Data Selection, Sharing, and Access Control in a Relational Scenario
Fully fledged database systems have operational characteristics not commonly provided by programming language systems. Examples of this would be access and integrity control, failure recovery, data sharing, and concurrency management.
This chapter discusses the way in which programming language constructs (such as data structures and their selection mechanisms, scope rules, procedures, modules, and variable import and passing mechanisms) can be utilized to support the above operational characteristics in the context of an integrated database programming environment.
KeywordsExpense Eter Rium Paral Suffix
Unable to display preview. Download preview PDF.
- [BSR80]Bernstein, P.A., D.W. Shipman, J.B. Rothnie, “Concurrency Control in a System for Distributed Databases” (SDD-1),ACM Transactions on Database Systems, Vol. 5, No. 1, March 1980.Google Scholar
- [BS82b]Brodie, M.L., J.W. Schmidt (eds.), “Final Report of the ANSI/X3/SPARC DBS-SG Relational Database Task Group,”SIGMOD Record, Vol. 12, No. 4, July 1982.Google Scholar
- [CODD71]Cold, E.F., “A Database Sublanguage Founded on the Relational Calculus,”Proc. SIGFIDET Workshop, San Diego, Calif., 1971.Google Scholar
- [CODD82]Cold, E.F., “Relational Database: A Practical Foundation for Productivity,”Communications of the ACM, Vol. 25, No. 2, February 1982.Google Scholar
- [EGL76]Eswaren, K.P., J.N. Gray, R.A. Lorie, I.L. Traiger, “The Notions of Consistency and Predicate Locks in a Database System,”Communications of the ACM, Vol. 19, No. 11, November 1976.Google Scholar
- [GRAY78]Gray, J. N., “Notes on Data Base Operating Systems,”Proc. Advanced Course on Operating Systems, Munich, West Germany, inLecture Notes in Computer Science, No. 60, Springer- Verlag, New York, 1978.Google Scholar
- [KLEE71]Kleene, S. C., Introduction to Metamathematics, Elsevier North-Holland, New York, 1971.Google Scholar
- [KR81]Kung, H.T., J.T. Robinson, “On Optimistic Methods for Concurrency Control,” ACM Transactions on Database Systems, Vol. 6, No. 2, June 1981.Google Scholar
- [KUHN67]Kuhns, J. L., “Answering Questions by Computer—a Logical Study,” Memorandum RM 2428 PR, Rand Corporation, Santa Monica, Calif., December 1967.Google Scholar
- [LS80]Lamersdorf, W., J.W. Schmidt, “Specification of Pascal/R,” Report No. 73/74, Fachbereich Informatik, Univ. of Hamburg, July 1980.Google Scholar
- [LOR177]Lorie, R.A., “Physical Integrity in a Large Segmented Database,” ACM Transactions on Database Systems, Vol. 2, No. 1, March 1977.Google Scholar
- [RS81]Reimer, M., J.W. Schmidt, “Transaction Procedures with Relational Parameters,” Report No. 45, Institut fuer Informatik, ETH Zurich, October 1981.Google Scholar
- [SCHM77]Schmidt, J.W., “Some High Level Language Constructs for Data of Type Relation,” ACM Transactions on Database Systems, Vol. 2, No. 3, September 1977.Google Scholar
- [SCHM82]Schmidt, J.W., “Generalized Data Definition and Selection Mechanisms,” Fachbereich Informatik, Univ. of Hamburg, 1982 (to appear).Google Scholar
- [SK80a]Silberschatz, A., Z. Kedem, “Consistency in Hierarchical Database Systems,” Journal of the ACM, Vol. , No. 1, January 1980.Google Scholar
- [SM80]Schmidt, J.W., M. Mall, “Pascal/ R Report,” Report No. 66, Fachbereich Informatik, Univ. of Hamburg, January 1980.Google Scholar
- [YANN82]Yannakakis, M., “A Theory of Safe Locking Policies in Database Systems,” Journal of the ACM, Vol. 29, No. 3, July 1982.Google Scholar