Preview
Unable to display preview. Download preview PDF.
Literaturverzeichnis
- ACM 88.ACM Task Force on the Core of Computer Science, (P. J. Denning, chairman), Computing as a Disciplin, ACM Publ. # 201880, 1988. auszugsweise auch in: Communications of the ACM 32 (1989), pp. 9–23.Google Scholar
- AhBeUI79.A.V. Aho, C. Beeri, J.D. Ullman, The theory of joins in relational databases, ACM Transactions on Database Systems 4 (1979), pp. 297–314.CrossRefGoogle Scholar
- AhHoUI 83.A.V. Aho, J.E. Hoperoft, J.D. Ullman, Data Structures and Algorithms, Addison-Wesley, Reading etc., 1983.MATHGoogle Scholar
- AhUI 79.A. Aho, J.D. Ullman, Universality of data retrieval languages, Proc. 6th ACM Symposium on Principles of Programming Languages, 1979, pp. 110–120.Google Scholar
- AhSaUl 79a.A.V. Aho, Y. Sagiv, J.D. Ullman, Equivalence among relational expressions, SIAM Journal on Computing 8 (1979), pp. 218–246.MathSciNetMATHCrossRefGoogle Scholar
- AhSaUl 79b.A.V. Aho, Y. Sagiv, J.D. Ullman, Efficient optimization of a class of relational expressions,ACM Transactions on Database Systems 4 (1979), pp. 435–454.CrossRefGoogle Scholar
- AkTa 83.S.G. Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, Vol.1, No.3, 1983, pp. 239–248.CrossRefGoogle Scholar
- Am 81.S.R. Ames, Security kernels: a solution or a problem?, Proc. IEEE Symp. on Security and Privacy, Oakland, 1981, pp. 141–150.Google Scholar
- ANSI 75.ANSI/X3/SPARC Study Group on Data Base Management Systems, Interim Report, FDT (ACM SIGMOD Record) 7 (2).Google Scholar
- ANSI 86.American National Standards Institute, The database language SQL, Document ANSI X3.135, 1986.Google Scholar
- ANSI 89.American National Standards Institute, Database language SQL-Addendum 1, Document ANSI X3.135.1, 1989.Google Scholar
- Ar 74.W.W. Armstrong, Dependency structures of data base relationships,Proc. IFIP Congress 1974, North-Holland, Amsterdam, 1974, pp. 580–583.Google Scholar
- AsBC 76.M.M. Astrahan, M.W. Blasgen, D.D. Chamberlin et al., System R: arelational approach to data base management, ACM Transaction on Database Systems 1 (1976), pp. 97–137.Google Scholar
- AtABM 82.P. Atzeni, G. Ausiello, C. Batini, M. Moscarini, Inclusion and equivalence between relational database schemes,Theoretical Computer Science 19 (1982), pp. 267–285.MathSciNetMATHCrossRefGoogle Scholar
- AtBDDMZ 89.M. Atkinson, F. Bancilhon, D.J. DeWitt, K.R. Dittrich, D. Maier, S. Zdonik, The object-oriented database system manifesto,Proc. Conf. on Deductive and Object-Oriented Databases (DOOD), Kyoto, 1989, pp. 4057.Google Scholar
- AtDe 93.P. Atzeni and V. DeAntonellis, Relational Database Theory, Benjamin /Cummings, Redwood City etc., 1993.MATHGoogle Scholar
- Ba 78.F. Bancilhon, On the completeness of query languages for relational databases, Proc. 7th Symposium on Mathematical Foundations of Computing, Springer, New York etc., 1978, pp. 112–123.Google Scholar
- Ba 88.F. Bancilhon, Object-oriented database systems, Proc. ACM Symposium on Principles of Database Systems, 1988, pp.152–162.Google Scholar
- BaDeKa 92.F. Bancilhon, C. Delobel, P. Kanellakis (eds.), Building an Object-Oriented Database System: The Story of 02, Morgan Kaufmann, San Mateo, 1992.Google Scholar
- BaRa 86.F. Bancilhon, R. Ramakrishnan, An amateur’s introduction to recursive query processing strategies,Proc. ACM Int. Conf. Management of Data (SIGMOD 86), 1986, pp. 16–52.CrossRefGoogle Scholar
- Be 76.P.A. Bernstein, Synthesizing third normal form relations from functional dependencies, ACM Transactions on Database Systems 1 (1976), pp. 272–298.CrossRefGoogle Scholar
- BeBeGo 78.C. Beeri, P.A. Bernstein, N. Goodman, A sophisticate’s introduction to database normalization theory, Proc. 4th International Conference on Very Large Data Bases, Berlin, 1978, pp. 113–124.Google Scholar
- BeHaGo 87.P.A. Bernstein, V. Hadzilacos, N. Goodman, Concurrency Control and Recovery in Database Systems,Addison-Wesley, Reading etc., 1987.Google Scholar
- BeVa 84a.C. Beeri, M.Y. Vardi, Formal systems for tuple-and equality generating dependencies, SIAM Journal on Computing 13 (1984), pp. 76–98.MathSciNetMATHCrossRefGoogle Scholar
- BeVa 84b.C. Beeri, M.Y. Vardi, A proof procedure for data dependencies,Journal ACM 31 (1984), pp.718–741.MathSciNetMATHCrossRefGoogle Scholar
- BeLa 74.D.E. Bell, L.J. LaPadula, Secure Computer Systems, Mitre Corporation, Bedford, 1974.Google Scholar
- BeNo 77.E. Bergmann, H. Noll, Mathematische Logik mit Informatik-Anwendungen, Springer, Berlin etc., 1977.MATHCrossRefGoogle Scholar
- BeOrSa95.E. Bertino, F.Origgi, P. Samarati, A new authorization model for object-oriented databases, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc.,1995, pp. 199–222.Google Scholar
- BFMY 83.C. Beeri, R. Fagin, D. Maier, M. Yannakakis, On the desirability of acyclic database schemes, Journal ACM 30 (1983), pp. 479–513.MathSciNetMATHCrossRefGoogle Scholar
- Bi 81.J. Biskup, A formal approach to null values in database relations, Advances in Data Bases Theory - Volume 1 (eds: H. Gallaise, J. Minker, J.M. Nicolas), Plenum, New York - London, 1981, pp. 299–341.Google Scholar
- Bi 88.J. Biskup, Privacy respecting permissions and rights, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 173–185.Google Scholar
- Bi 89.J. Biskup, Verantwortung des Hochschullehrers für Informatik, Informatik-Spektrum 12 (1989), pp. 158–161.Google Scholar
- Bi 93.J. Biskup, Sicherheit von IT-Systemen als “sogar wenn - sonst nichts - Eigenschaft”, Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS ‘83, Vieweg, Braunschweig-Wiesbaden, 1993, pp. 239–254.Google Scholar
- Bi 94.J. Biskup, Impacts of creating, implementing and using formal languages, Proc. 13 th World Computer Congress 94, Volume 3 (eds: K. Duncan, K. Krueger), Elsevier, Amsterdam etc., 1994, pp. 402–407.Google Scholar
- Bib 93.W. Bibel, Wissensrepräsentation und Inferenz, Vieweg, Braunschweig- Wiesbaden, 1993.CrossRefGoogle Scholar
- BiB1 94.J. Biskup, G. Bleumer, Reflections on security of database and datatransfer systems in health care, Proc. 13th of World Computer Congress 94, Volume 2 (eds: K. Brunnstein, E. Raubold), Elsevier, Amsterdam etc., 1994, pp. 549–556.Google Scholar
- BiBr 83.J. Biskup, H.H. Brüggemann, Universal relation views: a pragmatic approach, Proc. 9th International Conference on Very Large Data Bases, Florence, 1983, pp. 172–185.Google Scholar
- BiBr 88.J. Biskup, H.H. Brüggemann, The personal model of data - towards aprivacy-oriented information system, Computers amp; Security 7 (1988), pp. 575–597.CrossRefGoogle Scholar
- BiBr 88a.J. Biskup, H.H. Brüggemann, Data manipulation languages for the universal relation view DURST, Proc. 1st Symposium on Mathematical Fundamentals of Database Systems, Lecture Notes in Computer Science 305, Springer, Berlin etc., 1988, pp. 20–41.Google Scholar
- BiBr91.J. Biskup, H.H. Brüggemann, Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick, Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS ‘81, Darmstadt, Informatik-Fachberichte 271, Springer, Berlin etc., 1991, pp. 146–158.Google Scholar
- BiBSK 86.J. Biskup, H.H. Brüggemann, L. Schnetgöke, M. Kramer, One flavor assumption and y-acyclicity for universal relation views,Proc. 5th ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Cambridge, 1986, pp. 148–159.Google Scholar
- BiCo 86.J. Biskup, B. Convent, A formal view integration method,Proc. ACM SIGMOD Int. Conference on Management of Data, Washington, 1986, pp. 398–407.Google Scholar
- BiCo 91.J. Biskup, B. Convent, Relational chase procedures interpreted as resolution with paramodulation,Fundamenta Informaticae 15 (1991), pp.123–138.MathSciNetMATHGoogle Scholar
- BiDaBe 79.J. Biskup, U. Dayal, P.A. Bernstein, Synthesizing independent database schemes, Proc. ACM SIGMOD Int. Conference on Management of Data, Boston, 1979, pp. 143–151.Google Scholar
- BiDu 91.J. Biskup, P. Dublish, Objects in relational database schemes with functional, inclusion and exclusion dependencies, extented abstract: Proc. 3rd Symposium on Mathematical Fundamentals of Database and Knowledge Base Systems, Rostock, 1991, Lecture Notes in Computer Science 495, Springer, Berlin etc., 1991, pp. 276–290; full paper: RAIRO Theoretical Informatics and Applications 27 (1993), pp. 183–219.Google Scholar
- BiDuSa 95.J. Biskup, P. Dublish, Y. Sagiv, Optimization of a subclass of conjunctive queries, Acta Informatica 32 (1995), pp. 1–26.MathSciNetMATHCrossRefGoogle Scholar
- BiEc 93.J. Biskup, Ch. Eckert, Sichere Delegation in Informationssystemen, Proc. GI-Fachtagung Verläßliche Informationssysteme (Hrsg.: G. Weck, P. Horster), Vieweg, Braunschweig-Wiesbaden, 1993, pp. 107–133.Google Scholar
- BiGr 89.J. Biskup, H.-W. Graf, Analysis of the privacy model for the information system DORIS, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp.123–140.Google Scholar
- BiMoLa 95.J. Biskup, M. Morgenstern, C.E. Landwehr, editors, Database Security, VIII: Status and Prospects, North-Holland, Amsterdam etc., 1995.Google Scholar
- BiRä 87.J. Biskup, U. Räsch, The equivalence problem for relational database schemes, Proc. 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, 1987, Lecture Notes in Computer Science 305, Springer, Berlin etc., pp. 42–70.Google Scholar
- Bo 80.D.A. Bonyun, The secure relational database management system kernel - three years after, Proc. IEEE Symp. on Security and Privacy, Oakland, 1980, pp. 34–37.Google Scholar
- Bö 85.E. Börger, Berechenbarkeit, Komplexität, Logik, Vieweg, Braunschweig-Wiesbaden, 1985, 1992.Google Scholar
- Br 89.H.H. Brüggemann, Interaction of authorities and acquaintances in the DORIS privacy model of data, Proc. MFDBS 89, Lecture Notes in Computer Science 364, Springer, Berlin etc., 1989, pp. 85–99.Google Scholar
- Br 92.H.H. Brüggemann, Rights in an object-oriented environment,Database Security, V: Status and Prospects (eds: C.E. Landwehr, S. Jajodia), North-Holland, Amsterdam etc., 1992, pp. 99–105.Google Scholar
- BrHaMü 89.W. Brauer, W. Haacke, S. Munch, Studien-und Forschungsführer Informatik, Springer, Berlin etc., 1989.MATHCrossRefGoogle Scholar
- BrMyS 84.M.L. Brodie, J. Mylopoulos, J.W. Schmidt (editors), On Conceptual Modelling, Springer, Berlin etc., 1984.MATHCrossRefGoogle Scholar
- BrVo 88.V. Brosda, G. Vossen, Update and retrieval in a relational database through a universal schema interface, ACM Transactions on Database Systems 13 (1988), pp. 449–485.MathSciNetMATHCrossRefGoogle Scholar
- Bry 90.F. Bry, Query evaluation in recursive databases: bottom-up and top-down reconciled, Data amp; Knowledge Engineering 5 (1990), pp. 289–312.CrossRefGoogle Scholar
- Bu 91.Der Bundesbeauftragte für den Datenschutz, Bundesdatenschutzgesetz — Text und Erläuterung, Bonn, 1991.Google Scholar
- BuOtSt 91.P. Butterworth, A. Otis, J. Stein, The GemStone object database system, Communications of the ACM 34 (10) 1991, pp. 64–77.CrossRefGoogle Scholar
- BuSh 84.B. Buchanen, E. Shortliffe (eds), Rule Based Expert Systems, Addison-Wesley, Reading etc., 1984.Google Scholar
- Bvg 83.Bundesverfassungsgericht, Urteil vom 15. Dezember 1983 zum Volkszählungsgesetz 1983, Bundesanzeiger 35, 241a (1983).Google Scholar
- Ca 94.R.G.G. Cattell, editor, The Object Database Standard ODMG 93, Morgan Kaufman, San Mateo, 1994.Google Scholar
- CaFaPa 84.M.A. Casanova, R. Fagin, C.H. Papadimitriou, Inclusion dependencies and their interaction with functional dependencies,Journal of Computer and System Sciences 28 (1984), pp. 29–59.MathSciNetMATHCrossRefGoogle Scholar
- CaFMS 95.S. Castano, M.G. Fugini, G. Martella und P. Samarati, Database Security, Addison-Wesley/ACM, Reading etc., 1995.MATHGoogle Scholar
- CaTFB 89.M.A. Casanova, L. Tucherman, A.L. Furtado, A. Braga, Optimization of relational schemes containing inclusion dependencies, Proc. 15th International Conference on Very Large Data Bases, Amsterdam, 1989, pp. 317–325.Google Scholar
- CeGoTa 90.S. Ceri, G. Gottlob, L.Tanca, Logic Programming and Databases, Springer, Berlin etc., 1990.Google Scholar
- CePe 84.S. Ceri, G. Pelagatti, Distributed Databases: Principles and Systems, McGraw-Hill, New York, 1984.Google Scholar
- Ch 76.P.P.-S. Chen, The entity-relationship-model - towards a unified view of data,ACM Transactions on Database Systems 1 (1976), pp. 9–36.CrossRefGoogle Scholar
- ChAE 76.D.D. Chamberlin, M.M. Astrahan, K.P. Eswaran et al., SEQUEL2: a unified approach to data definition, manipulation, and control, IBM Journal Research and Development 20 (1976), pp. 560–575.MATHCrossRefGoogle Scholar
- ChGrMi88.U.S. Chakravarthy, J.Grant, J. Minker, Foundations of semantic query optimisation for deductive databases, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp.243–273.Google Scholar
- ChHa 80.A.K. Chandra, D. Harel, Computable queries for relational data bases, Journal of Computer and System Sciences 21 (1980), pp. 156–178.MathSciNetMATHCrossRefGoogle Scholar
- ChVa 85.A.K. Chandra, M.Y. Vardi, The implication problem for functional and inclusion dependencies is undecidable, SIAM Journal on Computing 14 (1985), pp. 671–677.MathSciNetMATHCrossRefGoogle Scholar
- ChLe 73.C.-L. Chang, R.C.-T. Lee, Symbolic Logic and Mechanical Theorem Proving,Academic Press, New York - London, 1973.Google Scholar
- ChMc 85.E. Charniak, D. McDermott, Introduction to Artificial Intelligence, Addison-Wesley, Reading etc., 1985.MATHGoogle Scholar
- ChMe 77.A.K. Chandra, P.M. Merlin, Optimal implementation of conjunctive queries in relational databases, Proc. 9th ACM SIGACT Symposium on Theory of Computing, 1977, pp.77–90.Google Scholar
- C1Wi 87.D.D. Clark, D.R. Wilson, A comparison of commercial and military computer security policies, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, pp. 184–194.Google Scholar
- Co 70.E.F. Codd, A relational model of data for large shared data banks, Communications of the ACM 13 (1970), pp. 377–387.MATHCrossRefGoogle Scholar
- Co 72a.E.F. Codd, Relational completeness of database sublanguages,Data Base Systems, Courant Institute Computer Science Symposia Series 6, (ed.: R. Rustin), Prentice-Hall, Englewood Cliffs, 1972, pp.65–98.Google Scholar
- Co 72b.E.F. Codd, Further normalization of the database relational,Data Base Systems, Courant Institute Computer Science Symposia Series 6, (ed.: R. Rustin), Prentice-Hall, Englewood Cliffs, 1972, pp.33–64.Google Scholar
- Co 74.Congress, 93rd - 2nd Session, Privacy Act of 1974,Public Law 93–579.Google Scholar
- Co 79.E.F. Codd, Extending the database relational model to capture more meaning, ACM Transaction on Database Systems 4 (1979), pp. 397–434.CrossRefGoogle Scholar
- Co 82.E.F. Codd, Relational databases: a practical foundation for productivity, Communications of the ACM 25 (1982), pp. 109–117.CrossRefGoogle Scholar
- CoKa 84.S.S. Cosmadakis, P.C. Kanellakis, Functional and inclusion dependencies - a graph theoretic approach, 3rd ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Waterloo, 1984, pp. 29–37.Google Scholar
- Con 89.B. Convent, Datenbankschemaentwurf für ein logikorientiertes Datenmodell, Dissertation, Universität Hildesheim, 1989.Google Scholar
- CoNPRSSS 92.W. Coy, F. Nake, J.-M. Pflüger, A. Rolf, J. Seetzen, D. Siefkes, R. Strausfeld (Hrsg.), Sichtweisen der Informatik, Vieweg, Braunschweig-Wiesbaden, 1992.MATHCrossRefGoogle Scholar
- Coy 89.W. Coy, Brauchen wir eine Theorie der Informatik ?, Informatik- Spektrum 12 (1989), pp. 256–266.Google Scholar
- CrGrHi 94.A.B. Cremers, U. Griefahn, R. Hinze, Deduktive Datenbanken - Eine Einführung aus der Sicht der logischen Programmierung, Vieweg, Braunschweig-Wiesbaden, 1994.MATHGoogle Scholar
- Cu 89.R. Cummins, Meaning and Mental Representation, MIT Press, Cambridge-London, 1991.Google Scholar
- CyCo 94.G. Cyranek, W. Coy, Herausgeber, Die maschinelle Kunst des Denkens —Perspektiven und Grenzen der Künstlichen Intelligenz, Vieweg, Braunschweig-Wiesbaden, 1994.Google Scholar
- Da 86.C.J. Date, An Introduction to Database Systems, Volume I (4th Edition), Addison-Wesley, Reading etc., 1986.Google Scholar
- Da 83.C.J. Date, An Introduction to Database Systems, Volume II, Addison-Wesley, Reading etc., 1983.Google Scholar
- DaDeLi 80.G.I. Davida, R.A. DeMillo, R.J. Lipton, A system architecture to support a verifiably secure multilevel security system,Proc. IEEE Symp. on Security and Privacy, Oakland, 1980, pp. 137–144.Google Scholar
- DaMyNy 67.O.J. Dahl, B. Myrhaug, K. Nygaard, SIMULA 67: Common Base Language, Publication NS 22, Norsg Regnesentral, Oslo 1967.Google Scholar
- DaWeKa 81.G.I. Davida, D.L. Wells, J.B. Kam, A database encryption system with subkeys, ACM Transactions on Database Systems 6 (1981), pp. 312–328.MathSciNetCrossRefGoogle Scholar
- DaYe 82.G.I. Davida, Y. Yeh, Cryptographic relational algebra, Proc. IEEE Symp. on Security and Privacy, Oakland, 1982, pp. 111–116.Google Scholar
- De 78.C. Delobel, Normalization and hierarchical dependencies in the relational data model, ACM Transactions on Database Systems 3 (1978), pp. 201–222.CrossRefGoogle Scholar
- De 82.D.E. Denning, Cryptography and Data Security, Addison-Wesley, Reading etc., 1982.MATHGoogle Scholar
- De 84.D.E. Denning, Cryptographic checksums for multilevel database security, Proc. IEEE Symp. on Security and Privacy, 1984, Oakland, pp. 52–61.Google Scholar
- De 88.D.E. Denning, Lessons learned from modeling a secure multilevel relational database system, Database Security: Status and Prospects (ed. C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 35–43.Google Scholar
- DeLSHS 87.D.E. Denning, T.F. Lunt, R.R. Schell, M. Heckman, W. Shockley, A multilevel relational data model, Proc. IEEE Symp. on Security and Privacy, Oakland, 1987, pp. 220–234.Google Scholar
- DePa 84.P. DeBra, J. Paredaens, Horizontal decompositions for handling exceptions to functional dependencies,Advances in Data Base Theory - Volume 2, (H. Gallaire, J. Minker, J.M. Nicolas, eds.), Plenum, New York - London, 1984, pp. 123–141.Google Scholar
- Di 90.R. Dierstein, The concept of secure information processing systems and their basic functions, Proc. IFIP/SEC ‘80 (ed.: K. Dittrich), Espoo (Helsinki), North-Holland, Amsterdam etc., 1991, pp. 133–149.Google Scholar
- DiHaPf 89.K. Dittrich, M. Härtig, H. Pfefferle, Discretionary Access control in structurally object-oriented database systems, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp.105–121.Google Scholar
- Do 88.J. Dobson, Security and Databases: A Personal View, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 11–21.Google Scholar
- Do 90.J. Dobson, Conversation structures as a means of specifying security policy,Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 25–39.Google Scholar
- DoD 83.Department of Defense Computer Security Center, Trusted Computer Systems Evaluation Criteria, CSC-STD-011–83, Fort Meade, 1983.Google Scholar
- DoMc 89.J.E. Dobson, J.A. McDermid, Security models and enterprise models, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp. 1–39.Google Scholar
- DoPo 77.D. Downs, G. Popek, A kernel design for a secure data base managment system, Proc. 3rd Int. Conf. on Very Large Data Bases, 1977, pp. 507514.Google Scholar
- Dr 94.H. Dreyfus, Den Geist konstruieren vs. Das Gehirn modellieren: Die KI kehrt zu einem Scheideweg zurück, Die maschinelle Kunst des Denkens (Hrsg: G. Cyranek, W. Coy), Vieweg, Braunschweig-Wiesbaden, 1994, pp. 215–23.0.Google Scholar
- DuRi 92.R. Durchholz, G. Richter, Compositional Data Objects: The IMC /IMC2 Reference Manual,Wiley, Chichester etc., 1992.Google Scholar
- E1Na 89.R. Elmasri, S.B. Navathe, Fundamentals of Database Systems, Benjamin / Cummings, Redwood City etc., 1989.MATHGoogle Scholar
- EsGLT 76.K.P. Eswaran, J.N. Gray, R.A. Lorie, I.L. Traiger, The notions of consistency and predicate locks in a database system,Communications of the ACM 19 (1976), pp. 624–633.MathSciNetMATHCrossRefGoogle Scholar
- Fa 77.R. Fagin, Multivalued dependencies and a new normal form for relational databases,ACM Transactions on Database Systems 2 (1977), pp. 262–278.CrossRefGoogle Scholar
- Fa 83.R. Fagin, Degrees of acyclicity for hypergraphs and relational database schemes,Journal ACM 30 (1983), pp. 514–550.MathSciNetMATHCrossRefGoogle Scholar
- FaVa 84.R. Fagin, M.Y. Vardi, The theory of data dependencies - an overview, Proc. 11th Int. Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science 172, Springer, Berlin etc., 1984, pp. 1–22.Google Scholar
- F1ZBK 92.Ch. Floyd, H. Züllighoven, R. Budde, R. Keil-Slawik, editors, Software Development and Reality Construction, Springer, Berlin etc., 1992.CrossRefGoogle Scholar
- Fr 89.J.C. Freytag, The basic principles of query optimization in relational database management systems, Information Processing 89 (G.X. Ritter, ed.), Elseviers Science Publishers (North-Holland), Amsterdam etc., 1989, pp. 801–807.Google Scholar
- Fu 88.M. Fugini, Secure database development methodologies,Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 103–129.Google Scholar
- GaMi 78.H. Gallaire, J. Minker (eds.), Logic and Data Bases, Plemm, New York, 1978.MATHCrossRefGoogle Scholar
- Ge 93.W. Gerhardt, Zugriffskontrolle bei Datenbanken, Oldenbourg, München- Wien, 1993.Google Scholar
- GoRo 83.A. Goldberg, D. Robson, Smalltalk-80: The Language and its Implementation,Addison-Wesley, Reading, etc., 1983.Google Scholar
- Gr 84.R. Graubart, The integrity-lock approach to secure database management, Proc. IEEE Symp. on Security and Privacy, 1984, Oakland, pp. 62–74.Google Scholar
- Gr 90.R. Graubart, A comparison of three secure dbms architectures, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 167–190.Google Scholar
- GrMi 85.J. Grant, J. Minker, Normalization and axiomatization for numerical dependencies, Information and Control 65 (1985), pp. 1–17.MathSciNetMATHCrossRefGoogle Scholar
- GrRe 93.J. Gray, A. Reuter, Transaction Processing: Concepts and Techniques, Morgan Kaufmann, San Mateo, 1993.MATHGoogle Scholar
- GrSt 93.R. Grimm, A. Steinacker, Das Kooperations-und das Gleichgewichtsmodell — Theorie und Praxis, Proc. GI-Fachtagung Verläßliche Informationssysteme (Hrsg.: G. Weck, P. Horster), Vieweg, Braunschweig-Wiesbaden, 1993, pp. 85–106.Google Scholar
- Gu 80.E. Gudes, The design of a cryptography based secure file system, Proc. IEEE Transactions on Software Engineering, Vol. SE-6, No.5, 1980, pp. 411–420.Google Scholar
- Gil 92.R.H. Güting, Datenstrukturen und Algorithmen, Teubner, Stuttgart, 1992.MATHGoogle Scholar
- Ha 81.J. Habermas, Theorie des kommunikativen Handelns, Band I: Handlungsrationalität und gesellschaftliche Rationalisierung, Band II: Zur Kritik der funktionalistischen Vernunft, Suhrkamp, Frankfurt, 1981.Google Scholar
- Ha 88.J.T. Haigh, Modeling database security requirements, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 103–129.Google Scholar
- Hä 78.T. Härder, Implementierung von Datenbank-Systemen, Hanser, München, 1978.Google Scholar
- Hä 87.T. Harder, Realisierung von operationalen Schnittstellen in: DatenbankHandbuch (Hrsg.: P.C. Lockemann, J.W. Schmidt), Springer, Berlin etc., 1987, pp. 163–335.Google Scholar
- He 73.H. Hermes, Introduction to Mathematical Logic, Springer, Berlin etc., 1973.MATHGoogle Scholar
- He 86.T. Herrmann, Zur Gestaltung der Mensch-Computer-Interaktion: Systemerklärung als kommunikatives Problem, Niemeyer, Tübingen, 1986.Google Scholar
- He 92.A. Heuer, Objektorientierte Datenbanken: Konzepte, Modelle, Systeme, Addison-Wesley, Bonn etc., 1992.Google Scholar
- HoKu 89.D. Hofbauer, R.-D. Kutsche, Grundlagen des mathematischen Beweisens, Vieweg, Braunschweig - Wiesbaden, 1989.Google Scholar
- Hu 86.R. Hull, Relative information capacity of simple relational database schemata, SIAM Journal on Computing 15 (1986), pp. 856–886.MathSciNetMATHCrossRefGoogle Scholar
- Hu 87.R. Hull, A survey of theoretical research on typed complex database objects, Databases (ed. J. Paredaens), International Lecture Series in Computer Science, Academic Press, London etc., 1987.Google Scholar
- HuDeTi 9.M.-Y. Hu, S.A. Demurjian, T.C. Ting, User-role based security profiles for an object-oriented design model,Database Security, VI: Status and Prospects (eds: B.M. Thuraisingham, C.E. Landwehr), North-Holland, Amsterdam etc., 1993, pp. 333–348.Google Scholar
- HuKi 87.R. Hull, R. King, Semantic database modeling: survey, applications, and research issues, ACM Computing Surveys 19 (1987), pp. 201–260.CrossRefGoogle Scholar
- IoLa 94.Y.E. Ioannidis, Y. Lashkari, Incomplete path expressions and their mdisambiguation Proc. ACM SIGMOD International Conference on Management of Data, 1994, pp. 138–149. Google Scholar
- ITSEC 91.Information Technology Security Evaluation Criteria (ITSEC), Office for Official Publications of the European Communities, Luxembourg, 1991.Google Scholar
- JaJa 60.A.M. Jaglom, I.M. Jaglom, Wahrscheinlichkeit und Information (Übersetzung aus dem Russischen), VEB Deutscher Verlag der Wissenschaften, Berlin, 1960.Google Scholar
- JaKo 84.M. Jarke, J. Koch, Query optimization in database systems, ACM Computing Surveys 16,2 (1984), pp. 111–152.MathSciNetCrossRefGoogle Scholar
- JaLa 91.S. Jajodia, C.E. Landwehr, editors, Database Security, IV: Status and Prospects,North-Holland, Amsterdam etc., 1991.Google Scholar
- JaMcB194.S. Jajodia, C.D. McCollum, B.T. Blaustein, Integrating concurrency control and commit algorithms in distributed multilevel secure databases, Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 109–121.Google Scholar
- JeRe 91.T. Jell, A. von Reelsen, Objektorientiertes Programmieren mit C++, Hanser, München-Wien, 1991.Google Scholar
- JoDi 95.D. Jonscher, K. Dittrich, Current trends in database technology and their impact on security concepts, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc.,1995, pp. 11–33.Google Scholar
- Ju 90.G. Jumarie, Relative Information, Springer, Berlin etc., 1990.Google Scholar
- Ka 92.G.O.H. Katona, Combinatorial and algebraic results for database relations, Proc. 4th Inf. Conference on Database Theory, Berlin, 1992, Lecture Notes in Computer Science 646, Springer, Berlin etc. 1992, pp. 1–20.Google Scholar
- KaCoVa 83.P.C. Kanellakis, S.S. Cosmadakis, M.Y. Vardi, Unary inclusion dependencies have polynomial inference problems, Proc. 15th Symposium on Theory of Computing, Boston, 1983, pp. 246–277.Google Scholar
- KaK1 93.P. Kandzia, H.-J. Klein, Theoretische Grundlagen relationaler Datenbanksysteme,BI Wissenschaftsverlag, Mannheim etc., 1993.Google Scholar
- KaWe 73.T. Kameda, K. Weihrauch, Einführung in die Codierungstheorie I, Bibliographisches Institut, Mannheim etc., 1973.MATHGoogle Scholar
- Ke 78.W. Kent, Data and Reality - Basic Assumptions in Data Processing Reconsidered,North-Holland, Amsterdam etc., 1978.Google Scholar
- Ke 83.W. Kent, A simple guide to five normal forms in relational databases, Communications of the ACM 26 (1983), pp. 120–125.CrossRefGoogle Scholar
- KeLa 94.T.F. Keefe, C.E. Landwehr, editors, Database Security, VII: Status and Prospects, North-Holland, Amsterdam etc., 1994.Google Scholar
- KeMo 93.A. Kemper, G. Moerkotte, Basiskonzepte objektorientierter Datenbanksysteme, Informatik-Spektrum 16, 2 (1993), pp. 69–80.Google Scholar
- KiKiSa 92.M. Kifer, W. Kim, Y. Sagiv, Querying object-oriented databases, Proc. ACM SIGMOD Int. Conference on Management of Data, 1992, pp. 393–402.Google Scholar
- KiLa 89.M. Kifer, G. Lausen, F-Logic: a higher order language for reasoning about objects, inheritance and schema, Proc. ACM SIGMOD Int. Conference on Management of Data, 1989, pp. 134–146.Google Scholar
- KiLaWu 93.M. Kifer, G. Lausen, J. Wu, Logical foundations of object-oriented and frame-based languages, TR 93/06, Department of Computer Science, SUNY at Stony Brook, 1993, to appear in Journal of the ACM.Google Scholar
- Kn 68.D. Knuth, The Art of Computer Programming, Volume 1: Fundamental Algorithms (2nd edition), Addison-Wesley, Reading etc., 1973.Google Scholar
- Kn 73.D. Knuth, The Art of Computer Programming,Volume 3: Sorting and Searching, Addison-Wesley, Reading etc., 1973.Google Scholar
- KoKFVU 84.H.F. Korth, G.M. Kuper, J. Feigenbaum, A. VanGeldern, J.D. Ullman, A database system based on the universal relation assumption, ACM Transactions on Database Systems 9 (1984), pp. 331–347.CrossRefGoogle Scholar
- La 88.C.E. Landwehr, editor, Database Security: Status and Prospects, North- Holland, Amsterdam etc., 1988.Google Scholar
- La 89.C.E. Landwehr, editor, Database Security, II: Status and Prospects, North-Holland, Amsterdam etc., 1989.Google Scholar
- La 81.G. Lamprecht, Introduction to SIMULA 67, Vieweg, Braunschweig-Wiesbaden, 1981.Google Scholar
- LaGSF 90.M. Larrondo-Petrie, E. Gudes, H. Song, E.B. Fernandez, Security policies in object-oriented databases, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp.257–268.Google Scholar
- LaHeMc 84.C.E. Landwehr, C.L. Heitmeyer, J. McLean, A security model for military message systems, ACM Transactions on Computer Systems, Vol. 2, No. 3, 1984, pp. 198–222.CrossRefGoogle Scholar
- LaJa 92.C.E. Landwehr, S. Jajodia, editors, Database Security, V: Status and Prospects,North-Holland, Amsterdam etc., 1992.Google Scholar
- LaMa 91.G. Lausen, B. Marx, Eine Einführung in Frame-Logik, in. Entwicklungstendenzen bei Datenbanksystemen (Hrsg.: G. Vossen, K.-U. Witt), Oldenbourg, München, 1991, pp. 173–202.Google Scholar
- Le 92.M. Levene, The Nested Universal Relation Database Model, Lecture Notes in Computer Science 595, Springer, Berlin etc., 1992.CrossRefGoogle Scholar
- Li 95.L. Libkin, Approximation in databases, Proc. 5th International Conference on Database Theory, ICDT ‘85, Lecture Notes in Computer Science 893, Springer, Berlin etc., pp. 411–424.Google Scholar
- Ll 87.J.W. Lloyd, Foundations of Logic Programming (2nd, extended edition), Springer, Berlin etc., 1987.MATHCrossRefGoogle Scholar
- LoDi 87.P.C. Lockemann, K.R. Dittrich, Architektur von Datenbanksystemen, in: Datenbank-Handbuch (Hrsg.: P.C. Lockemann, J.W. Schmidt), Springer, Berlin etc., 1987, pp. 85–161.CrossRefGoogle Scholar
- LoKrKr 93.P.C. Lockemann, G. Krüger, H. Krumm, Telekommunikation und Datenhaltung, Hanser, München-Wien, 1993.MATHGoogle Scholar
- LoMiRa 92.J. Lobo, J. Minker, A. Rajaseker, Foundations of Disjunctive Logic Programming, MIT Press, Cambridge, 1992.Google Scholar
- LoSc 87.P.C. Lockemann, J.W. Schmidt, Datenbank-Handbuch, Springer, Berlin. etc., 1987.MATHCrossRefGoogle Scholar
- LoWo 88.F.H. Lochovsky, C.C. Woo, Role-based security in data base management systems, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 209–222.Google Scholar
- Lu 84.N. Luhmann, Soziale Systeme - Grundriß einer allgemeinen Theorie, Suhrkamp, Frankfurt, 1984 (Zitat nach Suhrkamp Taschenbuch Wissenschaft 666, 1987).Google Scholar
- Lu 88.A.L. Luft, Informatik als Technik-Wissenschaft: Eine Orientierungshilfe für das Informatikstudium,Bibliographisches Institut, Mannheim etc., 1988.Google Scholar
- LuDSHS 90.T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman, W.R. Shockley, The Sea View security model,IEEE Transactions on Software Engineering 16 (1990), pp. 593–607.CrossRefGoogle Scholar
- LyMWF 94.N. Lynch, M. Merritt, W. Weihl, A. Fekete, Atomic Transactions, Morgan Kaufmann, San Mateo, 1994.Google Scholar
- Ma 84.S. Maaß, Mensch-Rechner-Kommunikation: Herkunft und Chancen eines neuen Paradigmas, Dissertation, Universität Hamburg, FBI-HH-B104184, 1984.Google Scholar
- Mah 88.M.J. Maher, Equivalence of logic programs, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp. 627–658.Google Scholar
- Mai 83.D. Maier, The Theory of Relational Databases, Computer Science Press, Rockville, 1983.MATHGoogle Scholar
- MaMa 83.F. Machlup, U. Mansfield (eds.), The Study of Information, Wiley, New York etc., 1983.Google Scholar
- MaRä 92.H. Mannila, K.-J. Räihä, The Design of Relational Databases, Addison-Wesley, Wokingham etc., 1992.MATHGoogle Scholar
- MaU1Va 84.D. Maier, J.D. Ullman, M.Y. Vardi, On the foundations of the universal relation model, ACM Transactions on Database Systems 9 (1984), pp. 283–308.MathSciNetMATHCrossRefGoogle Scholar
- McHo 90.J.A. McDermid, E.S. Hocking, Security policies for integrated project support environments,Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 41–74.Google Scholar
- Me 84a.K. Mehlhorn, Data Structures and Algorithms 1: Sorting and Searching, Springer, Berlin etc., 1984.Google Scholar
- Me 84b.K. Mehlhorn, Data Structures and Algorithms I: Graph-Algorithms and NP-Completeness, Springer, Berlin etc., 1984.Google Scholar
- Me 84c.K. Mehlhorn, Data Structures and Algorithms I. Multi - Dimensional -Searching and Computational Geometry,Springer, Berlin etc., 1984.Google Scholar
- Me 87.C. Meadows, The integrity lock architecture and its application to message systems: reducing covert channels, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, pp. 212–218.Google Scholar
- Me 90.C. Meadows, Constructing containers using a multilevel relational data model,Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 127–141.Google Scholar
- Mi 83.J.C. Mitchell, The implication problem for functional and inclusion dependencies, Information and Control 56 (1983), pp. 154–173.MathSciNetMATHCrossRefGoogle Scholar
- MiEi92.P. Mishra, M.H. Eich, Join processing in relational databases, ACM Computing Surveys 24 (1992), pp. 63–113.CrossRefGoogle Scholar
- MuPi 94.I.S. Mumick, H. Pirahesh, Implementation of magic-sets in a relational atabase system,Proc. ACM SIGMOD Int. Conference on Management of Data, Minneapolis, 1994, pp. 103–114.Google Scholar
- Mü 74.P.J. Müller, Die Gefährdung der Privatsphäre durch Datenbanken, in: U. Dammann, M. Karhausen, P. Müller, W. Steinmüller, Datenbanken und Datenschutz, Frankfurt-New York 1974, pp. 63–90.Google Scholar
- NaS 89.Nationale IT-Sicherheitskrite rien, Bundesanzeiger-Verlag, 1989.Google Scholar
- NyOs 95.M. Nyanchama, S. Osborn, Access rights administration in role-based security systems, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc., 1995, pp. 37–56.Google Scholar
- OmWe 83.K.A. Omar, D.L. Wells, Modified architecture for the sub-keys model, Proc. IEEE Symposium on Security and Privacy, 1983, Oakland, pp. 79–86.Google Scholar
- Ont 92b.Ontos Inc., Ontos DB 2.2: Reference Manual, Volume 1, Class and Function Libraries, Ontos Inc., Burlington, 1992.Google Scholar
- Ora 90.Oracle Corporation, SQL Language Reference Manual, Version 6.0, Redwood Shores, 1990.Google Scholar
- OtWi 90.T. Ottmann, P. Widmayer, Algorithmen und Datenstrukturen, BI-Wissenschaftsverlag, Mannheim etc., 1990.MATHGoogle Scholar
- ÖzVa 91.M.T. Özsu, P. Valduriez, Principles of Distributed Database Systems, Prentice-Hall, Englewood Cliffs, 1991.Google Scholar
- Pa 78.J. Paredaens, On the expressive power of the relational algebra, Information Processing Letters 7 (1978), pp. 44–49.MathSciNetCrossRefGoogle Scholar
- Pa 86.C. Papadimitriou, The Theory of Database Concurrency Control, Computer Science Press, Rockville, 1986.MATHGoogle Scholar
- Pa 92.D.B. Parker, Restating the foundation of information security, IT- Security: The Need for International Cooperation, Proc. IFIP/SEC ‘82, North-Holland, Amsterdam etc., 1992, pp. 139–151.Google Scholar
- PaDGV 89.J. Paredaens, P. De Bra, M. Gyssens, D. Van Gucht, The Structure of the Relational Database Model, Spnnger, Berlin etc., 1989.MATHGoogle Scholar
- PaVa 92.M. Papazoglou, W. Valder, Entwurf relationaler Datenbanken in C, Hanser/Prentice-Hall, Wien/London, 1992.Google Scholar
- Pe 62.C.A. Petri, Kommunikation mit Automaten,Schriften des Institutes für Instrumentelle Mathematik Nr.2, Bonn, 1962.Google Scholar
- PeMa 88.J. Peckham, F. Maryanski, Semantic data models,ACM Computing Surveys 20 (1988), pp. 153–189.MATHCrossRefGoogle Scholar
- Pr 94.I. Pratt, Artificial Intelligence, Macmillan, Houndsmills — London, 1994.Google Scholar
- Ra 82.P. Raulefs, Methoden der künstlichen Intelligenz: Übersicht und Anwendungen in Expertensystemen, GI-Jahrestagung ‘82, Informatik-Fachbericht 57, Berlin etc., 1982, pp. 170–187.Google Scholar
- Ra 88.F. Rabitti, D. Woelk, W. Kim, A model of authorization for object-oriented and semantic databases,Proc. Int. Conf. on Extending Database Technology, Venice, March 1988, Lecture Notes in Computer Science 303, Springer, Berlin etc., 1988, pp. 231–250.Google Scholar
- Re 85a.W. Reisig, Petri Nets - An Introduction,EATCS Monographs on Theoretical Computer Science, Springer, Berlin etc., 1985.Google Scholar
- Re 85b.W. Reisig, Systementwurf mit Netzen, Springer, Berlin etc., 1985.MATHCrossRefGoogle Scholar
- Re 89.H.L. Resnikoff, The Illusion of Reality, Springer, New York etc., 1989.MATHCrossRefGoogle Scholar
- Re 93.B. Reinwald, Workflow-Management in verteilten Systemen, Teubner, Stuttgart-Leipzig, 1993.Google Scholar
- RiAdDe 78.R.L. Rivest, L. Adleman, M.L. Dertouzos, On data banks and privacy homomorphisms, in: Foundation of Secure Computation (eds: DeMillo, Dobkin, Jones, Lipton), Academic Press, New York, 1978, pp. 169–177.Google Scholar
- RuBPEL 91.J. Rumbaugh, M. Blaha, W. Premerlani, F. Eddy, W. Lorensen, Object-Oriented Modeling and Design, Prentice-Hall, Englewood Cliffs, 1991.Google Scholar
- Sa 83.Y. Sagiv, A characterization of globally consistent databases and their correct access paths, ACM Transactions on Database Systems 8 (1983), pp. 266–286.CrossRefGoogle Scholar
- Sag 88.Y. Sagiv, Optimizing datalog programs, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp.659–698.Google Scholar
- SaJa 92.R.S. Sandhu, S. Jajodia, Polyinstantiation for cover stories, Proc. 2nd European Symposium on Research in Computer Security, ESORICS ‘82, Lecture Notes in Computer Science 648, Springer, Berlin etc., 1992, pp. 307–328.Google Scholar
- SaSwWa 94.K. Sagonas, T. Swift, D.S. Warren, XSB as an efficient deductive database engine, Proc. ACM SIGMOD Int. Conference on Management of Data, Minneapolis, 1994, pp. 442–453.Google Scholar
- Sch 76.G. Schlageter, Prozeßsynchronisation in Datenbanksystemen, Habilitationsschrift, Universität Karlsruhe, 1976 (Process synchronization in database systems, ACM Transactions on Database Systems 3 (1978), pp. 248–271).CrossRefGoogle Scholar
- SchBr 83.J.W. Schmidt, M.L. Brodie, Relational Database Systems - Analysis and Comparison, Springer, Berlin etc., 1983.CrossRefGoogle Scholar
- SeTu 94.P.S. Sell, B.M. Thuraisingham, Applying OMT for designing multilevel database application,Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 41–64.Google Scholar
- Sh 67.J.R. Shoenfield, Mathematical Logic, Addison-Wesley, Reading etc., 1967.MATHGoogle Scholar
- Shm 87.O. Shmueli, Decidability and expressiveness aspects of logic queries, Proc. ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1987, pp.237–249.Google Scholar
- Si 90.D. Siefkes, Formalisieren und Beweisen - Logik für Informatiker, Vieweg, Braunschweig-Wiesbaden, 1990.MATHGoogle Scholar
- SmSm 77.J.M. Smith, D.C.P. Smith, Database abstraction: aggregation and generalization, ACM Transactions on Database Systems 2 (1977), pp. 105–133.CrossRefGoogle Scholar
- SmWi 92.K. Smith, M. Winslett, Entity modeling in the MLS relational model Proc. 18th Int. Conf. on Very Large Data Bases, 1992, pp. 199–210.Google Scholar
- SpKWSH 86.D. Spooner, A.M. Keller, G. Wiederhold, J. Solasin, D. Heystek, Framework for the security component of an ADA DBMS, Proc. 12 th. Int. Conf. on Very Large Data Bases, Kyoto, 1986, pp. 347–354.Google Scholar
- SpLa 90.D.L. Spooner, C.E. Landwehr, editors, Database Security, III: Status and Prospects,North-Holland, Amsterdam etc., 1990.Google Scholar
- St 86.M. Stonebraker (ed.), The INGRES Papers: Anatomy of a Relational Database System,Addison-Wesley, Reading etc., 1986.Google Scholar
- StLeRo 76.R.E.Stearns, P.M.Lewis II, D.J.Rosenkrantz, Concurrency control for database systems, Proc. 17th IEEE Symp. on Foundations of Computer Science, 1976, pp. 19–32.Google Scholar
- Str 86.B. Stroustrup, The C++ Programming Language, Addison-Wesley, Reading etc., 1986.MATHGoogle Scholar
- StWKH 76.M. Stonebraker, E. Wong, P. Kreps, G. Held, The design and implementation of INGRES, ACM Transactions on Database Systems 1 (1976), pp. 189–222.CrossRefGoogle Scholar
- Ta 88.A.S. Tanenbaum, Computer Networks (2nd edition), Prentice-Hall, Englewood Cliffs, 1988.Google Scholar
- TaZa 71.G. Takeuti, W.M. Zaring, Introduction to Axiomatic Set Theory, Springer, Berlin etc., 1971.MATHGoogle Scholar
- TeYaFr 86.T.J. Teory, D. Yang, J.P. Fry, A logical design methodology for relational databases using the extended entity-relationship model, ACM Computing Surveys 18 (1986), pp.197–222.CrossRefGoogle Scholar
- Th 91.B. Thalheim, Dependencies in Relational Databases, Teubner, Stuttgart - Leipzig, 1991.MATHGoogle Scholar
- ThLa 93.B.M. Thuraisingham, C.E. Landwehr, editors, Database Security, VI: Status and Prospects, North-Holland, Amsterdam etc., 1993.Google Scholar
- ThSa 94.R.K. Thomas, R.S. Sandhu, Towards a unified framework and theory for reasoning about security and correctness of transactions in multilevel databases, Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 309–328.Google Scholar
- Ti 88.T.C. Ting, A user-role based data security approach, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 187–208.Google Scholar
- TiTu 88.M.-T. Tinnefeld, H. Tubies, Datenschutzrecht, Oldenbourg, MünchenWien, 1988.Google Scholar
- TsK1 78.D. Tsichritzis, A. Klug, The ANSI/X3/SPARC DBMS framework, Information Systems 3 (1978), pp.173–191.CrossRefGoogle Scholar
- Ul 88.J.D. Ullman, Principles of Database and Knowledge-Base Systems, Volume I, Computer Science Press, Rockville, 1988.Google Scholar
- Ul 89.J.D. Ullman, Principles of Database and Knowledge-Base Systems, Volume II, Computer Science Press, Rockville, 1989.Google Scholar
- Ul 91.J.D. Ullman, A comparison between deductive and object-oriented database systems, Proc. 2nd Inf. Conf. on Deductive and Object-Oriented Databases (DOOD `91), Munich, Lecture Notes in Computer Science 566, Springer, Berlin etc., 1991, pp. 263–277.Google Scholar
- Va 84.M.Y. Vardi, The implication and finite implication problem for typed template dependencies, Journal of Computer and System Sciences 28 (1984), pp. 3–28.MathSciNetMATHCrossRefGoogle Scholar
- Va 88.M.Y. Vardi, Fundamentals of dependency theory, Trends in Theoretical Computer Science (E.Börger, ed.), Computer Science Press, Rockville, 1988, pp. 171–224.Google Scholar
- Va 88a.M.Y. Vardi, The universal-relation data model for logical independence, IEEE Software 5 (1988), pp. 80–85.CrossRefGoogle Scholar
- VaVo 93.J. Van den Bussche, G. Vossen, An extension of path expresssions to simplify navigation in object-oriented queries, Proc. 3rd International Conference on Deductive and Object-Oriented Databases, Lecture Notes in Computer Science 760, Springer, Berlin etc., 1993, pp. 267–282.Google Scholar
- ViVi 87.B. Vickery, A. Vickery, Information Science in Theory and Practice, Bowker-Saur, London etc., 1987.Google Scholar
- Vo 94.G. Vossen, Datenmodelle Datenbanksprachen und Datenbank- management-Systeme, Addison-Wesley, Bonn etc., 2. aktualisierte und veränderte Auflage 1994.Google Scholar
- Vo 91a.G. Vossen, Data Models, Database Languages and Database Management Systems,Addison-Wesley, Wokingham etc., 1991.Google Scholar
- Vo 91b.G. Vossen, Modellbildung für Datenbank-Transaktionen, in: Entwicklungstendenzen bei Datenbanksystemen (Hrsg.: G. Vossen, K.U. Witt), Oldenbourg, München, 1991, pp. 277–316.Google Scholar
- VoHa 93.G. Vossen, M. Gross-Hardt, Grundlagen der Transaktionsverarbeitung, Addison-Wesley, Bonn etc., 1993.Google Scholar
- VoWi 88.G. Vossen, K.-U. Witt, Das SQL/DS - Handbuch, Addison-Wesley, Bonn etc., 1988.Google Scholar
- We 88.G. Weikum, Transaktionen in Datenbanksystemen, Addison-Wesley, Bonn etc., 1988.Google Scholar
- We 85.C.F. von Weizsäcker, Aufbau der Physik, Hanser, München-Wien, 1985.Google Scholar
- We 92.H. Wedekind, Objektorientierte Schemaentwicklung — Ein kategorialer Ansatz für Datenbanken und Programmierung, BI-Wissenschaftsverlag, Mannheim etc., 1992.Google Scholar
- WeHä 76.H. Wedekind, T. Härder, Datenbanksysteme II Bibliographisches Institut Mannheim etc., 1976.MATHGoogle Scholar
- Wi 86.N. Wirth, Algorithmen und Datenstrukturen mit Modula-2, Teubner, Stuttgart, 1986.MATHGoogle Scholar
- Wi 87.G. Wiederhold, File Organization for Database Design, McGraw-Hill, New York, 1987.Google Scholar
- Ya 79.S.B. Yao, Optimization of query evaluation algorithms, ACM Transactions on Database Systems 4 (1979), pp.133–155.CrossRefGoogle Scholar
- Za 76.C. Zaniolo, Analysis and design of relational schemata for database systems,UCLA-ENG-7669, Computer Science Department, University of California Los Angelos, 1976.Google Scholar
- Ze 71.H. Zemanek, Was ist Informatik ?, Symposium “Informatik: Aspekte und Studienmodelle”, 17.-19.2.1971, Technische Hochschule Wien, 1971, pp. 5–18.Google Scholar
- Ze 89.C.A. Zehnder, Informationssysteme und Datenbanken (5. Auflage), Teubner, Stuttgart, 1989.Google Scholar
- Ze 92.H. Zemanek, Das geistige Umfeld der Informationstechnik, Springer, Berlin etc., 1992.MATHGoogle Scholar
- Zl 77.M.M. Zloof, Query-by-Example: a data base language, IBM Systems Journal 16 (1977), pp. 324–343.CrossRefGoogle Scholar
- Zl 82.M.M. Zloof, Office-by-Example: a business language that unifies data, word processing and electronic mail, IBM Systems Journal 21 (1982), pp. 272–304.CrossRefGoogle Scholar
Copyright information
© Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden 1995