Squeryl
Home Learn more Scaladoc Community Follow _squeryl on TwitterTwitter
A Scala ORM and DSL for talking with Databases with minimum verbosity and maximum type safety
Write compiler validated statements.
Squeryl statements that pass compilation won’t fail at runtime. Refactor your schema as often as is required, the Scala compiler and your IDE will tell you exactly which lines of code are affected.
Never repeat yourself
The Composability of Squeryl statements allows you to define them
once and reuse them as sub queries within other statements.
Write declaratively
Write as declaratively as SQL, only with less boilerplate. SQL’s declarativeness is preserved, not encapsulated in a lower level API that requires imperative and procedural code to get things done.
Explicitly control retrieval granularity and laziness
A significant part of optimizing a database abstraction layer is to choose for every situation the right balance between fine and large grained retrieval, and the optimal mix of laziness and eagerness. Data retrieval strategies are explicit in Squeryl rather than driven by configuration like current generation Java ORMs read more
Shirsat. IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue IV):
21-24(April 2018)1. Gary Stoneburner, Alice Goguen, and Alexis Feringa, "Risk Management Guide for Information Technology Systems", Recommendations of the National Institute of Standards and Technology, Special Publication 800-30, pp.1-5, July 2002 2. Richard Kissel, Kevin Stine, Matthew Scholl, Hart Rossman, Jim Fahlsing, Jessica Gulick, "Security Considerations in the System Development Life Cycle ",October 2008, pp. 2-3 3. Ugur Aksu, Hadi Dilek, ˙Islam Tatlı, Kemal Bicakci,˙Ibrahim Dirik,Umut Demirezen, Tayfun Aykır,Ä Quantitative CVSS- Based Cyber Security Risk Assessment Methodology For IT Systems", 23-26 Oct. 2017,IEEE 4. Daniel Tse, Zehan Xie, Zhaolin Song,Äwareness of information security and its implications to legal and ethical issues in our daily life",10-13 Dec. 2017,IEEE 5. Ayesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari, "Enhancing Confidentiality and Privacy of Outsourced Spatial Data", 2015 IEE9E 2nd International Conference on Cyber Security and Cloud Computing, 2015 6. 074747474.5ark Stamp’s, “Information Security Principle and Practice”,Vol-4, Wiley Interscience, pp. 386, 405, 2006.