Skip to main content
  • 76 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.95
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literaturverzeichnis

  1. ACM Task Force on the Core of Computer Science, (P. J. Denning, chairman), Computing as a Disciplin, ACM Publ. # 201880, 1988. auszugsweise auch in: Communications of the ACM 32 (1989), pp. 9–23.

    Google Scholar 

  2. A.V. Aho, C. Beeri, J.D. Ullman, The theory of joins in relational databases, ACM Transactions on Database Systems 4 (1979), pp. 297–314.

    Article  Google Scholar 

  3. A.V. Aho, J.E. Hoperoft, J.D. Ullman, Data Structures and Algorithms, Addison-Wesley, Reading etc., 1983.

    MATH  Google Scholar 

  4. A. Aho, J.D. Ullman, Universality of data retrieval languages, Proc. 6th ACM Symposium on Principles of Programming Languages, 1979, pp. 110–120.

    Google Scholar 

  5. A.V. Aho, Y. Sagiv, J.D. Ullman, Equivalence among relational expressions, SIAM Journal on Computing 8 (1979), pp. 218–246.

    Article  MathSciNet  MATH  Google Scholar 

  6. A.V. Aho, Y. Sagiv, J.D. Ullman, Efficient optimization of a class of relational expressions,ACM Transactions on Database Systems 4 (1979), pp. 435–454.

    Article  Google Scholar 

  7. S.G. Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, Vol.1, No.3, 1983, pp. 239–248.

    Article  Google Scholar 

  8. S.R. Ames, Security kernels: a solution or a problem?, Proc. IEEE Symp. on Security and Privacy, Oakland, 1981, pp. 141–150.

    Google Scholar 

  9. ANSI/X3/SPARC Study Group on Data Base Management Systems, Interim Report, FDT (ACM SIGMOD Record) 7 (2).

    Google Scholar 

  10. American National Standards Institute, The database language SQL, Document ANSI X3.135, 1986.

    Google Scholar 

  11. American National Standards Institute, Database language SQL-Addendum 1, Document ANSI X3.135.1, 1989.

    Google Scholar 

  12. W.W. Armstrong, Dependency structures of data base relationships,Proc. IFIP Congress 1974, North-Holland, Amsterdam, 1974, pp. 580–583.

    Google Scholar 

  13. M.M. Astrahan, M.W. Blasgen, D.D. Chamberlin et al., System R: arelational approach to data base management, ACM Transaction on Database Systems 1 (1976), pp. 97–137.

    Google Scholar 

  14. P. Atzeni, G. Ausiello, C. Batini, M. Moscarini, Inclusion and equivalence between relational database schemes,Theoretical Computer Science 19 (1982), pp. 267–285.

    Article  MathSciNet  MATH  Google Scholar 

  15. M. Atkinson, F. Bancilhon, D.J. DeWitt, K.R. Dittrich, D. Maier, S. Zdonik, The object-oriented database system manifesto,Proc. Conf. on Deductive and Object-Oriented Databases (DOOD), Kyoto, 1989, pp. 4057.

    Google Scholar 

  16. P. Atzeni and V. DeAntonellis, Relational Database Theory, Benjamin /Cummings, Redwood City etc., 1993.

    MATH  Google Scholar 

  17. F. Bancilhon, On the completeness of query languages for relational databases, Proc. 7th Symposium on Mathematical Foundations of Computing, Springer, New York etc., 1978, pp. 112–123.

    Google Scholar 

  18. F. Bancilhon, Object-oriented database systems, Proc. ACM Symposium on Principles of Database Systems, 1988, pp.152–162.

    Google Scholar 

  19. F. Bancilhon, C. Delobel, P. Kanellakis (eds.), Building an Object-Oriented Database System: The Story of 02, Morgan Kaufmann, San Mateo, 1992.

    Google Scholar 

  20. F. Bancilhon, R. Ramakrishnan, An amateur’s introduction to recursive query processing strategies,Proc. ACM Int. Conf. Management of Data (SIGMOD 86), 1986, pp. 16–52.

    Article  Google Scholar 

  21. P.A. Bernstein, Synthesizing third normal form relations from functional dependencies, ACM Transactions on Database Systems 1 (1976), pp. 272–298.

    Article  Google Scholar 

  22. C. Beeri, P.A. Bernstein, N. Goodman, A sophisticate’s introduction to database normalization theory, Proc. 4th International Conference on Very Large Data Bases, Berlin, 1978, pp. 113–124.

    Google Scholar 

  23. P.A. Bernstein, V. Hadzilacos, N. Goodman, Concurrency Control and Recovery in Database Systems,Addison-Wesley, Reading etc., 1987.

    Google Scholar 

  24. C. Beeri, M.Y. Vardi, Formal systems for tuple-and equality generating dependencies, SIAM Journal on Computing 13 (1984), pp. 76–98.

    Article  MathSciNet  MATH  Google Scholar 

  25. C. Beeri, M.Y. Vardi, A proof procedure for data dependencies,Journal ACM 31 (1984), pp.718–741.

    Article  MathSciNet  MATH  Google Scholar 

  26. D.E. Bell, L.J. LaPadula, Secure Computer Systems, Mitre Corporation, Bedford, 1974.

    Google Scholar 

  27. E. Bergmann, H. Noll, Mathematische Logik mit Informatik-Anwendungen, Springer, Berlin etc., 1977.

    Book  MATH  Google Scholar 

  28. E. Bertino, F.Origgi, P. Samarati, A new authorization model for object-oriented databases, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc.,1995, pp. 199–222.

    Google Scholar 

  29. C. Beeri, R. Fagin, D. Maier, M. Yannakakis, On the desirability of acyclic database schemes, Journal ACM 30 (1983), pp. 479–513.

    Article  MathSciNet  MATH  Google Scholar 

  30. J. Biskup, A formal approach to null values in database relations, Advances in Data Bases Theory - Volume 1 (eds: H. Gallaise, J. Minker, J.M. Nicolas), Plenum, New York - London, 1981, pp. 299–341.

    Google Scholar 

  31. J. Biskup, Privacy respecting permissions and rights, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 173–185.

    Google Scholar 

  32. J. Biskup, Verantwortung des Hochschullehrers für Informatik, Informatik-Spektrum 12 (1989), pp. 158–161.

    Google Scholar 

  33. J. Biskup, Sicherheit von IT-Systemen als “sogar wenn - sonst nichts - Eigenschaft”, Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS ‘83, Vieweg, Braunschweig-Wiesbaden, 1993, pp. 239–254.

    Google Scholar 

  34. J. Biskup, Impacts of creating, implementing and using formal languages, Proc. 13 th World Computer Congress 94, Volume 3 (eds: K. Duncan, K. Krueger), Elsevier, Amsterdam etc., 1994, pp. 402–407.

    Google Scholar 

  35. W. Bibel, Wissensrepräsentation und Inferenz, Vieweg, Braunschweig- Wiesbaden, 1993.

    Book  Google Scholar 

  36. J. Biskup, G. Bleumer, Reflections on security of database and datatransfer systems in health care, Proc. 13th of World Computer Congress 94, Volume 2 (eds: K. Brunnstein, E. Raubold), Elsevier, Amsterdam etc., 1994, pp. 549–556.

    Google Scholar 

  37. J. Biskup, H.H. Brüggemann, Universal relation views: a pragmatic approach, Proc. 9th International Conference on Very Large Data Bases, Florence, 1983, pp. 172–185.

    Google Scholar 

  38. J. Biskup, H.H. Brüggemann, The personal model of data - towards aprivacy-oriented information system, Computers amp; Security 7 (1988), pp. 575–597.

    Article  Google Scholar 

  39. J. Biskup, H.H. Brüggemann, Data manipulation languages for the universal relation view DURST, Proc. 1st Symposium on Mathematical Fundamentals of Database Systems, Lecture Notes in Computer Science 305, Springer, Berlin etc., 1988, pp. 20–41.

    Google Scholar 

  40. J. Biskup, H.H. Brüggemann, Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick, Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS ‘81, Darmstadt, Informatik-Fachberichte 271, Springer, Berlin etc., 1991, pp. 146–158.

    Google Scholar 

  41. J. Biskup, H.H. Brüggemann, L. Schnetgöke, M. Kramer, One flavor assumption and y-acyclicity for universal relation views,Proc. 5th ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Cambridge, 1986, pp. 148–159.

    Google Scholar 

  42. J. Biskup, B. Convent, A formal view integration method,Proc. ACM SIGMOD Int. Conference on Management of Data, Washington, 1986, pp. 398–407.

    Google Scholar 

  43. J. Biskup, B. Convent, Relational chase procedures interpreted as resolution with paramodulation,Fundamenta Informaticae 15 (1991), pp.123–138.

    MathSciNet  MATH  Google Scholar 

  44. J. Biskup, U. Dayal, P.A. Bernstein, Synthesizing independent database schemes, Proc. ACM SIGMOD Int. Conference on Management of Data, Boston, 1979, pp. 143–151.

    Google Scholar 

  45. J. Biskup, P. Dublish, Objects in relational database schemes with functional, inclusion and exclusion dependencies, extented abstract: Proc. 3rd Symposium on Mathematical Fundamentals of Database and Knowledge Base Systems, Rostock, 1991, Lecture Notes in Computer Science 495, Springer, Berlin etc., 1991, pp. 276–290; full paper: RAIRO Theoretical Informatics and Applications 27 (1993), pp. 183–219.

    Google Scholar 

  46. J. Biskup, P. Dublish, Y. Sagiv, Optimization of a subclass of conjunctive queries, Acta Informatica 32 (1995), pp. 1–26.

    Article  MathSciNet  MATH  Google Scholar 

  47. J. Biskup, Ch. Eckert, Sichere Delegation in Informationssystemen, Proc. GI-Fachtagung Verläßliche Informationssysteme (Hrsg.: G. Weck, P. Horster), Vieweg, Braunschweig-Wiesbaden, 1993, pp. 107–133.

    Google Scholar 

  48. J. Biskup, H.-W. Graf, Analysis of the privacy model for the information system DORIS, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp.123–140.

    Google Scholar 

  49. J. Biskup, M. Morgenstern, C.E. Landwehr, editors, Database Security, VIII: Status and Prospects, North-Holland, Amsterdam etc., 1995.

    Google Scholar 

  50. J. Biskup, U. Räsch, The equivalence problem for relational database schemes, Proc. 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, 1987, Lecture Notes in Computer Science 305, Springer, Berlin etc., pp. 42–70.

    Google Scholar 

  51. D.A. Bonyun, The secure relational database management system kernel - three years after, Proc. IEEE Symp. on Security and Privacy, Oakland, 1980, pp. 34–37.

    Google Scholar 

  52. E. Börger, Berechenbarkeit, Komplexität, Logik, Vieweg, Braunschweig-Wiesbaden, 1985, 1992.

    Google Scholar 

  53. H.H. Brüggemann, Interaction of authorities and acquaintances in the DORIS privacy model of data, Proc. MFDBS 89, Lecture Notes in Computer Science 364, Springer, Berlin etc., 1989, pp. 85–99.

    Google Scholar 

  54. H.H. Brüggemann, Rights in an object-oriented environment,Database Security, V: Status and Prospects (eds: C.E. Landwehr, S. Jajodia), North-Holland, Amsterdam etc., 1992, pp. 99–105.

    Google Scholar 

  55. W. Brauer, W. Haacke, S. Munch, Studien-und Forschungsführer Informatik, Springer, Berlin etc., 1989.

    Book  MATH  Google Scholar 

  56. M.L. Brodie, J. Mylopoulos, J.W. Schmidt (editors), On Conceptual Modelling, Springer, Berlin etc., 1984.

    Book  MATH  Google Scholar 

  57. V. Brosda, G. Vossen, Update and retrieval in a relational database through a universal schema interface, ACM Transactions on Database Systems 13 (1988), pp. 449–485.

    Article  MathSciNet  MATH  Google Scholar 

  58. F. Bry, Query evaluation in recursive databases: bottom-up and top-down reconciled, Data amp; Knowledge Engineering 5 (1990), pp. 289–312.

    Article  Google Scholar 

  59. Der Bundesbeauftragte für den Datenschutz, Bundesdatenschutzgesetz — Text und Erläuterung, Bonn, 1991.

    Google Scholar 

  60. P. Butterworth, A. Otis, J. Stein, The GemStone object database system, Communications of the ACM 34 (10) 1991, pp. 64–77.

    Article  Google Scholar 

  61. B. Buchanen, E. Shortliffe (eds), Rule Based Expert Systems, Addison-Wesley, Reading etc., 1984.

    Google Scholar 

  62. Bundesverfassungsgericht, Urteil vom 15. Dezember 1983 zum Volkszählungsgesetz 1983, Bundesanzeiger 35, 241a (1983).

    Google Scholar 

  63. R.G.G. Cattell, editor, The Object Database Standard ODMG 93, Morgan Kaufman, San Mateo, 1994.

    Google Scholar 

  64. M.A. Casanova, R. Fagin, C.H. Papadimitriou, Inclusion dependencies and their interaction with functional dependencies,Journal of Computer and System Sciences 28 (1984), pp. 29–59.

    Article  MathSciNet  MATH  Google Scholar 

  65. S. Castano, M.G. Fugini, G. Martella und P. Samarati, Database Security, Addison-Wesley/ACM, Reading etc., 1995.

    MATH  Google Scholar 

  66. M.A. Casanova, L. Tucherman, A.L. Furtado, A. Braga, Optimization of relational schemes containing inclusion dependencies, Proc. 15th International Conference on Very Large Data Bases, Amsterdam, 1989, pp. 317–325.

    Google Scholar 

  67. S. Ceri, G. Gottlob, L.Tanca, Logic Programming and Databases, Springer, Berlin etc., 1990.

    Google Scholar 

  68. S. Ceri, G. Pelagatti, Distributed Databases: Principles and Systems, McGraw-Hill, New York, 1984.

    Google Scholar 

  69. P.P.-S. Chen, The entity-relationship-model - towards a unified view of data,ACM Transactions on Database Systems 1 (1976), pp. 9–36.

    Article  Google Scholar 

  70. D.D. Chamberlin, M.M. Astrahan, K.P. Eswaran et al., SEQUEL2: a unified approach to data definition, manipulation, and control, IBM Journal Research and Development 20 (1976), pp. 560–575.

    Article  MATH  Google Scholar 

  71. U.S. Chakravarthy, J.Grant, J. Minker, Foundations of semantic query optimisation for deductive databases, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp.243–273.

    Google Scholar 

  72. A.K. Chandra, D. Harel, Computable queries for relational data bases, Journal of Computer and System Sciences 21 (1980), pp. 156–178.

    Article  MathSciNet  MATH  Google Scholar 

  73. A.K. Chandra, M.Y. Vardi, The implication problem for functional and inclusion dependencies is undecidable, SIAM Journal on Computing 14 (1985), pp. 671–677.

    Article  MathSciNet  MATH  Google Scholar 

  74. C.-L. Chang, R.C.-T. Lee, Symbolic Logic and Mechanical Theorem Proving,Academic Press, New York - London, 1973.

    Google Scholar 

  75. E. Charniak, D. McDermott, Introduction to Artificial Intelligence, Addison-Wesley, Reading etc., 1985.

    MATH  Google Scholar 

  76. A.K. Chandra, P.M. Merlin, Optimal implementation of conjunctive queries in relational databases, Proc. 9th ACM SIGACT Symposium on Theory of Computing, 1977, pp.77–90.

    Google Scholar 

  77. D.D. Clark, D.R. Wilson, A comparison of commercial and military computer security policies, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, pp. 184–194.

    Google Scholar 

  78. E.F. Codd, A relational model of data for large shared data banks, Communications of the ACM 13 (1970), pp. 377–387.

    Article  MATH  Google Scholar 

  79. E.F. Codd, Relational completeness of database sublanguages,Data Base Systems, Courant Institute Computer Science Symposia Series 6, (ed.: R. Rustin), Prentice-Hall, Englewood Cliffs, 1972, pp.65–98.

    Google Scholar 

  80. E.F. Codd, Further normalization of the database relational,Data Base Systems, Courant Institute Computer Science Symposia Series 6, (ed.: R. Rustin), Prentice-Hall, Englewood Cliffs, 1972, pp.33–64.

    Google Scholar 

  81. Congress, 93rd - 2nd Session, Privacy Act of 1974,Public Law 93–579.

    Google Scholar 

  82. E.F. Codd, Extending the database relational model to capture more meaning, ACM Transaction on Database Systems 4 (1979), pp. 397–434.

    Article  Google Scholar 

  83. E.F. Codd, Relational databases: a practical foundation for productivity, Communications of the ACM 25 (1982), pp. 109–117.

    Article  Google Scholar 

  84. S.S. Cosmadakis, P.C. Kanellakis, Functional and inclusion dependencies - a graph theoretic approach, 3rd ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Waterloo, 1984, pp. 29–37.

    Google Scholar 

  85. B. Convent, Datenbankschemaentwurf für ein logikorientiertes Datenmodell, Dissertation, Universität Hildesheim, 1989.

    Google Scholar 

  86. W. Coy, F. Nake, J.-M. Pflüger, A. Rolf, J. Seetzen, D. Siefkes, R. Strausfeld (Hrsg.), Sichtweisen der Informatik, Vieweg, Braunschweig-Wiesbaden, 1992.

    Book  MATH  Google Scholar 

  87. W. Coy, Brauchen wir eine Theorie der Informatik ?, Informatik- Spektrum 12 (1989), pp. 256–266.

    Google Scholar 

  88. A.B. Cremers, U. Griefahn, R. Hinze, Deduktive Datenbanken - Eine Einführung aus der Sicht der logischen Programmierung, Vieweg, Braunschweig-Wiesbaden, 1994.

    MATH  Google Scholar 

  89. R. Cummins, Meaning and Mental Representation, MIT Press, Cambridge-London, 1991.

    Google Scholar 

  90. G. Cyranek, W. Coy, Herausgeber, Die maschinelle Kunst des Denkens —Perspektiven und Grenzen der Künstlichen Intelligenz, Vieweg, Braunschweig-Wiesbaden, 1994.

    Google Scholar 

  91. C.J. Date, An Introduction to Database Systems, Volume I (4th Edition), Addison-Wesley, Reading etc., 1986.

    Google Scholar 

  92. C.J. Date, An Introduction to Database Systems, Volume II, Addison-Wesley, Reading etc., 1983.

    Google Scholar 

  93. G.I. Davida, R.A. DeMillo, R.J. Lipton, A system architecture to support a verifiably secure multilevel security system,Proc. IEEE Symp. on Security and Privacy, Oakland, 1980, pp. 137–144.

    Google Scholar 

  94. O.J. Dahl, B. Myrhaug, K. Nygaard, SIMULA 67: Common Base Language, Publication NS 22, Norsg Regnesentral, Oslo 1967.

    Google Scholar 

  95. G.I. Davida, D.L. Wells, J.B. Kam, A database encryption system with subkeys, ACM Transactions on Database Systems 6 (1981), pp. 312–328.

    Article  MathSciNet  Google Scholar 

  96. G.I. Davida, Y. Yeh, Cryptographic relational algebra, Proc. IEEE Symp. on Security and Privacy, Oakland, 1982, pp. 111–116.

    Google Scholar 

  97. C. Delobel, Normalization and hierarchical dependencies in the relational data model, ACM Transactions on Database Systems 3 (1978), pp. 201–222.

    Article  Google Scholar 

  98. D.E. Denning, Cryptography and Data Security, Addison-Wesley, Reading etc., 1982.

    MATH  Google Scholar 

  99. D.E. Denning, Cryptographic checksums for multilevel database security, Proc. IEEE Symp. on Security and Privacy, 1984, Oakland, pp. 52–61.

    Google Scholar 

  100. D.E. Denning, Lessons learned from modeling a secure multilevel relational database system, Database Security: Status and Prospects (ed. C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 35–43.

    Google Scholar 

  101. D.E. Denning, T.F. Lunt, R.R. Schell, M. Heckman, W. Shockley, A multilevel relational data model, Proc. IEEE Symp. on Security and Privacy, Oakland, 1987, pp. 220–234.

    Google Scholar 

  102. P. DeBra, J. Paredaens, Horizontal decompositions for handling exceptions to functional dependencies,Advances in Data Base Theory - Volume 2, (H. Gallaire, J. Minker, J.M. Nicolas, eds.), Plenum, New York - London, 1984, pp. 123–141.

    Google Scholar 

  103. R. Dierstein, The concept of secure information processing systems and their basic functions, Proc. IFIP/SEC ‘80 (ed.: K. Dittrich), Espoo (Helsinki), North-Holland, Amsterdam etc., 1991, pp. 133–149.

    Google Scholar 

  104. K. Dittrich, M. Härtig, H. Pfefferle, Discretionary Access control in structurally object-oriented database systems, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp.105–121.

    Google Scholar 

  105. J. Dobson, Security and Databases: A Personal View, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 11–21.

    Google Scholar 

  106. J. Dobson, Conversation structures as a means of specifying security policy,Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 25–39.

    Google Scholar 

  107. Department of Defense Computer Security Center, Trusted Computer Systems Evaluation Criteria, CSC-STD-011–83, Fort Meade, 1983.

    Google Scholar 

  108. J.E. Dobson, J.A. McDermid, Security models and enterprise models, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp. 1–39.

    Google Scholar 

  109. D. Downs, G. Popek, A kernel design for a secure data base managment system, Proc. 3rd Int. Conf. on Very Large Data Bases, 1977, pp. 507514.

    Google Scholar 

  110. H. Dreyfus, Den Geist konstruieren vs. Das Gehirn modellieren: Die KI kehrt zu einem Scheideweg zurück, Die maschinelle Kunst des Denkens (Hrsg: G. Cyranek, W. Coy), Vieweg, Braunschweig-Wiesbaden, 1994, pp. 215–23.0.

    Google Scholar 

  111. R. Durchholz, G. Richter, Compositional Data Objects: The IMC /IMC2 Reference Manual,Wiley, Chichester etc., 1992.

    Google Scholar 

  112. R. Elmasri, S.B. Navathe, Fundamentals of Database Systems, Benjamin / Cummings, Redwood City etc., 1989.

    MATH  Google Scholar 

  113. K.P. Eswaran, J.N. Gray, R.A. Lorie, I.L. Traiger, The notions of consistency and predicate locks in a database system,Communications of the ACM 19 (1976), pp. 624–633.

    Article  MathSciNet  MATH  Google Scholar 

  114. R. Fagin, Multivalued dependencies and a new normal form for relational databases,ACM Transactions on Database Systems 2 (1977), pp. 262–278.

    Article  Google Scholar 

  115. R. Fagin, Degrees of acyclicity for hypergraphs and relational database schemes,Journal ACM 30 (1983), pp. 514–550.

    Article  MathSciNet  MATH  Google Scholar 

  116. R. Fagin, M.Y. Vardi, The theory of data dependencies - an overview, Proc. 11th Int. Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science 172, Springer, Berlin etc., 1984, pp. 1–22.

    Google Scholar 

  117. Ch. Floyd, H. Züllighoven, R. Budde, R. Keil-Slawik, editors, Software Development and Reality Construction, Springer, Berlin etc., 1992.

    Book  Google Scholar 

  118. J.C. Freytag, The basic principles of query optimization in relational database management systems, Information Processing 89 (G.X. Ritter, ed.), Elseviers Science Publishers (North-Holland), Amsterdam etc., 1989, pp. 801–807.

    Google Scholar 

  119. M. Fugini, Secure database development methodologies,Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 103–129.

    Google Scholar 

  120. H. Gallaire, J. Minker (eds.), Logic and Data Bases, Plemm, New York, 1978.

    Book  MATH  Google Scholar 

  121. W. Gerhardt, Zugriffskontrolle bei Datenbanken, Oldenbourg, München- Wien, 1993.

    Google Scholar 

  122. A. Goldberg, D. Robson, Smalltalk-80: The Language and its Implementation,Addison-Wesley, Reading, etc., 1983.

    Google Scholar 

  123. R. Graubart, The integrity-lock approach to secure database management, Proc. IEEE Symp. on Security and Privacy, 1984, Oakland, pp. 62–74.

    Google Scholar 

  124. R. Graubart, A comparison of three secure dbms architectures, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 167–190.

    Google Scholar 

  125. J. Grant, J. Minker, Normalization and axiomatization for numerical dependencies, Information and Control 65 (1985), pp. 1–17.

    Article  MathSciNet  MATH  Google Scholar 

  126. J. Gray, A. Reuter, Transaction Processing: Concepts and Techniques, Morgan Kaufmann, San Mateo, 1993.

    MATH  Google Scholar 

  127. R. Grimm, A. Steinacker, Das Kooperations-und das Gleichgewichtsmodell — Theorie und Praxis, Proc. GI-Fachtagung Verläßliche Informationssysteme (Hrsg.: G. Weck, P. Horster), Vieweg, Braunschweig-Wiesbaden, 1993, pp. 85–106.

    Google Scholar 

  128. E. Gudes, The design of a cryptography based secure file system, Proc. IEEE Transactions on Software Engineering, Vol. SE-6, No.5, 1980, pp. 411–420.

    Google Scholar 

  129. R.H. Güting, Datenstrukturen und Algorithmen, Teubner, Stuttgart, 1992.

    MATH  Google Scholar 

  130. J. Habermas, Theorie des kommunikativen Handelns, Band I: Handlungsrationalität und gesellschaftliche Rationalisierung, Band II: Zur Kritik der funktionalistischen Vernunft, Suhrkamp, Frankfurt, 1981.

    Google Scholar 

  131. J.T. Haigh, Modeling database security requirements, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 103–129.

    Google Scholar 

  132. T. Härder, Implementierung von Datenbank-Systemen, Hanser, München, 1978.

    Google Scholar 

  133. T. Harder, Realisierung von operationalen Schnittstellen in: DatenbankHandbuch (Hrsg.: P.C. Lockemann, J.W. Schmidt), Springer, Berlin etc., 1987, pp. 163–335.

    Google Scholar 

  134. H. Hermes, Introduction to Mathematical Logic, Springer, Berlin etc., 1973.

    MATH  Google Scholar 

  135. T. Herrmann, Zur Gestaltung der Mensch-Computer-Interaktion: Systemerklärung als kommunikatives Problem, Niemeyer, Tübingen, 1986.

    Google Scholar 

  136. A. Heuer, Objektorientierte Datenbanken: Konzepte, Modelle, Systeme, Addison-Wesley, Bonn etc., 1992.

    Google Scholar 

  137. D. Hofbauer, R.-D. Kutsche, Grundlagen des mathematischen Beweisens, Vieweg, Braunschweig - Wiesbaden, 1989.

    Google Scholar 

  138. R. Hull, Relative information capacity of simple relational database schemata, SIAM Journal on Computing 15 (1986), pp. 856–886.

    Article  MathSciNet  MATH  Google Scholar 

  139. R. Hull, A survey of theoretical research on typed complex database objects, Databases (ed. J. Paredaens), International Lecture Series in Computer Science, Academic Press, London etc., 1987.

    Google Scholar 

  140. M.-Y. Hu, S.A. Demurjian, T.C. Ting, User-role based security profiles for an object-oriented design model,Database Security, VI: Status and Prospects (eds: B.M. Thuraisingham, C.E. Landwehr), North-Holland, Amsterdam etc., 1993, pp. 333–348.

    Google Scholar 

  141. R. Hull, R. King, Semantic database modeling: survey, applications, and research issues, ACM Computing Surveys 19 (1987), pp. 201–260.

    Article  Google Scholar 

  142. Y.E. Ioannidis, Y. Lashkari, Incomplete path expressions and their mdisambiguation Proc. ACM SIGMOD International Conference on Management of Data, 1994, pp. 138–149.

    Google Scholar 

  143. Information Technology Security Evaluation Criteria (ITSEC), Office for Official Publications of the European Communities, Luxembourg, 1991.

    Google Scholar 

  144. A.M. Jaglom, I.M. Jaglom, Wahrscheinlichkeit und Information (Übersetzung aus dem Russischen), VEB Deutscher Verlag der Wissenschaften, Berlin, 1960.

    Google Scholar 

  145. M. Jarke, J. Koch, Query optimization in database systems, ACM Computing Surveys 16,2 (1984), pp. 111–152.

    Article  MathSciNet  Google Scholar 

  146. S. Jajodia, C.E. Landwehr, editors, Database Security, IV: Status and Prospects,North-Holland, Amsterdam etc., 1991.

    Google Scholar 

  147. S. Jajodia, C.D. McCollum, B.T. Blaustein, Integrating concurrency control and commit algorithms in distributed multilevel secure databases, Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 109–121.

    Google Scholar 

  148. T. Jell, A. von Reelsen, Objektorientiertes Programmieren mit C++, Hanser, München-Wien, 1991.

    Google Scholar 

  149. D. Jonscher, K. Dittrich, Current trends in database technology and their impact on security concepts, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc.,1995, pp. 11–33.

    Google Scholar 

  150. G. Jumarie, Relative Information, Springer, Berlin etc., 1990.

    Google Scholar 

  151. G.O.H. Katona, Combinatorial and algebraic results for database relations, Proc. 4th Inf. Conference on Database Theory, Berlin, 1992, Lecture Notes in Computer Science 646, Springer, Berlin etc. 1992, pp. 1–20.

    Google Scholar 

  152. P.C. Kanellakis, S.S. Cosmadakis, M.Y. Vardi, Unary inclusion dependencies have polynomial inference problems, Proc. 15th Symposium on Theory of Computing, Boston, 1983, pp. 246–277.

    Google Scholar 

  153. P. Kandzia, H.-J. Klein, Theoretische Grundlagen relationaler Datenbanksysteme,BI Wissenschaftsverlag, Mannheim etc., 1993.

    Google Scholar 

  154. T. Kameda, K. Weihrauch, Einführung in die Codierungstheorie I, Bibliographisches Institut, Mannheim etc., 1973.

    MATH  Google Scholar 

  155. W. Kent, Data and Reality - Basic Assumptions in Data Processing Reconsidered,North-Holland, Amsterdam etc., 1978.

    Google Scholar 

  156. W. Kent, A simple guide to five normal forms in relational databases, Communications of the ACM 26 (1983), pp. 120–125.

    Article  Google Scholar 

  157. T.F. Keefe, C.E. Landwehr, editors, Database Security, VII: Status and Prospects, North-Holland, Amsterdam etc., 1994.

    Google Scholar 

  158. A. Kemper, G. Moerkotte, Basiskonzepte objektorientierter Datenbanksysteme, Informatik-Spektrum 16, 2 (1993), pp. 69–80.

    Google Scholar 

  159. M. Kifer, W. Kim, Y. Sagiv, Querying object-oriented databases, Proc. ACM SIGMOD Int. Conference on Management of Data, 1992, pp. 393–402.

    Google Scholar 

  160. M. Kifer, G. Lausen, F-Logic: a higher order language for reasoning about objects, inheritance and schema, Proc. ACM SIGMOD Int. Conference on Management of Data, 1989, pp. 134–146.

    Google Scholar 

  161. M. Kifer, G. Lausen, J. Wu, Logical foundations of object-oriented and frame-based languages, TR 93/06, Department of Computer Science, SUNY at Stony Brook, 1993, to appear in Journal of the ACM.

    Google Scholar 

  162. D. Knuth, The Art of Computer Programming, Volume 1: Fundamental Algorithms (2nd edition), Addison-Wesley, Reading etc., 1973.

    Google Scholar 

  163. D. Knuth, The Art of Computer Programming,Volume 3: Sorting and Searching, Addison-Wesley, Reading etc., 1973.

    Google Scholar 

  164. H.F. Korth, G.M. Kuper, J. Feigenbaum, A. VanGeldern, J.D. Ullman, A database system based on the universal relation assumption, ACM Transactions on Database Systems 9 (1984), pp. 331–347.

    Article  Google Scholar 

  165. C.E. Landwehr, editor, Database Security: Status and Prospects, North- Holland, Amsterdam etc., 1988.

    Google Scholar 

  166. C.E. Landwehr, editor, Database Security, II: Status and Prospects, North-Holland, Amsterdam etc., 1989.

    Google Scholar 

  167. G. Lamprecht, Introduction to SIMULA 67, Vieweg, Braunschweig-Wiesbaden, 1981.

    Google Scholar 

  168. M. Larrondo-Petrie, E. Gudes, H. Song, E.B. Fernandez, Security policies in object-oriented databases, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp.257–268.

    Google Scholar 

  169. C.E. Landwehr, C.L. Heitmeyer, J. McLean, A security model for military message systems, ACM Transactions on Computer Systems, Vol. 2, No. 3, 1984, pp. 198–222.

    Article  Google Scholar 

  170. C.E. Landwehr, S. Jajodia, editors, Database Security, V: Status and Prospects,North-Holland, Amsterdam etc., 1992.

    Google Scholar 

  171. G. Lausen, B. Marx, Eine Einführung in Frame-Logik, in. Entwicklungstendenzen bei Datenbanksystemen (Hrsg.: G. Vossen, K.-U. Witt), Oldenbourg, München, 1991, pp. 173–202.

    Google Scholar 

  172. M. Levene, The Nested Universal Relation Database Model, Lecture Notes in Computer Science 595, Springer, Berlin etc., 1992.

    Book  Google Scholar 

  173. L. Libkin, Approximation in databases, Proc. 5th International Conference on Database Theory, ICDT ‘85, Lecture Notes in Computer Science 893, Springer, Berlin etc., pp. 411–424.

    Google Scholar 

  174. J.W. Lloyd, Foundations of Logic Programming (2nd, extended edition), Springer, Berlin etc., 1987.

    Book  MATH  Google Scholar 

  175. P.C. Lockemann, K.R. Dittrich, Architektur von Datenbanksystemen, in: Datenbank-Handbuch (Hrsg.: P.C. Lockemann, J.W. Schmidt), Springer, Berlin etc., 1987, pp. 85–161.

    Chapter  Google Scholar 

  176. P.C. Lockemann, G. Krüger, H. Krumm, Telekommunikation und Datenhaltung, Hanser, München-Wien, 1993.

    MATH  Google Scholar 

  177. J. Lobo, J. Minker, A. Rajaseker, Foundations of Disjunctive Logic Programming, MIT Press, Cambridge, 1992.

    Google Scholar 

  178. P.C. Lockemann, J.W. Schmidt, Datenbank-Handbuch, Springer, Berlin. etc., 1987.

    Book  MATH  Google Scholar 

  179. F.H. Lochovsky, C.C. Woo, Role-based security in data base management systems, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 209–222.

    Google Scholar 

  180. N. Luhmann, Soziale Systeme - Grundriß einer allgemeinen Theorie, Suhrkamp, Frankfurt, 1984 (Zitat nach Suhrkamp Taschenbuch Wissenschaft 666, 1987).

    Google Scholar 

  181. A.L. Luft, Informatik als Technik-Wissenschaft: Eine Orientierungshilfe für das Informatikstudium,Bibliographisches Institut, Mannheim etc., 1988.

    Google Scholar 

  182. T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman, W.R. Shockley, The Sea View security model,IEEE Transactions on Software Engineering 16 (1990), pp. 593–607.

    Article  Google Scholar 

  183. N. Lynch, M. Merritt, W. Weihl, A. Fekete, Atomic Transactions, Morgan Kaufmann, San Mateo, 1994.

    Google Scholar 

  184. S. Maaß, Mensch-Rechner-Kommunikation: Herkunft und Chancen eines neuen Paradigmas, Dissertation, Universität Hamburg, FBI-HH-B104184, 1984.

    Google Scholar 

  185. M.J. Maher, Equivalence of logic programs, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp. 627–658.

    Google Scholar 

  186. D. Maier, The Theory of Relational Databases, Computer Science Press, Rockville, 1983.

    MATH  Google Scholar 

  187. F. Machlup, U. Mansfield (eds.), The Study of Information, Wiley, New York etc., 1983.

    Google Scholar 

  188. H. Mannila, K.-J. Räihä, The Design of Relational Databases, Addison-Wesley, Wokingham etc., 1992.

    MATH  Google Scholar 

  189. D. Maier, J.D. Ullman, M.Y. Vardi, On the foundations of the universal relation model, ACM Transactions on Database Systems 9 (1984), pp. 283–308.

    Article  MathSciNet  MATH  Google Scholar 

  190. J.A. McDermid, E.S. Hocking, Security policies for integrated project support environments,Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 41–74.

    Google Scholar 

  191. K. Mehlhorn, Data Structures and Algorithms 1: Sorting and Searching, Springer, Berlin etc., 1984.

    Google Scholar 

  192. K. Mehlhorn, Data Structures and Algorithms I: Graph-Algorithms and NP-Completeness, Springer, Berlin etc., 1984.

    Google Scholar 

  193. K. Mehlhorn, Data Structures and Algorithms I. Multi - Dimensional -Searching and Computational Geometry,Springer, Berlin etc., 1984.

    Google Scholar 

  194. C. Meadows, The integrity lock architecture and its application to message systems: reducing covert channels, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, pp. 212–218.

    Google Scholar 

  195. C. Meadows, Constructing containers using a multilevel relational data model,Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 127–141.

    Google Scholar 

  196. J.C. Mitchell, The implication problem for functional and inclusion dependencies, Information and Control 56 (1983), pp. 154–173.

    Article  MathSciNet  MATH  Google Scholar 

  197. P. Mishra, M.H. Eich, Join processing in relational databases, ACM Computing Surveys 24 (1992), pp. 63–113.

    Article  Google Scholar 

  198. I.S. Mumick, H. Pirahesh, Implementation of magic-sets in a relational atabase system,Proc. ACM SIGMOD Int. Conference on Management of Data, Minneapolis, 1994, pp. 103–114.

    Google Scholar 

  199. P.J. Müller, Die Gefährdung der Privatsphäre durch Datenbanken, in: U. Dammann, M. Karhausen, P. Müller, W. Steinmüller, Datenbanken und Datenschutz, Frankfurt-New York 1974, pp. 63–90.

    Google Scholar 

  200. Nationale IT-Sicherheitskrite rien, Bundesanzeiger-Verlag, 1989.

    Google Scholar 

  201. M. Nyanchama, S. Osborn, Access rights administration in role-based security systems, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc., 1995, pp. 37–56.

    Google Scholar 

  202. K.A. Omar, D.L. Wells, Modified architecture for the sub-keys model, Proc. IEEE Symposium on Security and Privacy, 1983, Oakland, pp. 79–86.

    Google Scholar 

  203. Ontos Inc., Ontos DB 2.2: Reference Manual, Volume 1, Class and Function Libraries, Ontos Inc., Burlington, 1992.

    Google Scholar 

  204. Oracle Corporation, SQL Language Reference Manual, Version 6.0, Redwood Shores, 1990.

    Google Scholar 

  205. T. Ottmann, P. Widmayer, Algorithmen und Datenstrukturen, BI-Wissenschaftsverlag, Mannheim etc., 1990.

    MATH  Google Scholar 

  206. M.T. Özsu, P. Valduriez, Principles of Distributed Database Systems, Prentice-Hall, Englewood Cliffs, 1991.

    Google Scholar 

  207. J. Paredaens, On the expressive power of the relational algebra, Information Processing Letters 7 (1978), pp. 44–49.

    Article  MathSciNet  Google Scholar 

  208. C. Papadimitriou, The Theory of Database Concurrency Control, Computer Science Press, Rockville, 1986.

    MATH  Google Scholar 

  209. D.B. Parker, Restating the foundation of information security, IT- Security: The Need for International Cooperation, Proc. IFIP/SEC ‘82, North-Holland, Amsterdam etc., 1992, pp. 139–151.

    Google Scholar 

  210. J. Paredaens, P. De Bra, M. Gyssens, D. Van Gucht, The Structure of the Relational Database Model, Spnnger, Berlin etc., 1989.

    MATH  Google Scholar 

  211. M. Papazoglou, W. Valder, Entwurf relationaler Datenbanken in C, Hanser/Prentice-Hall, Wien/London, 1992.

    Google Scholar 

  212. C.A. Petri, Kommunikation mit Automaten,Schriften des Institutes für Instrumentelle Mathematik Nr.2, Bonn, 1962.

    Google Scholar 

  213. J. Peckham, F. Maryanski, Semantic data models,ACM Computing Surveys 20 (1988), pp. 153–189.

    Article  MATH  Google Scholar 

  214. I. Pratt, Artificial Intelligence, Macmillan, Houndsmills — London, 1994.

    Google Scholar 

  215. P. Raulefs, Methoden der künstlichen Intelligenz: Übersicht und Anwendungen in Expertensystemen, GI-Jahrestagung ‘82, Informatik-Fachbericht 57, Berlin etc., 1982, pp. 170–187.

    Google Scholar 

  216. F. Rabitti, D. Woelk, W. Kim, A model of authorization for object-oriented and semantic databases,Proc. Int. Conf. on Extending Database Technology, Venice, March 1988, Lecture Notes in Computer Science 303, Springer, Berlin etc., 1988, pp. 231–250.

    Google Scholar 

  217. W. Reisig, Petri Nets - An Introduction,EATCS Monographs on Theoretical Computer Science, Springer, Berlin etc., 1985.

    Google Scholar 

  218. W. Reisig, Systementwurf mit Netzen, Springer, Berlin etc., 1985.

    Book  MATH  Google Scholar 

  219. H.L. Resnikoff, The Illusion of Reality, Springer, New York etc., 1989.

    Book  MATH  Google Scholar 

  220. B. Reinwald, Workflow-Management in verteilten Systemen, Teubner, Stuttgart-Leipzig, 1993.

    Google Scholar 

  221. R.L. Rivest, L. Adleman, M.L. Dertouzos, On data banks and privacy homomorphisms, in: Foundation of Secure Computation (eds: DeMillo, Dobkin, Jones, Lipton), Academic Press, New York, 1978, pp. 169–177.

    Google Scholar 

  222. J. Rumbaugh, M. Blaha, W. Premerlani, F. Eddy, W. Lorensen, Object-Oriented Modeling and Design, Prentice-Hall, Englewood Cliffs, 1991.

    Google Scholar 

  223. Y. Sagiv, A characterization of globally consistent databases and their correct access paths, ACM Transactions on Database Systems 8 (1983), pp. 266–286.

    Article  Google Scholar 

  224. Y. Sagiv, Optimizing datalog programs, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp.659–698.

    Google Scholar 

  225. R.S. Sandhu, S. Jajodia, Polyinstantiation for cover stories, Proc. 2nd European Symposium on Research in Computer Security, ESORICS ‘82, Lecture Notes in Computer Science 648, Springer, Berlin etc., 1992, pp. 307–328.

    Google Scholar 

  226. K. Sagonas, T. Swift, D.S. Warren, XSB as an efficient deductive database engine, Proc. ACM SIGMOD Int. Conference on Management of Data, Minneapolis, 1994, pp. 442–453.

    Google Scholar 

  227. G. Schlageter, Prozeßsynchronisation in Datenbanksystemen, Habilitationsschrift, Universität Karlsruhe, 1976 (Process synchronization in database systems, ACM Transactions on Database Systems 3 (1978), pp. 248–271).

    Article  Google Scholar 

  228. J.W. Schmidt, M.L. Brodie, Relational Database Systems - Analysis and Comparison, Springer, Berlin etc., 1983.

    Book  Google Scholar 

  229. P.S. Sell, B.M. Thuraisingham, Applying OMT for designing multilevel database application,Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 41–64.

    Google Scholar 

  230. J.R. Shoenfield, Mathematical Logic, Addison-Wesley, Reading etc., 1967.

    MATH  Google Scholar 

  231. O. Shmueli, Decidability and expressiveness aspects of logic queries, Proc. ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1987, pp.237–249.

    Google Scholar 

  232. D. Siefkes, Formalisieren und Beweisen - Logik für Informatiker, Vieweg, Braunschweig-Wiesbaden, 1990.

    MATH  Google Scholar 

  233. J.M. Smith, D.C.P. Smith, Database abstraction: aggregation and generalization, ACM Transactions on Database Systems 2 (1977), pp. 105–133.

    Article  Google Scholar 

  234. K. Smith, M. Winslett, Entity modeling in the MLS relational model Proc. 18th Int. Conf. on Very Large Data Bases, 1992, pp. 199–210.

    Google Scholar 

  235. D. Spooner, A.M. Keller, G. Wiederhold, J. Solasin, D. Heystek, Framework for the security component of an ADA DBMS, Proc. 12 th. Int. Conf. on Very Large Data Bases, Kyoto, 1986, pp. 347–354.

    Google Scholar 

  236. D.L. Spooner, C.E. Landwehr, editors, Database Security, III: Status and Prospects,North-Holland, Amsterdam etc., 1990.

    Google Scholar 

  237. M. Stonebraker (ed.), The INGRES Papers: Anatomy of a Relational Database System,Addison-Wesley, Reading etc., 1986.

    Google Scholar 

  238. R.E.Stearns, P.M.Lewis II, D.J.Rosenkrantz, Concurrency control for database systems, Proc. 17th IEEE Symp. on Foundations of Computer Science, 1976, pp. 19–32.

    Google Scholar 

  239. B. Stroustrup, The C++ Programming Language, Addison-Wesley, Reading etc., 1986.

    MATH  Google Scholar 

  240. M. Stonebraker, E. Wong, P. Kreps, G. Held, The design and implementation of INGRES, ACM Transactions on Database Systems 1 (1976), pp. 189–222.

    Article  Google Scholar 

  241. A.S. Tanenbaum, Computer Networks (2nd edition), Prentice-Hall, Englewood Cliffs, 1988.

    Google Scholar 

  242. G. Takeuti, W.M. Zaring, Introduction to Axiomatic Set Theory, Springer, Berlin etc., 1971.

    MATH  Google Scholar 

  243. T.J. Teory, D. Yang, J.P. Fry, A logical design methodology for relational databases using the extended entity-relationship model, ACM Computing Surveys 18 (1986), pp.197–222.

    Article  Google Scholar 

  244. B. Thalheim, Dependencies in Relational Databases, Teubner, Stuttgart - Leipzig, 1991.

    MATH  Google Scholar 

  245. B.M. Thuraisingham, C.E. Landwehr, editors, Database Security, VI: Status and Prospects, North-Holland, Amsterdam etc., 1993.

    Google Scholar 

  246. R.K. Thomas, R.S. Sandhu, Towards a unified framework and theory for reasoning about security and correctness of transactions in multilevel databases, Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 309–328.

    Google Scholar 

  247. T.C. Ting, A user-role based data security approach, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 187–208.

    Google Scholar 

  248. M.-T. Tinnefeld, H. Tubies, Datenschutzrecht, Oldenbourg, MünchenWien, 1988.

    Google Scholar 

  249. D. Tsichritzis, A. Klug, The ANSI/X3/SPARC DBMS framework, Information Systems 3 (1978), pp.173–191.

    Article  Google Scholar 

  250. J.D. Ullman, Principles of Database and Knowledge-Base Systems, Volume I, Computer Science Press, Rockville, 1988.

    Google Scholar 

  251. J.D. Ullman, Principles of Database and Knowledge-Base Systems, Volume II, Computer Science Press, Rockville, 1989.

    Google Scholar 

  252. J.D. Ullman, A comparison between deductive and object-oriented database systems, Proc. 2nd Inf. Conf. on Deductive and Object-Oriented Databases (DOOD `91), Munich, Lecture Notes in Computer Science 566, Springer, Berlin etc., 1991, pp. 263–277.

    Google Scholar 

  253. M.Y. Vardi, The implication and finite implication problem for typed template dependencies, Journal of Computer and System Sciences 28 (1984), pp. 3–28.

    Article  MathSciNet  MATH  Google Scholar 

  254. M.Y. Vardi, Fundamentals of dependency theory, Trends in Theoretical Computer Science (E.Börger, ed.), Computer Science Press, Rockville, 1988, pp. 171–224.

    Google Scholar 

  255. M.Y. Vardi, The universal-relation data model for logical independence, IEEE Software 5 (1988), pp. 80–85.

    Article  Google Scholar 

  256. J. Van den Bussche, G. Vossen, An extension of path expresssions to simplify navigation in object-oriented queries, Proc. 3rd International Conference on Deductive and Object-Oriented Databases, Lecture Notes in Computer Science 760, Springer, Berlin etc., 1993, pp. 267–282.

    Google Scholar 

  257. B. Vickery, A. Vickery, Information Science in Theory and Practice, Bowker-Saur, London etc., 1987.

    Google Scholar 

  258. G. Vossen, Datenmodelle Datenbanksprachen und Datenbank- management-Systeme, Addison-Wesley, Bonn etc., 2. aktualisierte und veränderte Auflage 1994.

    Google Scholar 

  259. G. Vossen, Data Models, Database Languages and Database Management Systems,Addison-Wesley, Wokingham etc., 1991.

    Google Scholar 

  260. G. Vossen, Modellbildung für Datenbank-Transaktionen, in: Entwicklungstendenzen bei Datenbanksystemen (Hrsg.: G. Vossen, K.U. Witt), Oldenbourg, München, 1991, pp. 277–316.

    Google Scholar 

  261. G. Vossen, M. Gross-Hardt, Grundlagen der Transaktionsverarbeitung, Addison-Wesley, Bonn etc., 1993.

    Google Scholar 

  262. G. Vossen, K.-U. Witt, Das SQL/DS - Handbuch, Addison-Wesley, Bonn etc., 1988.

    Google Scholar 

  263. G. Weikum, Transaktionen in Datenbanksystemen, Addison-Wesley, Bonn etc., 1988.

    Google Scholar 

  264. C.F. von Weizsäcker, Aufbau der Physik, Hanser, München-Wien, 1985.

    Google Scholar 

  265. H. Wedekind, Objektorientierte Schemaentwicklung — Ein kategorialer Ansatz für Datenbanken und Programmierung, BI-Wissenschaftsverlag, Mannheim etc., 1992.

    Google Scholar 

  266. H. Wedekind, T. Härder, Datenbanksysteme II Bibliographisches Institut Mannheim etc., 1976.

    MATH  Google Scholar 

  267. N. Wirth, Algorithmen und Datenstrukturen mit Modula-2, Teubner, Stuttgart, 1986.

    MATH  Google Scholar 

  268. G. Wiederhold, File Organization for Database Design, McGraw-Hill, New York, 1987.

    Google Scholar 

  269. S.B. Yao, Optimization of query evaluation algorithms, ACM Transactions on Database Systems 4 (1979), pp.133–155.

    Article  Google Scholar 

  270. C. Zaniolo, Analysis and design of relational schemata for database systems,UCLA-ENG-7669, Computer Science Department, University of California Los Angelos, 1976.

    Google Scholar 

  271. H. Zemanek, Was ist Informatik ?, Symposium “Informatik: Aspekte und Studienmodelle”, 17.-19.2.1971, Technische Hochschule Wien, 1971, pp. 5–18.

    Google Scholar 

  272. C.A. Zehnder, Informationssysteme und Datenbanken (5. Auflage), Teubner, Stuttgart, 1989.

    Google Scholar 

  273. H. Zemanek, Das geistige Umfeld der Informationstechnik, Springer, Berlin etc., 1992.

    MATH  Google Scholar 

  274. M.M. Zloof, Query-by-Example: a data base language, IBM Systems Journal 16 (1977), pp. 324–343.

    Article  Google Scholar 

  275. M.M. Zloof, Office-by-Example: a business language that unifies data, word processing and electronic mail, IBM Systems Journal 21 (1982), pp. 272–304.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1995 Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden

About this chapter

Cite this chapter

Biskup, J. (1995). Literaturverzeichnis. In: Grundlagen von Informationssystemen. Vieweg+Teubner Verlag. https://doi.org/10.1007/978-3-322-84937-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-322-84937-3_18

  • Publisher Name: Vieweg+Teubner Verlag

  • Print ISBN: 978-3-528-05494-6

  • Online ISBN: 978-3-322-84937-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics