Data Selection, Sharing, and Access Control in a Relational Scenario

  • Manuel Mall
  • Joachim W. Schmidt
  • Manuel Reimer
Part of the Topics in Information Systems book series (TINF)


Fully fledged database systems have operational characteristics not commonly provided by programming language systems. Examples of this would be access and integrity control, failure recovery, data sharing, and concurrency management.

This chapter discusses the way in which programming language constructs (such as data structures and their selection mechanisms, scope rules, procedures, modules, and variable import and passing mechanisms) can be utilized to support the above operational characteristics in the context of an integrated database programming environment.


Programming Language Access Control Data Object Selection Mechanism Integrity Constraint 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [BSR80]
    Bernstein, P.A., D.W. Shipman, J.B. Rothnie, “Concurrency Control in a System for Distributed Databases” (SDD-1),ACM Transactions on Database Systems, Vol. 5, No. 1, March 1980.Google Scholar
  2. [BS82b]
    Brodie, M.L., J.W. Schmidt (eds.), “Final Report of the ANSI/X3/SPARC DBS-SG Relational Database Task Group,”SIGMOD Record, Vol. 12, No. 4, July 1982.Google Scholar
  3. [CODD70]
    Cold, E.F., “A Relational Model of Data for Large Shared Data Banks,”Communications of the ACM, Vol. 13, No. 6, June 1970, pp. 377–387.CrossRefGoogle Scholar
  4. [CODD71]
    Cold, E.F., “A Database Sublanguage Founded on the Relational Calculus,”Proc. SIGFIDET Workshop, San Diego, Calif., 1971.Google Scholar
  5. [CODD82]
    Cold, E.F., “Relational Database: A Practical Foundation for Productivity,”Communications of the ACM, Vol. 25, No. 2, February 1982.Google Scholar
  6. [EGL76]
    Eswaren, K.P., J.N. Gray, R.A. Lorie, I.L. Traiger, “The Notions of Consistency and Predicate Locks in a Database System,”Communications of the ACM, Vol. 19, No. 11, November 1976.Google Scholar
  7. [GRAY78]
    Gray, J. N., “Notes on Data Base Operating Systems,”Proc. Advanced Course on Operating Systems, Munich, West Germany, inLecture Notes in Computer Science, No. 60, Springer- Verlag, New York, 1978.Google Scholar
  8. [KLEE71]
    Kleene, S. C., Introduction to Metamathematics, Elsevier North-Holland, New York, 1971.Google Scholar
  9. [KR81]
    Kung, H.T., J.T. Robinson, “On Optimistic Methods for Concurrency Control,” ACM Transactions on Database Systems, Vol. 6, No. 2, June 1981.Google Scholar
  10. [KUHN67]
    Kuhns, J. L., “Answering Questions by Computer—a Logical Study,” Memorandum RM 2428 PR, Rand Corporation, Santa Monica, Calif., December 1967.Google Scholar
  11. [LS80]
    Lamersdorf, W., J.W. Schmidt, “Specification of Pascal/R,” Report No. 73/74, Fachbereich Informatik, Univ. of Hamburg, July 1980.Google Scholar
  12. [LOR177]
    Lorie, R.A., “Physical Integrity in a Large Segmented Database,” ACM Transactions on Database Systems, Vol. 2, No. 1, March 1977.Google Scholar
  13. [RS81]
    Reimer, M., J.W. Schmidt, “Transaction Procedures with Relational Parameters,” Report No. 45, Institut fuer Informatik, ETH Zurich, October 1981.Google Scholar
  14. [SCHM77]
    Schmidt, J.W., “Some High Level Language Constructs for Data of Type Relation,” ACM Transactions on Database Systems, Vol. 2, No. 3, September 1977.Google Scholar
  15. [SCHM82]
    Schmidt, J.W., “Generalized Data Definition and Selection Mechanisms,” Fachbereich Informatik, Univ. of Hamburg, 1982 (to appear).Google Scholar
  16. [SK80a]
    Silberschatz, A., Z. Kedem, “Consistency in Hierarchical Database Systems,” Journal of the ACM, Vol. , No. 1, January 1980.Google Scholar
  17. [SM80]
    Schmidt, J.W., M. Mall, “Pascal/ R Report,” Report No. 66, Fachbereich Informatik, Univ. of Hamburg, January 1980.Google Scholar
  18. [YANN82]
    Yannakakis, M., “A Theory of Safe Locking Policies in Database Systems,” Journal of the ACM, Vol. 29, No. 3, July 1982.Google Scholar

Copyright information

© Springer-Verlag New York Inc. 1984

Authors and Affiliations

  • Manuel Mall
    • 1
  • Joachim W. Schmidt
    • 1
  • Manuel Reimer
    • 2
  1. 1.Universitaet HamburgGermany
  2. 2.ETH ZurichGermany

Personalised recommendations