be used to rewrite the query into aformat, language, or structure that can be used to retrieve a datasetfrom a database, regardless of the database format, schema, structure,or language of the target database and dataset(s). Further, the tripledata associated with attributes of the query may also be used to manage,navigate, address, respond to, or otherwise perform data operations atthe target database that may be required before access to the target orintended dataset are permitted or authorized. For example, a password,token, hash value, or any other type of security-oriented attribute maybe converted into one or more triples and, in some examples, an endpointserver (not shown) associated, in data communication, or configured toperform data operations with platform 102 may be used to rewrite thetriple data of the query and the attribute into another form, format,language, structure, or schema for a target database that the endpointserver is configured to communicate with over one or more data networks.In some examples, platform 102 may be configured to receive a query,rewrite the data associated with the query and any attributes (e.g.,attributes of the query, the target dataset(s), the target database(s),paths, linked data, or any other attribute including, but not limited tothose examples provided above) into a language, structure, schema, orformat associated with another database by converting query data (i.e.,data associated with a query) and data associated with attributes of thequeries into triples, execute the rewritten queries, and, in someexamples, return not only the requested dataset(s), but also dataset(s)that may be related to the dataset(s). In other examples, platform 102may be configured to return only the target dataset(s) requested by thequery and no others. In still other examples, platform 102 may beconfigured to return some dataset(s) that may be associated with orrelated to the target dataset(s) requested by the query, which may bedetermined based on rules or logic of platform 102. Further, platform102 may also be configured to create or modify a graph (e.g., datamodel) that is used when a query for a given dataset is received, whichmay be further used to return additional data that could be valuable dueto an attribute-determined relationship or association between thetarget dataset, the query, and other dataset(s) known or graphed oridentified as linked data by platform 102. The above-described topology,elements, and processes may be varied in size, shape, configuration,function, and implementation and are not limited to the examples shownand described.

FIG. 2 illustrates an exemplary system architecture for a platform formanaging integrated access to public and privately-accessible datasetsutilizing federated query generation and schema rewriting optimization.Here, system 200 is shown, including application 201 (in some examples,application 201 may be comparable in function and structure to platform102 as described above in connection with FIG. 1), data communicationbus 202, application programming interface or API (hereafter “API”) 204,proxy/endpoint server 206 (which may also be referred to interchangeablyas a “proxy,” “endpoint,” “proxy server,” “endpoint server”), logicmodule 210, conversion module 212, inference engine 214, query engine216, display module 218, databases 20-224, and graph database engine228. Data elements transferred (i.e., received and sent) fromapplication 201 may take various forms including, but not limited toquery 203, dataset 242 (which may be interchangeably referred to hereinas a “target dataset(s)”), and rewritten query 244. In some examples,system 102 may be an exemplary implementation of platform 102 (FIG. 1).The elements shown and the configuration, structure, relative size ofthe elements, and functions described are not intended to be limitingand the sizes and shapes of the elements have no limitation or meaningapart from those provided within the detailed description of thisspecification or as claimed.

As shown, application 201 may be a implemented as a process, computerprogram, software, firmware, hardware, circuitry, logic, or acombination thereof (hereafter “application”) and, in some examples, maybe written in Java® and/or JavaScript®, among others. Each of elements201-228 may be programmed, developed, or encoded using softwareprogramming techniques familiar to these programming and formattinglanguages or others, without restriction, regardless of whetherobject-oriented, structured, or unstructured. In some examples,application 201 is configured with elements 202-228 in order to receivequery 203 that is directed to retrieve (e.g., fetch, download, accessand copy, or otherwise obtain using one or more data operations) atarget dataset (e.g., dataset 242) in response to rewritten query 244.As described herein, application 201 may be written in any programmingor formatting language (e.g., SQL, Python, R, or others) used to query adatabase. Application 201 may be configured to receive query 203 usingAPI 204 and analyzing, using logic module 210, query 203 to determineone or more attributes associated with query 203, dataset 242, or adatabase (e.g., databases 104-106, databases 114-118, database 122, anddatastore 123 (including databases 124-128) as shown and described abovein connection with FIG. 1). Query 203 may be stored in a databaseconfigured to store query data (i.e., query data 224). Once stored,query 203 may be identified, in some examples, as a “master” of query203. A copy of query 203 may be made and also stored in one or more ofdatabases 220-224 and used as a replica. In other words, a replica orcopy (hereafter, “replica” and “copy” may be used interchangeablywithout restriction or limitation) may be used to perform various dataoperations such as those described herein rather than a master of query203, the latter of which may be preserved (i.e., stored) for later useto restore from an event that results in partial or full loss of thedata in query 203, whether due to corruption, catastrophe, or some otherevent that can cause a similar detrimental or destructive effect. Inother examples, an original version of a query (i.e., theoriginally-received version of query 203) may be used by application201.

Here, in some examples, a replica of query 203 (not shown) or query 203is parsed by logic module 210, which is configured to analyze datareceived by application 201 (e.g., query 203) or dataset 242 and togenerate instructions to other elements within application 201 toperform various data operations such as those described herein.Structurally, logic module 210 may be a set of logical rules oralgorithms for machine learning, deep learning, artificial intelligence,or the like. Logic module 210 may be programmatically coded in one ormore languages such as Java®, JavaScript®, R, or others, withoutlimitation or restriction. Functionally, logic module 210 may beconfigured to perform various data operations such as generating data orsignals to provide instructions to inference engine 214, query engine216, or any other element of application 201. Logic module 210 may alsobe configured to generate and send instructions (i.e., as data orsignals) to graph database engine 228 in order to generate one or moredata models associated with query 203. Further, during parsing,inference engine 214 may be configured to determine attributesassociated with query 203 through inference (e.g., Bayesian,statistical, probabilistic, predictive, or other techniques may beemployed for inference and are not limited to any specific types oftechniques for inferring attribute data associated with query 203). Insome examples, attributes may include, but are not limited to, any typeof information or characteristic associated with or about a query,dataset 242, which is intended to be fetched by query 203 (i.e., using,for example, a SQL FETCH command to retrieve dataset 242 for a givendatabase (not shown)), and the destination or target database from whichdataset 242 is to be retrieved. While examples are provided for thedisclosed techniques to operate on a singular dataset, these may also beextended to operate on multiple datasets and databases, withoutlimitation or restriction. Attributes may include, but are not limitedto, property attributes (e.g., string literal, numerical, or the like),values, qualities, characteristics, or any other data, metadata, andinformation about or related to an item contained within a dataset or adatabase and which can be inferred by inference engine 214. Attributes,once inferred by inference engine 214 as a result of parsing beingdirected by logic module 210, along with query 203 can be converted into“atomic” data or triples in accordance with languages, protocols, andformats such as the Resource Description Framework (hereafter “RDF”) aspromulgated by the World Wide Web Consortium (hereafter “W3C”), SPARQL,and others used for organizing, formatting, programming, converting,structuring, or otherwise manipulating data for use on “semantic web”applications and the like, including semantic uses for retrievingdataset 242 from databases or the like or from other data networks thatdo not employ common data languages, formats, and protocols. Byconverting, for example, SQL-based data (or data for query 203 formattedusing a structured or unstructured language) can be converted into RDFtriple data that can be used as a common base language, format, orprotocol that can later be used by query engine 216 and proxy/endpointserver 206 to “rewrite” or construct rewritten query 244, which isultimately transmitted from application 201 to a database for retrievingdataset 242. In some examples, dataset 242 may be retrieved or fetchedfrom a database using rewritten query 244 and may include not onlydataset 242, but also other datasets that might be related to or aresimilar to the dataset sought.

In some examples, the determination of whether dataset 242 may berelated to other dataset(s) that were previously retrieved or otherwiseindexed by application 201 and its elements (namely, graph databaseengine 228, which may be configured to create a graph or data modelrepresentative of dataset 242 that were previously fetched (i.e.,retrieved) and/or stored in one or more of databases 220-224) may bemade by logic module 210, query engine 216, and graph database engine228. When query 203 is received, for example, logic module 210 analyzesinferred attribute data from inference engine 214 and can generate/sendinstructions to query engine 216 to reference graph database engine 228in order to determine whether any of the triple data converted fromquery 203 and stored in one or more of databases 220-224 matchespreviously converted triple data stored similarly. Alternatively, agraph created of query 203 (or a copy thereof) or dataset 242 may alsobe stored in one or more of databases 220-224 and used as a referencefor a comparison to another graph previously stored in databases 220-224to determine if there is a match (i.e., where there are other datasetsthat may be related (and presumably of interest to a data scientist(i.e., user)) or similarity with dataset 242. In other examples, a ruleor set of rules that establish a percentage or numerical threshold maybe input using logic module 210 (e.g., display module 218 may beconfigured to generate, by executing one or more scripts, forms, orformats such as HTML, XML, PHP, or the like) to provide a user interfacethat a data scientist or researcher (i.e., a user of platform 200) mayuse to input a rule, criteria, or restriction for use in determiningwhether there are any dataset(s) that may be similar to dataset 242. Instill other examples, users may enter other rules, criteria, orrestrictions that permit or do not permit application 201 to returnsimilar or matching datasets for presentation on a user interface (notshown) provided by display module 218, which, working in concert withAPI, may receive and send (for display or visual rendering) data invarious types of formats including, but not limited to HTML, XML, XHTML,or any other type of programming or formatting language that may be usedto generate the user interface.

Referring back to inference engine 214, any attributes inferred may beanalyzed by logic module 210 and then converted into, for example,triple data (e.g., triple formats such as those described herein and inaccordance with protocols such as SPARQL, RDF, among others, withoutlimitation and/or restriction) that can be stored along with the tripledata associated with query 203 itself; stored, that is, in one or moreof databases 220-224. Inference engine 214 may also be configured toinfer attributes about a given dataset(s) such as layout (e.g., columns,rows, axes, matrices, cells, text, among others), data type (e.g.,string literals, numbers, integers, fractions, decimals, whole numbers,and the like), but also exceptions (i.e., data that is inconsistent withinferred attributes or other data within a given dataset(s)). In someexamples, when exceptions are found, display module 218 may beconfigured to visually present, render, or otherwise display, in varioustypes of graphical user interface layouts (not shown), withoutlimitation or restriction. In some examples, user interfaces may bepresented that provide, in addition to data from a retrieved dataset(s),but also exceptions, annotations, outlier data, inferred attributes,attribute data, or others, using techniques that data scientists andresearchers would be familiar with using (e.g., Python, R, and the like)without requiring in-depth or expert knowledge of programming languagesunderlying platform 102 (e.g., SPARQL, RDF, Java®, JavaScript®, amongothers). In some examples, one or more of databases 220-224 may beconfigured to store only triple data, while another database may beconfigured to store query 203 as a master (as previously described) orcopies thereof in order to restore from a catastrophic loss or datacorruption event. As an example, query 203 may be rejected by a targetdatabase (e.g., databases 104-106, databases 114-118, database 122, anddatastore 123 (including databases 124-128) as shown and described abovein connection with FIG. 1) or access control module 120 (FIG. 1))because of a partial or complete corruption of data. A master or copy ofquery 203 may be retrieved by application 201 from one or more ofdatabases 220-224 and used to generate another rewritten query (e.g.,rewritten query 244) using triple data associated with query 203 andtriple data associated with any attributes inferred by inference engine214, both of which may be stored in one or more of databases 220-224.Likewise, dataset 242 or a copy thereof may also be stored in one ormore of databases 220-224. In some examples, attribute(s) determinedfrom inference operations run against query 203 may also include anaccess control condition or data related thereto, such as a password,token, authentication key, private or public key, hash value, or anyother type of data security mechanism.

In some examples, an access control condition, in some examples, as atype of attribute can also be converted by conversion module 212 intotriple data that may be stored in one or more of databases 220-224, oneor all of which may be either local, remote (not shown), or distributed(local or remote) data storage facilities. In some examples, databases220-224 may be standalone, server, network, or cloud-based data storagefacilities and are not limited to the examples or configurations shownand described in connection with FIG. 2.

Referring back to conversion module 212, data associated with query 203(or a copy thereof) may be converted into triple data and stored in oneor more of databases 220-224, which may be later used to generaterewritten query 244 by, in some examples, proxy/endpoint server 206. Insome examples, proxy/endpoint server 206 may be implemented usingmultiple instantiations for different types, structures, formats, anddata schema of databases, datastores, data warehouses, datarepositories, or any other types of data storage facility(s). As shown,after query 203 has been converted into triple data that may be storedin one or more of databases 220-224 (and as further described above) andany inferred attributes determined by inference engine 214 have alsobeen converted into triple data (which may likewise be stored in one ormore of databases 220-224), proxy/endpoint server 206 and query engine216 are configured to generate rewritten query 244 for each targetdatabase (not shown) on which dataset 242 is stored (e.g., as originallyprogrammed using, for example, a FETCH statement in SQL) as well as anyother dataset(s) that have been identified by logic module 210 as aresult of analyzing graphs and/or data models generated by graphdatabase engine 228 and/or those previously generated by graph databaseengine 228 and stored on one or more of databases 220-224 (i.e.,identifying other datasets that may be similar to or match dataset 242,or identifying isomorphic (i.e., data that is related to other data)amongst queried, retrieved, or linked dataset(s)). Further, logic module210 may also limit, expand, or otherwise modify the number and type ofdataset(s) retrieved in response to a fetch command or statement,depending upon rules or instructions provided by a user as received byAPI 204 and display module 218. In still further examples,proxy/endpoint server 206 may include multiple instantiations, each ofwhich is configured to generate multiple rewritten queries for differenttypes, formats, structures, and/or data schemas for various databases(i.e., multiple versions of rewritten query 244, where each version maybe generated for different types of databases (e.g., SQL, MySQL, PHP,XML, or others), without limitation or restriction to any particulartype, format, or data schema of database. The described techniquesenable data scientists (e.g., users) to generate a request using a querylanguage that can be parsed, analyzed, converted, and rewritten in orderto support different types, formats, structures, and data schemaswithout having to manually rewrite each query for a specific type ofdatabase. Further, rewritten query 244 may be “optimized” such that dataor metadata representing attributes inferred by inference engine 214 canalso be included as triple data during the rewriting process (asdescribed in further detail below) in order to include data orinformation that can not only fetch or retrieve dataset 242, but alsodataset(s) that may be useful, valuable, or otherwise related to the onesought by query 203. Optimization may also include rewriting query 203from one query language into triples, as discussed herein, and from thetriples data into rewritten query 244 by proxy/endpoint server 206,which may also include, during the rewriting process (as described ingreater detail below) an access control condition (e.g., password,token, authentication data, encryption data, hash value, or othersecurity data or information) from the converted triple data stored indatabases 220-224 in order for rewritten query 24 to gain access to andretrieve from, for example, dataset 242 from a private (i.e., secure)network (e.g., network 112, which may include access control module 120,datastore 123, and databases 122-128). In other examples, theabove-described elements may be varied in size, shape, configuration,function, and implementation and are not limited to the descriptionsprovided.

FIG. 3 illustrates an exemplary layered architecture for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization. Here, application stack 300 (hereafter “stack 300”)illustrates an exemplary layered architecture that may be used toimplement application 201 (FIG. 2), including application layer 302,query layer 304, linked data layer 306, and data layer 308. Stack 300 isneither a comprehensive nor fully inclusive layered architecture fordeveloping an application or platform for managing integrated access topublic and privately-accessible datasets utilizing federated querygeneration and schema rewriting optimization.

As shown, stack 300 includes application layer 302, which may be thearchitectural layer at which application 201 (FIG. 2) or platform 102(FIG. 1) is coded using, for example, Java®, JavaScript®, Ruby, C+, C++,C#, C, or any other structured or unstructured programming language. Insome examples, data for coded functionality that is used to enable oneor more of the elements shown and described in connection with FIG. 2may be transferred (i.e., sent, received), modified, executed, orotherwise operated on at this layer in the architecture of stack 300. Inother examples, application layer 302 may be implemented differently inthe architecture of application 201.

Query layer 304 is an exemplary layer of the architecture of applicationstack 300, which may be an architectural layer at which query data isretrieved, analyzed, parsed, or otherwise used to transfer data forvarious computing operations associated with receiving query 203 (FIG.2) and generating rewritten query 244 (FIG. 2) in order to retrievedataset 242 (FIG. 2). Query layer 304 may also be the layer in stack 300at which API 204, proxy/endpoint server 206, conversion module 212,inference engine 214, query engine 216, display module 218, databases220-224, and graph database engine 228 receive data and signalsgenerated from logic module 210 for performing various data operations(e.g., parsing, analyzing, converting, rewriting, and optimizing query203 and rewritten query 244, among others) on query 203, dataset 242, orrewritten query 244 prior to converting data associated with these dataelements to triples (as described herein). In other examples, querylayer 304 may be designed, configured, and implemented differently andis not intended to be limited nor restricted to the examples shown anddescribed.

Here, linked data layer 306 may be an architectural data layer at whichquery 203 (FIG. 2) can be analyzed and parsed by logic module 210 (FIG.2), from which graphs may be generated. Once graphs are generated, insome examples, linked data layer 306 is the architectural layer at whichgraph data (not shown) may be transferred (i.e., sent, received) orotherwise communicated between the various elements of application 201(FIG. 2). Further, graph data (i.e., data and metadata associated withgraphs of linked data that are generated, stored, modified, or otherwiseused by application 201 when rewriting and optimizing query 203 intorewritten query 244 (as described in greater detail below).

Here, triple data layer 308 is illustrative of an exemplary layer in thearchitecture of application 201 (FIG. 2) at which “atomic” triple datahas been converted from the native programmatic and/or formattinglanguage of query 203 or another query received by application 201. Asdiscussed above, conversion module 212, in some examples, converts dataassociated with query 203 into RDF or other forms of “atomic” triplesdata, which can be stored by platform 201 (e.g., in databases 220-224).As used herein, “atomic” may refer to a common conversion data formatthat, once converted, can be used to create various types of queries fordatasets stored on different, inconsistent, or incongruous databases.Some examples of types of triple formats and protocols that may be usedto convert query 203 include, but are not limited to RDF, SPARQL, R,Spark, among others. Once converted, triple data layer 308 is the layerat which triple data can be exchanged among the various elements ofapplication 201 (FIG. 2) from which rewritten query 244 can be createdby proxy/endpoint server 206 (FIG. 2) and query engine 216 (FIG. 2) tocreate federated queries (i.e., rewriting query 203 for multipleinconsistent and non-congruous databases (as described herein) usingdisparate data communication and transfer protocols, query languages,data schema, data models, and the like. As used herein, “federated” mayrefer to the described techniques being used to generate, transmit,execute, and manage rewritten queries (i.e., multiple instances ofrewritten query 244) for different databases in order to retrieve notonly the originally-requested dataset of query 203, but other dataset(s)that may be related to, associated with, or included for retrieval,regardless of the data type, format, structure, data schema, data model,graph, or other characteristics of the database on which the datasets(e.g., dataset 242) are stored. Further, any attributes determined byinference engine 214 are also converted by conversion module 212 (FIG.2) and stored in one or more of databases 220-224, but may also beexchanged, transferred, modified, or otherwise operated upon at tripledata layer 308 of stack 300 as shown in FIG. 3. In other examples, stack300 and the various layers shown may be varied in structure, function,format, data type, data model, or other aspects and are not limited tothe examples shown and described.

FIG. 4 illustrates an exemplary data flow for platform management ofintegrated access to public and privately-accessible datasets utilizingfederated query generation and schema rewriting optimization. Here, dataflow 400 includes query triple data 402, attribute triple data 404,query rewrite process 406, rewritten query 408, public datasets 410-412,and private datasets 414-416. In some examples, query triple data 402and attribute triple data 404 are received as data inputs to queryrewrite process 406. Using converted triples (as described above) in,for example, RDF, query rewrite process 406 then generates rewrittenquery 408, which is then directed by proxy/endpoint servers (e.g.,proxy/endpoint server 206 (FIG. 2)) to one or more public and/or privatedatabases that may be housed, stored, operated, distributed by, orotherwise logically accessible on one or more public and/or private datanetworks (not shown). In some examples, rewritten query 408 may besimilar to rewritten query 244 (FIG. 2) and, is converted by conversionmodule 212 (FIG. 2) from triple-formatted data (e.g., query triple(s)402 and attribute triple(s) 404) into the query language or format of atarget dataset (e.g., dataset 242 (FIG. 2), public datasets 410-412,private datasets 414-416, among others). Once rewritten query 408 isgenerated, it may be directed, transmitted, transferred, or otherwiseexecuted as a query against one or more databases (not shown) storingpublic datasets 410-412 and private datasets 414-416. The number, type,shape, and flow of data flow diagram 400 may be varied in process,steps, order, function, description, or other aspects, withoutlimitation or restriction, and are not limited to the examples shown anddescribed.

FIG. 5 illustrates an exemplary data operations model illustratingvarious processes for platform management of integrated access to publicand privately-accessible datasets utilizing federated query generationand schema rewriting optimization. Here, data operations model includesquery data 502, attribute data 504, query rewrite process 506, rewrittenquery 508, and processes for query copy/replication 510, storage 512,triple conversion 514, endpoint query generation 516, and endpoint queryexecution 518. As shown, each of elements 502-518 may be a implementedas a process, computer program, software, firmware, hardware, circuitry,logic, or a combination thereof (hereafter “application”) and, in someexamples, may be written in Java® and/or JavaScript®, or any otherprogramming or formatting language, without limitation or restriction.Elements 502-518 may be programmed, developed, or encoded using softwareprogramming techniques familiar to these programming and formattinglanguages or others, without restriction, regardless of whetherobject-oriented, structured, or unstructured. In some examples, querydata 502 and query attribute data 504 are input to query rewrite process506. Although not shown, query data 502 may be data that is inferred (byinference engine 214 (FIG. 2)) and converted into triples data (e.g.,RDF triples) by conversion module 212 (FIG. 2). Likewise, attribute data504 may be triple data that is converted from inferred data generatedfrom inference engine 214 regarding one or more characteristicsassociated with query 502 (e.g., query 203 (FIG. 2)). Using triple dataassociated with a query (e.g., query 502, query 203 (FIG. 2)) and one ormore attributes inferred from the query (i.e., by inference engine 214(FIG. 2)), query rewrite process 506 may be an application, computerprogram, software, firmware, script, thread, multiple threaded programor application, distributed or cloud-based application, circuitry,logic, or a combination thereof, that is configured to generate arewritten query (e.g., rewritten query 508) that may be executed againstone or more databases. As proxy/endpoint server 206 (FIG. 2) isconfigured to execute rewritten query 508 against a given database andother proxy/endpoint servers (not shown) can be implemented to alsoexecute other instances or versions of rewritten query 508 for differentdatabases, formats, protocols, languages, schema, data models, objectmodels, or the like. In so doing, platform 102 (FIG. 1) and application201 (FIG. 2) can generate, execute, and manage multiple queries similarto a federated system by directing each rewritten query (i.e., rewrittenquery 508) to a proxy/endpoint server 206 that is configured or scriptedto generate and execute a query (e.g., query 508) for a given querylanguage or protocol (e.g., SQL, SPARQL, XPath, MDX, LDAP, Datalog, CQL,and various other structured or unstructured languages or protocols,without limitation or restriction). Some of the processes and dataoperations that support this functionality are shown and describedherein connection with FIG. 5.

In some examples, query copy/replication 510 may be a process that isimplemented by application 201 (FIG. 2) and configured to replicate orcopy (hereafter, “replicate” and “copy” may be used interchangeably tothe generation of a copy or replica of a query (e.g., query 203 (FIG.2)), dataset (e.g., dataset 242 (FIG. 2)), rewritten query (e.g.,rewritten query 244 (FIG. 2)), linked data graph (i.e., “graph”), objectmodel, data model, or any other type of data instance that may be used,manipulated, modified, deleted, generated, created, or otherwiseoperated upon by application 201. Further, query copy/replication 510may be implemented as a process that occurs before, during, after, or asa part of query rewrite 506. In some examples, query copy/replication510 may be also be performed in parallel or serial with other processesor threads (e.g., storage 512, triple conversion 514, endpoint querygeneration 516, endpoint query execution 518, among others). In otherexamples, query/copy replication 510 may be designed, implemented,configured, or otherwise executed differently and is not limited to theexamples shown and described.

When a replica is generated by query copy/replication 510, in someexamples, storage 512 may be configured to run or execute as a processto store a generated copy of a query and the original query (i.e.,master) in one or more databases associated with application 201 (FIG.2) and as described above. Other data, including inferred data such asattribute or characteristic data, graphs, linked data, graph data, andthe like may also be stored and retrieved using storage 512. Asdescribed previously, databases may include any type of data storagefacility that is configured to physically, virtually, logically, orotherwise work with application 201 in a standalone, hosted,distributed, or cloud-based configuration.

Here, triple conversion 514 may be implemented as, for example, aprocess configured to convert query data into triples (e.g., RDFtriples, items that are subject-predicate-object oriented, or anotheratomic format apart from those described herein). Data associated with aquery may include query data received and parsed directly from, forexample, query 203 (FIG. 2) or other data associated withcharacteristics or attributes of a query that may be inferred byinference engine 214 (FIG. 2). Triple data, once converted from query orattribute data, in some examples, may be stored in a similar mannerusing a process similar to that described above in connection withcopy/replica storage 512. Triple data (e.g., query 502, attribute 504)may be used by query rewrite 506 to construct and generate rewrittenquery 508, which can be converted back from a triples-based format(e.g., RDF, SPARQL, or others) into another structured or unstructureddata query language (e.g., SQL, MySQL, and others) by an endpoint server(e.g., proxy/endpoint server 206 (FIG. 2)) that is configured tocommunicate with a given database, datastore, data network, or the likeusing, for example, endpoint query generation 516 as a process for doingso. For example, endpoint query generation 516 may be a process or setof processes used by application 201 (FIG. 2) as an instance running onproxy/endpoint server 206 and which is configured to execute a queryusing endpoint query execution 518 as a process or set of processes todo so. Rewritten queries (e.g., rewritten query 508) may be executedusing endpoint query execution 518 as a process or set of processes thatare configured to execute (i.e., run) against any public or private datanetwork or secure data network such as those provided by Data.Gov, theU.S. Department of Defense, the National Institutes of Health, or otherprivate, corporate, academic, non-profit, or other types oforganizations or entities that have datasets. In some examples,application 201 and graph database engine 228 may be configured togenerate, store, and modify graphs of linked data as datasets areidentified by platform 102 (FIG. 1).

Here, some data networks may utilize SQL as a primary data storage andquery language while others may use DMX for data mining purposes, andstill others may use LDAP for querying services run over TransportControl Protocol/Internet Protocol (i.e., “TCP/IP”). In still otherexamples, proxy/endpoint server 206 may use different query languagesand the processes described herein such as triple conversion 514,endpoint query generation 516, and endpoint query execution 518 are notlimited to any particular language or version thereof. In otherexamples, the above-described processes may be designed, implemented,configured, or otherwise executed differently and are not limited to theexamples shown and described.

FIG. 6A illustrates an exemplary process flow for platform management ofintegrated access to public and privately-accessible datasets utilizingfederated query generation and schema rewriting optimization. Here,process 600 begins by receiving a query (602). Once received a copy(i.e., replica) is generated and a graph is created by, for example,graph database engine 228 (FIG. 2) (604). Once created, the originalquery (e.g., query 203 (FIG. 2)) may be stored as a master and the copymay also be stored, but in the same or a different location (i.e., in adifferent database). Further, any newly-generated or modified graphs andgraph data may also be stored, either in the same, similar, or adifferent location than that of the master and the copy of query 203.Subsequent to generating the copy and the graph, process 600 may includeparsing a copy of the query (606). Further, inference engine 214 (FIG.2) may be directed by control data or signals from logic module 210(FIG. 2) to determine and identify any attributes (i.e.,characteristics) associated with a query, the queried (i.e., requested)dataset(s), any linked data that might suggest other datasets previouslydetermined and identified to be related or similar to the data in therequested dataset (608). A determination is made as to whether anyinferred attributes indicate whether there is an access controlcondition present, such as those described above (610). If no accesscontrol condition is found amongst the inferred attributes, then arewritten query is generated by converting any query data and inferredattribute data into triples using a format such as RDF and then used toconstruct rewritten queries that can be formatted for specific types andquery languages by proxy/endpoint servers (e.g., proxy/endpoint server206 (FIG. 2) that are configured to be in data communication withvarious data networks (612).

Alternatively, in some examples, if an access control condition (e.g.,such as those described above) is determined by inference engine 214(FIG. 2), then the access control condition and the query data areconverted into triples (as described herein) (614). The triple data isthen used to generate a rewritten query (e.g., rewritten query 244 (FIG.2), rewritten query 508 (FIG. 5)) that includes both the query and theaccess control condition (616). Once a query has been rewritten fromtriple data, regardless of whether an access control condition isinferred to be present among the attribute data of the original query,the rewritten query is directed to a given proxy/endpoint server (e.g.,proxy/endpoint server 206 (FIG. 2) which converts the triples data intoa language(s) and format(s) for the target or destination data networkand database (618) after which process 600 ends. In some examples,rewritten queries having access control conditions are sent to privatedata networks to obtain datasets housed (i.e., stored) within (i.e.,private datasets) and rewritten queries without access controlconditions may be sent to public data networks to obtain datasets housedwithin (i.e., public datasets).

Alternative processes may be implemented other than the examples shownand/or described. For example, an alternative process may be included toparse a query to identify its various components and then determine whatdatasets are desired (i.e., targeted) for access. Once determined, thetargeted dataset(s) can be evaluated further by inferring any attributessuch as access control conditions. Access control conditions inferredmay include, but are not limited to, checking token-based accesscontrols for each targeted dataset and, if an access control conditionor attribute indicates access is not authorized by data within thequery, it is rejected and data is transmitted back to the user fordisplay via, for example, display module 218 (FIG. 2). However, if aquery does have an inferred attribute that is an access controlcondition that authorizes access, then a rewritten query may begenerated at each proxy/endpoint server (e.g., proxy/endpoint server206), which each represent an internal endpoint that is configured totransfer data with a given database engine (i.e., database or datanetwork on which a target dataset is stored). Subsequently, rewrittenqueries or those parts of a rewritten query that differ due to the querylanguage or format of a given destination database engine, database,datastore, or data network, may be sent to graph database engine 228(FIG. 2) for updating one or more stored graphs associated with theoriginal query (e.g., query 203 (FIG. 2)) or other graphs. In otherwords, process 600 and alternative processes such as those describedabove may be performed in order to enable, for example, proxy/endpointserver 206 (FIG. 2) to “issue” federated pieces of a query to internalgraph database engines such as graph database engine 228 (FIG. 2). Asused herein, “federation” may refer to an overall process or set ofprocesses or techniques that are used to generate, manage, receiveresponses to, graph, track, and perform other processes related toexecuting a query against multiple incongruous and non-contiguousdatabases, database engines, or data, generally, of different formats,languages, structures (or lack thereof), and the like, while managingintegrated and consolidated retrieval (e.g., fetch) of requesteddatasets in response to the query.

In other examples, the above-described process may be varied infunction, order, procedure, and process, without limitation to any ofthe examples or accompanying descriptions.

FIG. 6B illustrates a further exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization. Here, process 620 illustrates exemplary processes formanaging query copies and masters and initiates by generating a copy ofa query and creating a graph and graph data associated with the queryand its copy (604). In some examples, process 620, for copies ofqueries, identifies the copy as a replica (622), identifies a databaseor datastore for storing the replica (624), updates the graph associatedwith the query to identify (i.e., through the use of metadata, tags,markers, or other elements that can be used to discretely distinguish acopy from a master) the copy or replica to be used for further dataoperations to be performed, for example, by platform 102 (FIG. 1) and/orapplication 201 (FIG. 2). Further, after updating the graph and graphdata, the copy is made available for parsing by, for example, logicmodule 210 (FIG. 2) or the other elements of application 201.

Running as parallel processes to those used for handling query copies asdescribed above, in some examples, a query may be identified as a master(630). Once identified, a database or datastore in data communicationwith application 201 (FIG. 2) is identified to store the master (632).Examples of databases or datastores that may be used to store a masterare databases 220-224 (FIG. 2) or those described above in connectionwith platform 102 and FIG. 1. After identifying a database or datastorein which to store the master, the graph generated for the query isupdated with the stored location of the master and the stored locationof the dataset(s) to be retrieved (i.e., fetched) (634). After inferringthis information (e.g., by running inference engine 214 against amaster), the master is stored in the previously-identified database ordatastore (636). In other examples, the above-described process may bevaried in function, order, procedure, and process, without limitation toany of the examples or accompanying descriptions.

FIG. 6C illustrates another exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization. Here, process 640 initiates (i.e., starts) by receiving acopy of a query from process 628 (FIG. 6B) (642). Once received, thecopy is parsed by, for example, logic module 210 and one or more ofelements 204-228 (FIG. 2) (644). Before, during, or after parsing(despite the exemplary process 640 illustrating parsing occurringbeforehand), inference engine 214 (FIG. 2), for example, is invoked inorder to determine whether any attributes and/or attribute dataassociated with the query can be determined from the copy of the query(646). A determination is then made to determine whether an accesscontrol condition may be present amongst the inferred attribute(s)and/or attribute data (i.e., as inferred by, for example, inferenceengine 214 (FIG. 2)) (648). If an access control condition is determinedto be amongst the inferred attributes and/or attribute data, then theaccess control condition is identified for conversion to a triple dataformat (such as those described herein (e.g., RDF, SPARQL,subject-predicate-object)) (650). Once identified, the attributes and/orattribute data are stored in, for example, a database or datastore usedby application 201 (FIG. 2), along with links in an updated graph (i.e.,a data model of the query), which link the copy of the query and themaster to the attribute(s) and/or attribute data (652). Alternatively,if no access control condition (as described in detail above) is found,then any attribute(s) and/or attribute data is stored with links in anupdated graph, which link the copy of the query and the master to theattribute(s) and/or attribute data (652). In other examples, theabove-described process may be varied in function, order, procedure, andprocess, without limitation to any of the examples or accompanyingdescriptions.

FIG. 6D illustrates an additional exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization. Here, process 660 starts by initiating a rewritingprocess, script, thread, application, software, firmware, or the like,which has been configured to generate rewritten queries (e.g., rewrittenquery 244 (FIG. 2), rewritten query 508 (FIG. 5)) using a proxy/endpointserver (e.g., proxy/endpoint server 206 (FIG. 2)) (662). In someexamples, application 201 (FIG. 2) may have one or more proxy/endpointservers, each of which has been configured to rewrite a query byconverting triple data into another data format for a query languageused by a given data network and dataset. In some examples, the givendata network and dataset may be those originally targeted by a query(e.g., query 203 (FIG. 2)). In other examples, a given data network anddataset may be different than those originally targeted by a query, butwhich may be determined to be related or similar to, associated with, orlinked through analysis of a graph or graph data; the analysis beingperformed by, for example, graph database engine 228 (FIG. 2).

Referring back to FIG. 6D, a copy of a query and any inferred attributesor attribute data are identified for rewriting (664). More specifically,a copy of a query and inferred attributes and/or attribute data has beenconverted into triple data, as described above. Once identified, tripledata and query data can be evaluated by logic module 210 (FIG. 2) toidentify or determine whether an access control condition is anattribute of the query, the dataset, or the data network on which thedataset is stored and, if so, identifying the access control conditionfor inclusion in a rewritten query (e.g., rewritten query 244 (FIG. 2),rewritten query 508 (FIG. 5)) (666). Next, the copy of the query isconverted (as part of the rewriting process) with any attributes orattribute data or access control conditions into triple data inaccordance with a second data format (e.g., RDF, SPARQL, or the like)apart from that of the first data format of the original query (e.g.,query 203). Once converted, the triple data is stored in a triple store(e.g. a datastore configured to store triple-formatted data (e.g., RDF),one or more of databases 220-224 (FIG. 2), or the like)) and controldata and/or signals may be sent from conversion module 212, query engine216, or logic module 210 to one or more proxy/endpoint servers (e.g.,proxy/endpoint server 206 (FIG. 2)) to indicate that query 203 has beenrewritten and is available for further query rewriting by an endpointserver for a given data network and/or database on which the requesteddataset is stored (or on which linked datasets are stored, which may beretrieved and presented for display to a user (e.g., data scientist,researcher, scientist, academic researcher, or any other user orconsumer of data using platform 102 (FIG. 1)) (670). In other examples,the above-described process may be varied in function, order, procedure,and process, without limitation to any of the examples or accompanyingdescriptions.

FIG. 6E illustrates yet a further exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization. Here, process 680 starts by initiating execution of arewritten query (e.g., rewritten query 244 (FIG. 2), rewritten query 508(FIG. 5)) (682). Next, a target dataset (e.g., dataset 242 (FIG. 2)) isidentified for retrieval (i.e., fetch) (684). In some examples, a firstdetermination is made as to whether a target dataset is being stored ona public (i.e., publicly-accessible, open, or access is not subject ordependent upon an access control condition such as those describedabove) or private (secure or subject to authorization or authentication,as described herein) data network (686). If the target dataset is storedon a private data network, then another determination is made as towhether an access control condition is required to access the targetdataset (688). For example, although a given dataset may be hosted(i.e., stored, reposited, or otherwise housed) on a private datanetwork, there may be an access control condition required to accessboth a private data network and a private dataset. In other examples, aprivate dataset may be hosted on a public network and, although anaccess control condition is not required to access the public datanetwork, an access control condition may be required to access a privatedataset stored thereon. While this example is not illustrated, it isneither limited nor restricted from the scope of the techniquesdiscussed herein.

Referring back to FIG. 6E, if an access control condition has beendetected or otherwise determined to be required for a private datanetwork by, for example, inference engine 214 (FIG. 2) (i.e., based oninferring attributes or attribute data associated with a query (e.g.,query 203)), then access to a private data network and a dataset mayeach require an access control condition, as described above. An accesscontrol condition (i.e., authenticating access to a private dataset) maybe performed by including triple data associated with an access controlcondition to be converted and also included in a rewritten query (e.g.,rewritten query 244 (FIG. 2), rewritten query 508 (FIG. 5)). Finally,upon completion of rewriting a query, as described above, a rewrittenquery may be executed by transmission from a proxy/endpoint server(e.g., proxy/endpoint server 206) to either a destination data networkon which a target dataset is stored or to another data network(s) onwhich dataset(s) that may be linked to the requested dataset may also bestored, and retrieving the requested and/or linked dataset(s) (i.e.,linked datasets may be those that are identified as being linked to arequested dataset due to linkages that are identifying in a linked datamodel such as a graph or graph data, which are generated, stored,indexed, and otherwise managed by graph database engine 228 (FIG. 2)(692).

In other examples, a public dataset may be stored on a public networkand, if no access control condition is required, then platform 102(FIG. 1) and/or application 201 (FIG. 2) and the elements describedtherewith may be configured to retrieve a requested and/or linkeddataset(s) or a copy thereof. In other examples, the above-describedprocess may be varied in function, order, procedure, and process,without limitation to any of the examples or accompanying descriptions.

FIG. 7A illustrates an alternative exemplary process flow for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization. Here, process 700 is initiated (i.e., starts) by receivinga query formatted or programmed in a first data schema (e.g., SQL)(702). A copy of the received query is generated (704) and then parsed(706). Resultant from the parsing, attributes are inferred (i.e.,identified) by using various types of inference methods, techniques, andalgorithms, some of which have been described herein (708). Afteridentifying attributes associated with the query, a copy of the querydata is rewritten into a second data format (e.g., RDF). Once convertedinto the second data format, the converted data (e.g., triple data) maybe stored in a triple store for further rewriting and optimization(712). As used herein, “optimization” may refer to one or more actionsthat are taken during the generation of a rewritten query when, inaddition to triple data associated with the original query, other dataassociated with inferred attributes such as access control conditionsare also included (or the converted triple data associated with theinferred attributes and access control condition(s)) in a rewrittenquery, which may be generated by converting the triple data into a thirddata format, which may be the same, a similar, or a different dataformat than that of the original query (712). In other examples, theabove-described process may be varied in function, order, procedure, andprocess, without limitation to any of the examples or accompanyingdescriptions.

FIG. 7B illustrates a further alternative exemplary process flow foroptimizing rewritten queries using platform management of integratedaccess to public and privately-accessible datasets utilizing federatedquery generation and schema rewriting optimization. Here, process 720 isa further detailed process or sub-process for optimizing a rewrittenquery as described above in connection with process step 712 (FIG. 7A).In some examples, triple data configured (e.g., tagged, marked, encoded,or otherwise identified) for a given rewritten query (e.g., rewrittenquery 244 (FIG. 2), rewritten query 508 (FIG. 5)) is received from step710 (FIG. 7A) (722) and an optimization process is initiated when dataor signals are sent from query engine 216 or conversion module 212 tologic module 210 (FIG. 2) to indicate that triple data has been received(724). As used herein, triple data received in step 722 may beassociated with a query (e.g., query 203 (FIG. 2) or a copy of a query(not shown)) and/or any inferred attributes or attribute data determinedby inference engine 214 (FIG. 2)).

Referring back to FIG. 7B, in some examples, a database engine intendedto execute a rewritten query (i.e., the target of an originally-receivedquery (e.g., query 203 (FIG. 2)) from platform 102 (FIG. 1) orapplication 201 (FIG. 2) may be identified (726). A database engine, insome examples, is identified as being assigned to execute queries forthe target dataset(s) and to execute any access control conditions ormechanisms, if any. As used herein, a database engine may also refer toa data server or group of data servers, a data network, a datastore, orany type of database management system that is configured to manage thestorage resource facility on which the queried or requested dataset isstored. Here, data or metadata is used to identify an “optimal” pathfrom a proxy/endpoint server (e.g., proxy/endpoint server 206 (FIG. 2)to a target dataset(s) (728). As used herein, “optimal” may be usedinterchangeably with “best” or “least worst” to identify a path betweenplatform 102 (FIG. 1) and a database engine configured to execute aquery requesting data (e.g., executing a FETCH statement) to retrieve agiven (i.e., target, targeted, requested, or queried) dataset. Morespecifically, an optimal path between platform 102 and a targetdataset(s) may be a path graphed as a series of nodes fromproxy/endpoint server 206 (FIG. 2) to a database engine configured toexecute a query request to retrieve (e.g., FETCH in SQL, or the like) atarget dataset(s). In some examples, an optimal path may be one thatincludes the least number of network nodes (e.g., servers, centraloffices, logical modules or nodes, endpoints, or the like) betweenproxy/endpoint server 206 and the target dataset. In other examples, anoptimal path may be one that is defined by the least number of “hops”between nodes, topologically. In still other examples, an optimal pathmay be one that is determined based on the lowest level of latency interms of data transmission to and from platform 102. In yet otherexamples, an optimal path may be determined based on real-timeassessments of network and network equipment outages. In still furtherexamples, an optimal path may also include nodes or network endpointsthat are within the data network served by the database engineidentified as being configured to execute a query to retrieve a targetdataset(s). In yet other examples, an optimal path may be determineddifferently and is not limited to the examples provided herein. Datadescribing, defining, determining, or otherwise identifying an optimalpath (i.e., path) may include data and/or metadata in any form orformat, including, but not limited to XML, R, RDF, text, HTML, or anyother type of programming or formatting language that may be used togenerate data and metadata (i.e., information that is used to describe,characterize, attribute, or otherwise annotate data), without limitationor restriction.

Referring back to FIG. 7B, data and/or metadata that identifies a pathbetween, for example, proxy/endpoint server 206 (FIG. 2) and a targetdataset(s), may be converted into triple data in accordance with asecond data schema (730). The converted triple data for the path, alongwith converted triple data for the query and any attributes or attributedata, may be retrieved by application 201 and used, by one or moreelements (e.g., proxy/endpoint server 206, logic module 210, conversionmodule 212, query engine 216, among others) to generate a rewrittenquery by converting the triple data into another data schema that isused by a database engine in a destination data network on which atarget dataset(s) or a linked dataset(s) is stored (734). Oncegenerated, a rewritten query (e.g., rewritten query 244 (FIG. 2),rewritten query 508 (FIG. 5)) may be executed by proxy/endpoint server206 and application 201 (FIG. 2). In other examples, the above-describedprocess may be varied in function, order, procedure, and process,without limitation to any of the examples or accompanying descriptions.

FIG. 8 illustrates an exemplary computer system suitable for platformmanagement of integrated access to public and privately-accessibledatasets utilizing federated query generation and schema rewritingoptimization. In some examples, computer system 800 may be used toimplement computer programs, applications, methods, processes, or othersoftware to perform the above-described techniques. Computer system 800includes a bus 802 or other communication mechanism for communicatinginformation, which interconnects subsystems and devices, such asprocessor 804, system memory 806 (e.g., RAM), storage device 808 (e.g.,ROM), disk drive 810 (e.g., magnetic or optical), communicationinterface 812 (e.g., modem or Ethernet card), display 814 (e.g., CRT orLCD), input device 816 (e.g., keyboard), and cursor control 818 (e.g.,mouse or trackball).

According to some examples, computer system 800 performs specificoperations by processor 804 executing one or more sequences of one ormore instructions stored in system memory 806. Such instructions may beread into system memory 806 from another computer readable medium, suchas static storage device 808 or disk drive 810. In some examples,hard-wired circuitry may be used in place of or in combination withsoftware instructions for implementation.

The term “computer readable medium” refers to any tangible medium thatparticipates in providing instructions to processor 804 for execution.Such a medium may take many forms, including but not limited to,non-volatile media and volatile media. Non-volatile media includes, forexample, optical or magnetic disks, such as disk drive 810. Volatilemedia includes dynamic memory, such as system memory 806.

Common forms of computer readable media includes, for example, floppydisk, flexible disk, hard disk, magnetic tape, any other magneticmedium, CD-ROM, any other optical medium, punch cards, paper tape, anyother physical medium with patterns of holes, RAM, PROM, EPROM,FLASH-EPROM, any other memory chip or cartridge, or any other mediumfrom which a computer can read.

Instructions may further be transmitted or received using a transmissionmedium. The term “transmission medium” may include any tangible orintangible medium that is capable of storing, encoding or carryinginstructions for execution by the machine, and includes digital oranalog communications signals or other intangible medium to facilitatecommunication of such instructions. Transmission media includes coaxialcables, copper wire, and fiber optics, including wires that comprise bus802 for transmitting a computer data signal.

In some examples, execution of the sequences of instructions may beperformed by a single computer system 800. According to some examples,two or more computer systems 800 coupled by communication link 820(e.g., LAN, PSTN, or wireless network) may perform the sequence ofinstructions in coordination with one another. Computer system 800 maytransmit and receive messages, data, and instructions, includingprogram, i.e., application code, through communication link 820 andcommunication interface 812. Received program code may be executed byprocessor 804 as it is received, and/or stored in disk drive 810, orother non-volatile storage for later execution. In other examples, theabove-described techniques may be implemented differently in design,function, and/or structure and are not intended to be limited to theexamples described and/or shown in the drawings.

Although the foregoing examples have been described in some detail forpurposes of clarity of understanding, the above-described inventivetechniques are not limited to the details provided. There are manyalternative ways of implementing the above-described inventiontechniques. The disclosed examples are illustrative and not restrictive.

What is claimed:
 1. A method, comprising: receiving at a dataset accessplatform a query formatted using a first schema including a structuredrelational-based format, the query comprising data associated with arequest to access a dataset; generating a copy of the query; saving thequery and the copy to a datastore, the query being identified as amaster; parsing the copy of the query in the first schema, the parsingbeing performed by an inference engine to infer the first schema and anattribute associated with the query, and to generate a graph having oneor more data links between the dataset and another dataset accessible bythe dataset access platform; updating the graph as a data model of thequery to identify elements to distinguish the copy from the master;determining, during the parsing, whether the query comprises other dataassociated with an access control condition associated with accessingthe dataset, the access control condition being configured to indicatewhether the query is configured to provide authentication data to accessthe dataset; and rewriting, using a proxy server, the copy of the queryin a second schema including a triples-based format, if the accesscontrol condition indicates the query is configured to authenticateaccess to the dataset, the rewriting comprising converting, using aframework, the copy of the query into a triple associated with the queryand another triple associated with the other data, the triple and theanother triple being included in a rewritten query in the second schemaincluding the triples-based format directed to one or more endpointsassociated with the dataset access platform to retrieve query resultsfrom a target database configured to store the dataset as graph-baseddata.
 2. The method of claim 1, further comprising creating a triplefile associated with the triple and the another triple, the triple filealso including other data associated with a graph, the graph beingassociated with the query and the attribute.
 3. The method of claim 1,further comprising creating a triple file associated with the triple andthe another triple, the triple file also being configured to indicateone or more property paths associated with the dataset and linked dataassociated with the dataset.
 4. The method of claim 1, wherein the querycomprises a pre-signed uniform resource locator address.
 5. The methodof claim 1, wherein the query comprises a pre-signed uniform resourceindicator.
 6. The method of claim 1, wherein the proxy server isconfigured to convert the query from the first schema to the secondschema using a protocol, the protocol being SPARQL.
 7. The method ofclaim 1, wherein the rewriting is performed using resource descriptionframework to model one or more data relationships of the query.
 8. Themethod of claim 1, wherein the query comprises a publicly-accessibledataset and a privately accessible dataset, the privately-accessibledataset being configured to permit access if the access controlcondition is equal to another condition
 9. The method of claim 8,wherein the another condition is configured to be controlled by theprivately-accessible dataset.
 10. The method of claim 1, wherein therewriting of the copy of the query is configured to generate a federatedquery that is configured to access one or more endpoints of the datasetaccess platform and one or more database engines associated with thedataset.
 11. The method of claim 1, wherein the attribute, duringinference, indicates the query does not include an access controlcondition configured to access the dataset.
 12. The method of claim 1,wherein the attribute, during inference, indicates the dataset isprivately-accessible and the access control condition, is configured toaccess the dataset.
 13. The method of claim 1, further comprisingfederating the copy of the query rewritten in the second schema, thefederated query comprising a triple pattern generated using the secondschema and other data associated with accessing one or moreaccess-controlled datasets, the one or more access-controlled datasetsbeing stored on one or more data networks.
 14. The method of claim 13,wherein each of the one or more endpoints is configured to access atleast one of the one or more data networks.
 15. The method of claim 13,wherein each of the one or more endpoints is configured to access atleast one of the one or more access-controlled datasets.
 16. The methodof claim 1, wherein the first schema including the structuredrelational-based format includes SQL query data.
 17. The method of claim1, wherein parsing the copy of the query comprises: parsing the queryinto a data structure including an abstract syntax tree associated witha target query language.
 18. A non-transitory computer readable mediumhaving one or more computer program instructions configured to perform amethod, the method comprising: receiving at a dataset access platform aquery formatted using a first schema including a structuredrelational-based format, the query comprising data associated with arequest to access a dataset; generating a copy of the query; saving thequery and the copy to a datastore, the query being identified as amaster; parsing the copy of the query in the first schema, the parsingbeing performed by an inference engine, the parsing being configured toidentify the dataset, to infer an attribute associated with the query,and to generate one or more data links between the dataset and anotherdataset accessible by the dataset access platform; updating the graph asa data model of the query to identify via elements to distinguish thecopy from the master; determining, during the parsing, whether the querycomprises other data associated with an access control conditionassociated with accessing the dataset, the access control conditionbeing configured to indicate whether the query is configured to provideauthentication data to access the dataset; and rewriting, using a proxyserver, the copy of the query in a second schema including atriples-based format, if the access control condition indicates thequery is configured to authenticate access to the dataset, the rewritingcomprising converting, using a framework, the copy of the query into atriple associated with the query and another triple associated with theother data, the triple and the another triple being included in arewritten query in the second schema including the triples-based formatdirected to one or more endpoints associated with the dataset accessplatform to retrieve query results from a target database configured tostore the dataset as graph-based data.
 19. A system comprising: a memoryincluding executable instructions; and a processor configured to executethe instructions to: receive at a dataset access platform a queryformatted using a first schema including a structured relational-basedformat, the query comprising data associated with a request to access adataset; generate a copy of the query; saving the query and the copy toa datastore, the query being identified as a master; parse the copy ofthe query in the first schema, the parsing being performed by aninference engine to infer the first schema and an attribute associatedwith the query, and to generate a graph having one or more data linksbetween the dataset and another dataset accessible by the dataset accessplatform; update the graph as a data model of the query to identifyelements to distinguish the copy from the master; determine, during theparsing, whether the query comprises other data associated with anaccess control condition associated with accessing the dataset, theaccess control condition being configured to indicate whether the queryis configured to provide authentication data to access the dataset; andrewrite, using a proxy server, the copy of the query in a second schemaincluding a triples-based format, if the access control conditionindicates the query is configured to authenticate access to the dataset,the rewriting comprising converting, using a framework, the copy of thequery into a triple associated with the query and another tripleassociated with the other data, the triple and the another triple beingincluded in a rewritten query in the second schema including thetriples-based format directed to one or more endpoints associated withthe dataset access platform to retrieve query results from a targetdatabase configured to store the dataset as graph-based data.