Advertisement

Literaturverzeichnis

Chapter
  • 40 Downloads

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Literaturverzeichnis

  1. ACM 88.
    ACM Task Force on the Core of Computer Science, (P. J. Denning, chairman), Computing as a Disciplin, ACM Publ. # 201880, 1988. auszugsweise auch in: Communications of the ACM 32 (1989), pp. 9–23.Google Scholar
  2. AhBeUI79.
    A.V. Aho, C. Beeri, J.D. Ullman, The theory of joins in relational databases, ACM Transactions on Database Systems 4 (1979), pp. 297–314.CrossRefGoogle Scholar
  3. AhHoUI 83.
    A.V. Aho, J.E. Hoperoft, J.D. Ullman, Data Structures and Algorithms, Addison-Wesley, Reading etc., 1983.zbMATHGoogle Scholar
  4. AhUI 79.
    A. Aho, J.D. Ullman, Universality of data retrieval languages, Proc. 6th ACM Symposium on Principles of Programming Languages, 1979, pp. 110–120.Google Scholar
  5. AhSaUl 79a.
    A.V. Aho, Y. Sagiv, J.D. Ullman, Equivalence among relational expressions, SIAM Journal on Computing 8 (1979), pp. 218–246.MathSciNetzbMATHCrossRefGoogle Scholar
  6. AhSaUl 79b.
    A.V. Aho, Y. Sagiv, J.D. Ullman, Efficient optimization of a class of relational expressions,ACM Transactions on Database Systems 4 (1979), pp. 435–454.CrossRefGoogle Scholar
  7. AkTa 83.
    S.G. Akl, P.D. Taylor, Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, Vol.1, No.3, 1983, pp. 239–248.CrossRefGoogle Scholar
  8. Am 81.
    S.R. Ames, Security kernels: a solution or a problem?, Proc. IEEE Symp. on Security and Privacy, Oakland, 1981, pp. 141–150.Google Scholar
  9. ANSI 75.
    ANSI/X3/SPARC Study Group on Data Base Management Systems, Interim Report, FDT (ACM SIGMOD Record) 7 (2).Google Scholar
  10. ANSI 86.
    American National Standards Institute, The database language SQL, Document ANSI X3.135, 1986.Google Scholar
  11. ANSI 89.
    American National Standards Institute, Database language SQL-Addendum 1, Document ANSI X3.135.1, 1989.Google Scholar
  12. Ar 74.
    W.W. Armstrong, Dependency structures of data base relationships,Proc. IFIP Congress 1974, North-Holland, Amsterdam, 1974, pp. 580–583.Google Scholar
  13. AsBC 76.
    M.M. Astrahan, M.W. Blasgen, D.D. Chamberlin et al., System R: arelational approach to data base management, ACM Transaction on Database Systems 1 (1976), pp. 97–137.Google Scholar
  14. AtABM 82.
    P. Atzeni, G. Ausiello, C. Batini, M. Moscarini, Inclusion and equivalence between relational database schemes,Theoretical Computer Science 19 (1982), pp. 267–285.MathSciNetzbMATHCrossRefGoogle Scholar
  15. AtBDDMZ 89.
    M. Atkinson, F. Bancilhon, D.J. DeWitt, K.R. Dittrich, D. Maier, S. Zdonik, The object-oriented database system manifesto,Proc. Conf. on Deductive and Object-Oriented Databases (DOOD), Kyoto, 1989, pp. 4057.Google Scholar
  16. AtDe 93.
    P. Atzeni and V. DeAntonellis, Relational Database Theory, Benjamin /Cummings, Redwood City etc., 1993.zbMATHGoogle Scholar
  17. Ba 78.
    F. Bancilhon, On the completeness of query languages for relational databases, Proc. 7th Symposium on Mathematical Foundations of Computing, Springer, New York etc., 1978, pp. 112–123.Google Scholar
  18. Ba 88.
    F. Bancilhon, Object-oriented database systems, Proc. ACM Symposium on Principles of Database Systems, 1988, pp.152–162.Google Scholar
  19. BaDeKa 92.
    F. Bancilhon, C. Delobel, P. Kanellakis (eds.), Building an Object-Oriented Database System: The Story of 02, Morgan Kaufmann, San Mateo, 1992.Google Scholar
  20. BaRa 86.
    F. Bancilhon, R. Ramakrishnan, An amateur’s introduction to recursive query processing strategies,Proc. ACM Int. Conf. Management of Data (SIGMOD 86), 1986, pp. 16–52.CrossRefGoogle Scholar
  21. Be 76.
    P.A. Bernstein, Synthesizing third normal form relations from functional dependencies, ACM Transactions on Database Systems 1 (1976), pp. 272–298.CrossRefGoogle Scholar
  22. BeBeGo 78.
    C. Beeri, P.A. Bernstein, N. Goodman, A sophisticate’s introduction to database normalization theory, Proc. 4th International Conference on Very Large Data Bases, Berlin, 1978, pp. 113–124.Google Scholar
  23. BeHaGo 87.
    P.A. Bernstein, V. Hadzilacos, N. Goodman, Concurrency Control and Recovery in Database Systems,Addison-Wesley, Reading etc., 1987.Google Scholar
  24. BeVa 84a.
    C. Beeri, M.Y. Vardi, Formal systems for tuple-and equality generating dependencies, SIAM Journal on Computing 13 (1984), pp. 76–98.MathSciNetzbMATHCrossRefGoogle Scholar
  25. BeVa 84b.
    C. Beeri, M.Y. Vardi, A proof procedure for data dependencies,Journal ACM 31 (1984), pp.718–741.MathSciNetzbMATHCrossRefGoogle Scholar
  26. BeLa 74.
    D.E. Bell, L.J. LaPadula, Secure Computer Systems, Mitre Corporation, Bedford, 1974.Google Scholar
  27. BeNo 77.
    E. Bergmann, H. Noll, Mathematische Logik mit Informatik-Anwendungen, Springer, Berlin etc., 1977.zbMATHCrossRefGoogle Scholar
  28. BeOrSa95.
    E. Bertino, F.Origgi, P. Samarati, A new authorization model for object-oriented databases, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc.,1995, pp. 199–222.Google Scholar
  29. BFMY 83.
    C. Beeri, R. Fagin, D. Maier, M. Yannakakis, On the desirability of acyclic database schemes, Journal ACM 30 (1983), pp. 479–513.MathSciNetzbMATHCrossRefGoogle Scholar
  30. Bi 81.
    J. Biskup, A formal approach to null values in database relations, Advances in Data Bases Theory - Volume 1 (eds: H. Gallaise, J. Minker, J.M. Nicolas), Plenum, New York - London, 1981, pp. 299–341.Google Scholar
  31. Bi 88.
    J. Biskup, Privacy respecting permissions and rights, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 173–185.Google Scholar
  32. Bi 89.
    J. Biskup, Verantwortung des Hochschullehrers für Informatik, Informatik-Spektrum 12 (1989), pp. 158–161.Google Scholar
  33. Bi 93.
    J. Biskup, Sicherheit von IT-Systemen als “sogar wenn - sonst nichts - Eigenschaft”, Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS ‘83, Vieweg, Braunschweig-Wiesbaden, 1993, pp. 239–254.Google Scholar
  34. Bi 94.
    J. Biskup, Impacts of creating, implementing and using formal languages, Proc. 13 th World Computer Congress 94, Volume 3 (eds: K. Duncan, K. Krueger), Elsevier, Amsterdam etc., 1994, pp. 402–407.Google Scholar
  35. Bib 93.
    W. Bibel, Wissensrepräsentation und Inferenz, Vieweg, Braunschweig- Wiesbaden, 1993.CrossRefGoogle Scholar
  36. BiB1 94.
    J. Biskup, G. Bleumer, Reflections on security of database and datatransfer systems in health care, Proc. 13th of World Computer Congress 94, Volume 2 (eds: K. Brunnstein, E. Raubold), Elsevier, Amsterdam etc., 1994, pp. 549–556.Google Scholar
  37. BiBr 83.
    J. Biskup, H.H. Brüggemann, Universal relation views: a pragmatic approach, Proc. 9th International Conference on Very Large Data Bases, Florence, 1983, pp. 172–185.Google Scholar
  38. BiBr 88.
    J. Biskup, H.H. Brüggemann, The personal model of data - towards aprivacy-oriented information system, Computers amp; Security 7 (1988), pp. 575–597.CrossRefGoogle Scholar
  39. BiBr 88a.
    J. Biskup, H.H. Brüggemann, Data manipulation languages for the universal relation view DURST, Proc. 1st Symposium on Mathematical Fundamentals of Database Systems, Lecture Notes in Computer Science 305, Springer, Berlin etc., 1988, pp. 20–41.Google Scholar
  40. BiBr91.
    J. Biskup, H.H. Brüggemann, Das datenschutzorientierte Informationssystem DORIS: Stand der Entwicklung und Ausblick, Proc. GI-Fachtagung Verläßliche Informationssysteme, VIS ‘81, Darmstadt, Informatik-Fachberichte 271, Springer, Berlin etc., 1991, pp. 146–158.Google Scholar
  41. BiBSK 86.
    J. Biskup, H.H. Brüggemann, L. Schnetgöke, M. Kramer, One flavor assumption and y-acyclicity for universal relation views,Proc. 5th ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Cambridge, 1986, pp. 148–159.Google Scholar
  42. BiCo 86.
    J. Biskup, B. Convent, A formal view integration method,Proc. ACM SIGMOD Int. Conference on Management of Data, Washington, 1986, pp. 398–407.Google Scholar
  43. BiCo 91.
    J. Biskup, B. Convent, Relational chase procedures interpreted as resolution with paramodulation,Fundamenta Informaticae 15 (1991), pp.123–138.MathSciNetzbMATHGoogle Scholar
  44. BiDaBe 79.
    J. Biskup, U. Dayal, P.A. Bernstein, Synthesizing independent database schemes, Proc. ACM SIGMOD Int. Conference on Management of Data, Boston, 1979, pp. 143–151.Google Scholar
  45. BiDu 91.
    J. Biskup, P. Dublish, Objects in relational database schemes with functional, inclusion and exclusion dependencies, extented abstract: Proc. 3rd Symposium on Mathematical Fundamentals of Database and Knowledge Base Systems, Rostock, 1991, Lecture Notes in Computer Science 495, Springer, Berlin etc., 1991, pp. 276–290; full paper: RAIRO Theoretical Informatics and Applications 27 (1993), pp. 183–219.Google Scholar
  46. BiDuSa 95.
    J. Biskup, P. Dublish, Y. Sagiv, Optimization of a subclass of conjunctive queries, Acta Informatica 32 (1995), pp. 1–26.MathSciNetzbMATHCrossRefGoogle Scholar
  47. BiEc 93.
    J. Biskup, Ch. Eckert, Sichere Delegation in Informationssystemen, Proc. GI-Fachtagung Verläßliche Informationssysteme (Hrsg.: G. Weck, P. Horster), Vieweg, Braunschweig-Wiesbaden, 1993, pp. 107–133.Google Scholar
  48. BiGr 89.
    J. Biskup, H.-W. Graf, Analysis of the privacy model for the information system DORIS, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp.123–140.Google Scholar
  49. BiMoLa 95.
    J. Biskup, M. Morgenstern, C.E. Landwehr, editors, Database Security, VIII: Status and Prospects, North-Holland, Amsterdam etc., 1995.Google Scholar
  50. BiRä 87.
    J. Biskup, U. Räsch, The equivalence problem for relational database schemes, Proc. 1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, 1987, Lecture Notes in Computer Science 305, Springer, Berlin etc., pp. 42–70.Google Scholar
  51. Bo 80.
    D.A. Bonyun, The secure relational database management system kernel - three years after, Proc. IEEE Symp. on Security and Privacy, Oakland, 1980, pp. 34–37.Google Scholar
  52. Bö 85.
    E. Börger, Berechenbarkeit, Komplexität, Logik, Vieweg, Braunschweig-Wiesbaden, 1985, 1992.Google Scholar
  53. Br 89.
    H.H. Brüggemann, Interaction of authorities and acquaintances in the DORIS privacy model of data, Proc. MFDBS 89, Lecture Notes in Computer Science 364, Springer, Berlin etc., 1989, pp. 85–99.Google Scholar
  54. Br 92.
    H.H. Brüggemann, Rights in an object-oriented environment,Database Security, V: Status and Prospects (eds: C.E. Landwehr, S. Jajodia), North-Holland, Amsterdam etc., 1992, pp. 99–105.Google Scholar
  55. BrHaMü 89.
    W. Brauer, W. Haacke, S. Munch, Studien-und Forschungsführer Informatik, Springer, Berlin etc., 1989.zbMATHCrossRefGoogle Scholar
  56. BrMyS 84.
    M.L. Brodie, J. Mylopoulos, J.W. Schmidt (editors), On Conceptual Modelling, Springer, Berlin etc., 1984.zbMATHCrossRefGoogle Scholar
  57. BrVo 88.
    V. Brosda, G. Vossen, Update and retrieval in a relational database through a universal schema interface, ACM Transactions on Database Systems 13 (1988), pp. 449–485.MathSciNetzbMATHCrossRefGoogle Scholar
  58. Bry 90.
    F. Bry, Query evaluation in recursive databases: bottom-up and top-down reconciled, Data amp; Knowledge Engineering 5 (1990), pp. 289–312.CrossRefGoogle Scholar
  59. Bu 91.
    Der Bundesbeauftragte für den Datenschutz, Bundesdatenschutzgesetz — Text und Erläuterung, Bonn, 1991.Google Scholar
  60. BuOtSt 91.
    P. Butterworth, A. Otis, J. Stein, The GemStone object database system, Communications of the ACM 34 (10) 1991, pp. 64–77.CrossRefGoogle Scholar
  61. BuSh 84.
    B. Buchanen, E. Shortliffe (eds), Rule Based Expert Systems, Addison-Wesley, Reading etc., 1984.Google Scholar
  62. Bvg 83.
    Bundesverfassungsgericht, Urteil vom 15. Dezember 1983 zum Volkszählungsgesetz 1983, Bundesanzeiger 35, 241a (1983).Google Scholar
  63. Ca 94.
    R.G.G. Cattell, editor, The Object Database Standard ODMG 93, Morgan Kaufman, San Mateo, 1994.Google Scholar
  64. CaFaPa 84.
    M.A. Casanova, R. Fagin, C.H. Papadimitriou, Inclusion dependencies and their interaction with functional dependencies,Journal of Computer and System Sciences 28 (1984), pp. 29–59.MathSciNetzbMATHCrossRefGoogle Scholar
  65. CaFMS 95.
    S. Castano, M.G. Fugini, G. Martella und P. Samarati, Database Security, Addison-Wesley/ACM, Reading etc., 1995.zbMATHGoogle Scholar
  66. CaTFB 89.
    M.A. Casanova, L. Tucherman, A.L. Furtado, A. Braga, Optimization of relational schemes containing inclusion dependencies, Proc. 15th International Conference on Very Large Data Bases, Amsterdam, 1989, pp. 317–325.Google Scholar
  67. CeGoTa 90.
    S. Ceri, G. Gottlob, L.Tanca, Logic Programming and Databases, Springer, Berlin etc., 1990.Google Scholar
  68. CePe 84.
    S. Ceri, G. Pelagatti, Distributed Databases: Principles and Systems, McGraw-Hill, New York, 1984.Google Scholar
  69. Ch 76.
    P.P.-S. Chen, The entity-relationship-model - towards a unified view of data,ACM Transactions on Database Systems 1 (1976), pp. 9–36.CrossRefGoogle Scholar
  70. ChAE 76.
    D.D. Chamberlin, M.M. Astrahan, K.P. Eswaran et al., SEQUEL2: a unified approach to data definition, manipulation, and control, IBM Journal Research and Development 20 (1976), pp. 560–575.zbMATHCrossRefGoogle Scholar
  71. ChGrMi88.
    U.S. Chakravarthy, J.Grant, J. Minker, Foundations of semantic query optimisation for deductive databases, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp.243–273.Google Scholar
  72. ChHa 80.
    A.K. Chandra, D. Harel, Computable queries for relational data bases, Journal of Computer and System Sciences 21 (1980), pp. 156–178.MathSciNetzbMATHCrossRefGoogle Scholar
  73. ChVa 85.
    A.K. Chandra, M.Y. Vardi, The implication problem for functional and inclusion dependencies is undecidable, SIAM Journal on Computing 14 (1985), pp. 671–677.MathSciNetzbMATHCrossRefGoogle Scholar
  74. ChLe 73.
    C.-L. Chang, R.C.-T. Lee, Symbolic Logic and Mechanical Theorem Proving,Academic Press, New York - London, 1973.Google Scholar
  75. ChMc 85.
    E. Charniak, D. McDermott, Introduction to Artificial Intelligence, Addison-Wesley, Reading etc., 1985.zbMATHGoogle Scholar
  76. ChMe 77.
    A.K. Chandra, P.M. Merlin, Optimal implementation of conjunctive queries in relational databases, Proc. 9th ACM SIGACT Symposium on Theory of Computing, 1977, pp.77–90.Google Scholar
  77. C1Wi 87.
    D.D. Clark, D.R. Wilson, A comparison of commercial and military computer security policies, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, pp. 184–194.Google Scholar
  78. Co 70.
    E.F. Codd, A relational model of data for large shared data banks, Communications of the ACM 13 (1970), pp. 377–387.zbMATHCrossRefGoogle Scholar
  79. Co 72a.
    E.F. Codd, Relational completeness of database sublanguages,Data Base Systems, Courant Institute Computer Science Symposia Series 6, (ed.: R. Rustin), Prentice-Hall, Englewood Cliffs, 1972, pp.65–98.Google Scholar
  80. Co 72b.
    E.F. Codd, Further normalization of the database relational,Data Base Systems, Courant Institute Computer Science Symposia Series 6, (ed.: R. Rustin), Prentice-Hall, Englewood Cliffs, 1972, pp.33–64.Google Scholar
  81. Co 74.
    Congress, 93rd - 2nd Session, Privacy Act of 1974,Public Law 93–579.Google Scholar
  82. Co 79.
    E.F. Codd, Extending the database relational model to capture more meaning, ACM Transaction on Database Systems 4 (1979), pp. 397–434.CrossRefGoogle Scholar
  83. Co 82.
    E.F. Codd, Relational databases: a practical foundation for productivity, Communications of the ACM 25 (1982), pp. 109–117.CrossRefGoogle Scholar
  84. CoKa 84.
    S.S. Cosmadakis, P.C. Kanellakis, Functional and inclusion dependencies - a graph theoretic approach, 3rd ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Waterloo, 1984, pp. 29–37.Google Scholar
  85. Con 89.
    B. Convent, Datenbankschemaentwurf für ein logikorientiertes Datenmodell, Dissertation, Universität Hildesheim, 1989.Google Scholar
  86. CoNPRSSS 92.
    W. Coy, F. Nake, J.-M. Pflüger, A. Rolf, J. Seetzen, D. Siefkes, R. Strausfeld (Hrsg.), Sichtweisen der Informatik, Vieweg, Braunschweig-Wiesbaden, 1992.zbMATHCrossRefGoogle Scholar
  87. Coy 89.
    W. Coy, Brauchen wir eine Theorie der Informatik ?, Informatik- Spektrum 12 (1989), pp. 256–266.Google Scholar
  88. CrGrHi 94.
    A.B. Cremers, U. Griefahn, R. Hinze, Deduktive Datenbanken - Eine Einführung aus der Sicht der logischen Programmierung, Vieweg, Braunschweig-Wiesbaden, 1994.zbMATHGoogle Scholar
  89. Cu 89.
    R. Cummins, Meaning and Mental Representation, MIT Press, Cambridge-London, 1991.Google Scholar
  90. CyCo 94.
    G. Cyranek, W. Coy, Herausgeber, Die maschinelle Kunst des Denkens —Perspektiven und Grenzen der Künstlichen Intelligenz, Vieweg, Braunschweig-Wiesbaden, 1994.Google Scholar
  91. Da 86.
    C.J. Date, An Introduction to Database Systems, Volume I (4th Edition), Addison-Wesley, Reading etc., 1986.Google Scholar
  92. Da 83.
    C.J. Date, An Introduction to Database Systems, Volume II, Addison-Wesley, Reading etc., 1983.Google Scholar
  93. DaDeLi 80.
    G.I. Davida, R.A. DeMillo, R.J. Lipton, A system architecture to support a verifiably secure multilevel security system,Proc. IEEE Symp. on Security and Privacy, Oakland, 1980, pp. 137–144.Google Scholar
  94. DaMyNy 67.
    O.J. Dahl, B. Myrhaug, K. Nygaard, SIMULA 67: Common Base Language, Publication NS 22, Norsg Regnesentral, Oslo 1967.Google Scholar
  95. DaWeKa 81.
    G.I. Davida, D.L. Wells, J.B. Kam, A database encryption system with subkeys, ACM Transactions on Database Systems 6 (1981), pp. 312–328.MathSciNetCrossRefGoogle Scholar
  96. DaYe 82.
    G.I. Davida, Y. Yeh, Cryptographic relational algebra, Proc. IEEE Symp. on Security and Privacy, Oakland, 1982, pp. 111–116.Google Scholar
  97. De 78.
    C. Delobel, Normalization and hierarchical dependencies in the relational data model, ACM Transactions on Database Systems 3 (1978), pp. 201–222.CrossRefGoogle Scholar
  98. De 82.
    D.E. Denning, Cryptography and Data Security, Addison-Wesley, Reading etc., 1982.zbMATHGoogle Scholar
  99. De 84.
    D.E. Denning, Cryptographic checksums for multilevel database security, Proc. IEEE Symp. on Security and Privacy, 1984, Oakland, pp. 52–61.Google Scholar
  100. De 88.
    D.E. Denning, Lessons learned from modeling a secure multilevel relational database system, Database Security: Status and Prospects (ed. C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 35–43.Google Scholar
  101. DeLSHS 87.
    D.E. Denning, T.F. Lunt, R.R. Schell, M. Heckman, W. Shockley, A multilevel relational data model, Proc. IEEE Symp. on Security and Privacy, Oakland, 1987, pp. 220–234.Google Scholar
  102. DePa 84.
    P. DeBra, J. Paredaens, Horizontal decompositions for handling exceptions to functional dependencies,Advances in Data Base Theory - Volume 2, (H. Gallaire, J. Minker, J.M. Nicolas, eds.), Plenum, New York - London, 1984, pp. 123–141.Google Scholar
  103. Di 90.
    R. Dierstein, The concept of secure information processing systems and their basic functions, Proc. IFIP/SEC ‘80 (ed.: K. Dittrich), Espoo (Helsinki), North-Holland, Amsterdam etc., 1991, pp. 133–149.Google Scholar
  104. DiHaPf 89.
    K. Dittrich, M. Härtig, H. Pfefferle, Discretionary Access control in structurally object-oriented database systems, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp.105–121.Google Scholar
  105. Do 88.
    J. Dobson, Security and Databases: A Personal View, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 11–21.Google Scholar
  106. Do 90.
    J. Dobson, Conversation structures as a means of specifying security policy,Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 25–39.Google Scholar
  107. DoD 83.
    Department of Defense Computer Security Center, Trusted Computer Systems Evaluation Criteria, CSC-STD-011–83, Fort Meade, 1983.Google Scholar
  108. DoMc 89.
    J.E. Dobson, J.A. McDermid, Security models and enterprise models, Database Security, II: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1989, pp. 1–39.Google Scholar
  109. DoPo 77.
    D. Downs, G. Popek, A kernel design for a secure data base managment system, Proc. 3rd Int. Conf. on Very Large Data Bases, 1977, pp. 507514.Google Scholar
  110. Dr 94.
    H. Dreyfus, Den Geist konstruieren vs. Das Gehirn modellieren: Die KI kehrt zu einem Scheideweg zurück, Die maschinelle Kunst des Denkens (Hrsg: G. Cyranek, W. Coy), Vieweg, Braunschweig-Wiesbaden, 1994, pp. 215–23.0.Google Scholar
  111. DuRi 92.
    R. Durchholz, G. Richter, Compositional Data Objects: The IMC /IMC2 Reference Manual,Wiley, Chichester etc., 1992.Google Scholar
  112. E1Na 89.
    R. Elmasri, S.B. Navathe, Fundamentals of Database Systems, Benjamin / Cummings, Redwood City etc., 1989.zbMATHGoogle Scholar
  113. EsGLT 76.
    K.P. Eswaran, J.N. Gray, R.A. Lorie, I.L. Traiger, The notions of consistency and predicate locks in a database system,Communications of the ACM 19 (1976), pp. 624–633.MathSciNetzbMATHCrossRefGoogle Scholar
  114. Fa 77.
    R. Fagin, Multivalued dependencies and a new normal form for relational databases,ACM Transactions on Database Systems 2 (1977), pp. 262–278.CrossRefGoogle Scholar
  115. Fa 83.
    R. Fagin, Degrees of acyclicity for hypergraphs and relational database schemes,Journal ACM 30 (1983), pp. 514–550.MathSciNetzbMATHCrossRefGoogle Scholar
  116. FaVa 84.
    R. Fagin, M.Y. Vardi, The theory of data dependencies - an overview, Proc. 11th Int. Colloquium on Automata, Languages and Programming, Lecture Notes in Computer Science 172, Springer, Berlin etc., 1984, pp. 1–22.Google Scholar
  117. F1ZBK 92.
    Ch. Floyd, H. Züllighoven, R. Budde, R. Keil-Slawik, editors, Software Development and Reality Construction, Springer, Berlin etc., 1992.CrossRefGoogle Scholar
  118. Fr 89.
    J.C. Freytag, The basic principles of query optimization in relational database management systems, Information Processing 89 (G.X. Ritter, ed.), Elseviers Science Publishers (North-Holland), Amsterdam etc., 1989, pp. 801–807.Google Scholar
  119. Fu 88.
    M. Fugini, Secure database development methodologies,Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 103–129.Google Scholar
  120. GaMi 78.
    H. Gallaire, J. Minker (eds.), Logic and Data Bases, Plemm, New York, 1978.zbMATHCrossRefGoogle Scholar
  121. Ge 93.
    W. Gerhardt, Zugriffskontrolle bei Datenbanken, Oldenbourg, München- Wien, 1993.Google Scholar
  122. GoRo 83.
    A. Goldberg, D. Robson, Smalltalk-80: The Language and its Implementation,Addison-Wesley, Reading, etc., 1983.Google Scholar
  123. Gr 84.
    R. Graubart, The integrity-lock approach to secure database management, Proc. IEEE Symp. on Security and Privacy, 1984, Oakland, pp. 62–74.Google Scholar
  124. Gr 90.
    R. Graubart, A comparison of three secure dbms architectures, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 167–190.Google Scholar
  125. GrMi 85.
    J. Grant, J. Minker, Normalization and axiomatization for numerical dependencies, Information and Control 65 (1985), pp. 1–17.MathSciNetzbMATHCrossRefGoogle Scholar
  126. GrRe 93.
    J. Gray, A. Reuter, Transaction Processing: Concepts and Techniques, Morgan Kaufmann, San Mateo, 1993.zbMATHGoogle Scholar
  127. GrSt 93.
    R. Grimm, A. Steinacker, Das Kooperations-und das Gleichgewichtsmodell — Theorie und Praxis, Proc. GI-Fachtagung Verläßliche Informationssysteme (Hrsg.: G. Weck, P. Horster), Vieweg, Braunschweig-Wiesbaden, 1993, pp. 85–106.Google Scholar
  128. Gu 80.
    E. Gudes, The design of a cryptography based secure file system, Proc. IEEE Transactions on Software Engineering, Vol. SE-6, No.5, 1980, pp. 411–420.Google Scholar
  129. Gil 92.
    R.H. Güting, Datenstrukturen und Algorithmen, Teubner, Stuttgart, 1992.zbMATHGoogle Scholar
  130. Ha 81.
    J. Habermas, Theorie des kommunikativen Handelns, Band I: Handlungsrationalität und gesellschaftliche Rationalisierung, Band II: Zur Kritik der funktionalistischen Vernunft, Suhrkamp, Frankfurt, 1981.Google Scholar
  131. Ha 88.
    J.T. Haigh, Modeling database security requirements, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 103–129.Google Scholar
  132. Hä 78.
    T. Härder, Implementierung von Datenbank-Systemen, Hanser, München, 1978.Google Scholar
  133. Hä 87.
    T. Harder, Realisierung von operationalen Schnittstellen in: DatenbankHandbuch (Hrsg.: P.C. Lockemann, J.W. Schmidt), Springer, Berlin etc., 1987, pp. 163–335.Google Scholar
  134. He 73.
    H. Hermes, Introduction to Mathematical Logic, Springer, Berlin etc., 1973.zbMATHGoogle Scholar
  135. He 86.
    T. Herrmann, Zur Gestaltung der Mensch-Computer-Interaktion: Systemerklärung als kommunikatives Problem, Niemeyer, Tübingen, 1986.Google Scholar
  136. He 92.
    A. Heuer, Objektorientierte Datenbanken: Konzepte, Modelle, Systeme, Addison-Wesley, Bonn etc., 1992.Google Scholar
  137. HoKu 89.
    D. Hofbauer, R.-D. Kutsche, Grundlagen des mathematischen Beweisens, Vieweg, Braunschweig - Wiesbaden, 1989.Google Scholar
  138. Hu 86.
    R. Hull, Relative information capacity of simple relational database schemata, SIAM Journal on Computing 15 (1986), pp. 856–886.MathSciNetzbMATHCrossRefGoogle Scholar
  139. Hu 87.
    R. Hull, A survey of theoretical research on typed complex database objects, Databases (ed. J. Paredaens), International Lecture Series in Computer Science, Academic Press, London etc., 1987.Google Scholar
  140. HuDeTi 9.
    M.-Y. Hu, S.A. Demurjian, T.C. Ting, User-role based security profiles for an object-oriented design model,Database Security, VI: Status and Prospects (eds: B.M. Thuraisingham, C.E. Landwehr), North-Holland, Amsterdam etc., 1993, pp. 333–348.Google Scholar
  141. HuKi 87.
    R. Hull, R. King, Semantic database modeling: survey, applications, and research issues, ACM Computing Surveys 19 (1987), pp. 201–260.CrossRefGoogle Scholar
  142. IoLa 94.
    Y.E. Ioannidis, Y. Lashkari, Incomplete path expressions and their mdisambiguation Proc. ACM SIGMOD International Conference on Management of Data, 1994, pp. 138–149. Google Scholar
  143. ITSEC 91.
    Information Technology Security Evaluation Criteria (ITSEC), Office for Official Publications of the European Communities, Luxembourg, 1991.Google Scholar
  144. JaJa 60.
    A.M. Jaglom, I.M. Jaglom, Wahrscheinlichkeit und Information (Übersetzung aus dem Russischen), VEB Deutscher Verlag der Wissenschaften, Berlin, 1960.Google Scholar
  145. JaKo 84.
    M. Jarke, J. Koch, Query optimization in database systems, ACM Computing Surveys 16,2 (1984), pp. 111–152.MathSciNetCrossRefGoogle Scholar
  146. JaLa 91.
    S. Jajodia, C.E. Landwehr, editors, Database Security, IV: Status and Prospects,North-Holland, Amsterdam etc., 1991.Google Scholar
  147. JaMcB194.
    S. Jajodia, C.D. McCollum, B.T. Blaustein, Integrating concurrency control and commit algorithms in distributed multilevel secure databases, Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 109–121.Google Scholar
  148. JeRe 91.
    T. Jell, A. von Reelsen, Objektorientiertes Programmieren mit C++, Hanser, München-Wien, 1991.Google Scholar
  149. JoDi 95.
    D. Jonscher, K. Dittrich, Current trends in database technology and their impact on security concepts, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc.,1995, pp. 11–33.Google Scholar
  150. Ju 90.
    G. Jumarie, Relative Information, Springer, Berlin etc., 1990.Google Scholar
  151. Ka 92.
    G.O.H. Katona, Combinatorial and algebraic results for database relations, Proc. 4th Inf. Conference on Database Theory, Berlin, 1992, Lecture Notes in Computer Science 646, Springer, Berlin etc. 1992, pp. 1–20.Google Scholar
  152. KaCoVa 83.
    P.C. Kanellakis, S.S. Cosmadakis, M.Y. Vardi, Unary inclusion dependencies have polynomial inference problems, Proc. 15th Symposium on Theory of Computing, Boston, 1983, pp. 246–277.Google Scholar
  153. KaK1 93.
    P. Kandzia, H.-J. Klein, Theoretische Grundlagen relationaler Datenbanksysteme,BI Wissenschaftsverlag, Mannheim etc., 1993.Google Scholar
  154. KaWe 73.
    T. Kameda, K. Weihrauch, Einführung in die Codierungstheorie I, Bibliographisches Institut, Mannheim etc., 1973.zbMATHGoogle Scholar
  155. Ke 78.
    W. Kent, Data and Reality - Basic Assumptions in Data Processing Reconsidered,North-Holland, Amsterdam etc., 1978.Google Scholar
  156. Ke 83.
    W. Kent, A simple guide to five normal forms in relational databases, Communications of the ACM 26 (1983), pp. 120–125.CrossRefGoogle Scholar
  157. KeLa 94.
    T.F. Keefe, C.E. Landwehr, editors, Database Security, VII: Status and Prospects, North-Holland, Amsterdam etc., 1994.Google Scholar
  158. KeMo 93.
    A. Kemper, G. Moerkotte, Basiskonzepte objektorientierter Datenbanksysteme, Informatik-Spektrum 16, 2 (1993), pp. 69–80.Google Scholar
  159. KiKiSa 92.
    M. Kifer, W. Kim, Y. Sagiv, Querying object-oriented databases, Proc. ACM SIGMOD Int. Conference on Management of Data, 1992, pp. 393–402.Google Scholar
  160. KiLa 89.
    M. Kifer, G. Lausen, F-Logic: a higher order language for reasoning about objects, inheritance and schema, Proc. ACM SIGMOD Int. Conference on Management of Data, 1989, pp. 134–146.Google Scholar
  161. KiLaWu 93.
    M. Kifer, G. Lausen, J. Wu, Logical foundations of object-oriented and frame-based languages, TR 93/06, Department of Computer Science, SUNY at Stony Brook, 1993, to appear in Journal of the ACM.Google Scholar
  162. Kn 68.
    D. Knuth, The Art of Computer Programming, Volume 1: Fundamental Algorithms (2nd edition), Addison-Wesley, Reading etc., 1973.Google Scholar
  163. Kn 73.
    D. Knuth, The Art of Computer Programming,Volume 3: Sorting and Searching, Addison-Wesley, Reading etc., 1973.Google Scholar
  164. KoKFVU 84.
    H.F. Korth, G.M. Kuper, J. Feigenbaum, A. VanGeldern, J.D. Ullman, A database system based on the universal relation assumption, ACM Transactions on Database Systems 9 (1984), pp. 331–347.CrossRefGoogle Scholar
  165. La 88.
    C.E. Landwehr, editor, Database Security: Status and Prospects, North- Holland, Amsterdam etc., 1988.Google Scholar
  166. La 89.
    C.E. Landwehr, editor, Database Security, II: Status and Prospects, North-Holland, Amsterdam etc., 1989.Google Scholar
  167. La 81.
    G. Lamprecht, Introduction to SIMULA 67, Vieweg, Braunschweig-Wiesbaden, 1981.Google Scholar
  168. LaGSF 90.
    M. Larrondo-Petrie, E. Gudes, H. Song, E.B. Fernandez, Security policies in object-oriented databases, Database Security, III: Status and Prospects (eds: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp.257–268.Google Scholar
  169. LaHeMc 84.
    C.E. Landwehr, C.L. Heitmeyer, J. McLean, A security model for military message systems, ACM Transactions on Computer Systems, Vol. 2, No. 3, 1984, pp. 198–222.CrossRefGoogle Scholar
  170. LaJa 92.
    C.E. Landwehr, S. Jajodia, editors, Database Security, V: Status and Prospects,North-Holland, Amsterdam etc., 1992.Google Scholar
  171. LaMa 91.
    G. Lausen, B. Marx, Eine Einführung in Frame-Logik, in. Entwicklungstendenzen bei Datenbanksystemen (Hrsg.: G. Vossen, K.-U. Witt), Oldenbourg, München, 1991, pp. 173–202.Google Scholar
  172. Le 92.
    M. Levene, The Nested Universal Relation Database Model, Lecture Notes in Computer Science 595, Springer, Berlin etc., 1992.CrossRefGoogle Scholar
  173. Li 95.
    L. Libkin, Approximation in databases, Proc. 5th International Conference on Database Theory, ICDT ‘85, Lecture Notes in Computer Science 893, Springer, Berlin etc., pp. 411–424.Google Scholar
  174. Ll 87.
    J.W. Lloyd, Foundations of Logic Programming (2nd, extended edition), Springer, Berlin etc., 1987.zbMATHCrossRefGoogle Scholar
  175. LoDi 87.
    P.C. Lockemann, K.R. Dittrich, Architektur von Datenbanksystemen, in: Datenbank-Handbuch (Hrsg.: P.C. Lockemann, J.W. Schmidt), Springer, Berlin etc., 1987, pp. 85–161.CrossRefGoogle Scholar
  176. LoKrKr 93.
    P.C. Lockemann, G. Krüger, H. Krumm, Telekommunikation und Datenhaltung, Hanser, München-Wien, 1993.zbMATHGoogle Scholar
  177. LoMiRa 92.
    J. Lobo, J. Minker, A. Rajaseker, Foundations of Disjunctive Logic Programming, MIT Press, Cambridge, 1992.Google Scholar
  178. LoSc 87.
    P.C. Lockemann, J.W. Schmidt, Datenbank-Handbuch, Springer, Berlin. etc., 1987.zbMATHCrossRefGoogle Scholar
  179. LoWo 88.
    F.H. Lochovsky, C.C. Woo, Role-based security in data base management systems, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 209–222.Google Scholar
  180. Lu 84.
    N. Luhmann, Soziale Systeme - Grundriß einer allgemeinen Theorie, Suhrkamp, Frankfurt, 1984 (Zitat nach Suhrkamp Taschenbuch Wissenschaft 666, 1987).Google Scholar
  181. Lu 88.
    A.L. Luft, Informatik als Technik-Wissenschaft: Eine Orientierungshilfe für das Informatikstudium,Bibliographisches Institut, Mannheim etc., 1988.Google Scholar
  182. LuDSHS 90.
    T.F. Lunt, D.E. Denning, R.R. Schell, M. Heckman, W.R. Shockley, The Sea View security model,IEEE Transactions on Software Engineering 16 (1990), pp. 593–607.CrossRefGoogle Scholar
  183. LyMWF 94.
    N. Lynch, M. Merritt, W. Weihl, A. Fekete, Atomic Transactions, Morgan Kaufmann, San Mateo, 1994.Google Scholar
  184. Ma 84.
    S. Maaß, Mensch-Rechner-Kommunikation: Herkunft und Chancen eines neuen Paradigmas, Dissertation, Universität Hamburg, FBI-HH-B104184, 1984.Google Scholar
  185. Mah 88.
    M.J. Maher, Equivalence of logic programs, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp. 627–658.Google Scholar
  186. Mai 83.
    D. Maier, The Theory of Relational Databases, Computer Science Press, Rockville, 1983.zbMATHGoogle Scholar
  187. MaMa 83.
    F. Machlup, U. Mansfield (eds.), The Study of Information, Wiley, New York etc., 1983.Google Scholar
  188. MaRä 92.
    H. Mannila, K.-J. Räihä, The Design of Relational Databases, Addison-Wesley, Wokingham etc., 1992.zbMATHGoogle Scholar
  189. MaU1Va 84.
    D. Maier, J.D. Ullman, M.Y. Vardi, On the foundations of the universal relation model, ACM Transactions on Database Systems 9 (1984), pp. 283–308.MathSciNetzbMATHCrossRefGoogle Scholar
  190. McHo 90.
    J.A. McDermid, E.S. Hocking, Security policies for integrated project support environments,Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 41–74.Google Scholar
  191. Me 84a.
    K. Mehlhorn, Data Structures and Algorithms 1: Sorting and Searching, Springer, Berlin etc., 1984.Google Scholar
  192. Me 84b.
    K. Mehlhorn, Data Structures and Algorithms I: Graph-Algorithms and NP-Completeness, Springer, Berlin etc., 1984.Google Scholar
  193. Me 84c.
    K. Mehlhorn, Data Structures and Algorithms I. Multi - Dimensional -Searching and Computational Geometry,Springer, Berlin etc., 1984.Google Scholar
  194. Me 87.
    C. Meadows, The integrity lock architecture and its application to message systems: reducing covert channels, Proc. IEEE Symp. on Security and Privacy, 1987, Oakland, pp. 212–218.Google Scholar
  195. Me 90.
    C. Meadows, Constructing containers using a multilevel relational data model,Database Security, III: Status and Prospects (eds.: D.L. Spooner, C.E. Landwehr), North-Holland, Amsterdam etc., 1990, pp. 127–141.Google Scholar
  196. Mi 83.
    J.C. Mitchell, The implication problem for functional and inclusion dependencies, Information and Control 56 (1983), pp. 154–173.MathSciNetzbMATHCrossRefGoogle Scholar
  197. MiEi92.
    P. Mishra, M.H. Eich, Join processing in relational databases, ACM Computing Surveys 24 (1992), pp. 63–113.CrossRefGoogle Scholar
  198. MuPi 94.
    I.S. Mumick, H. Pirahesh, Implementation of magic-sets in a relational atabase system,Proc. ACM SIGMOD Int. Conference on Management of Data, Minneapolis, 1994, pp. 103–114.Google Scholar
  199. Mü 74.
    P.J. Müller, Die Gefährdung der Privatsphäre durch Datenbanken, in: U. Dammann, M. Karhausen, P. Müller, W. Steinmüller, Datenbanken und Datenschutz, Frankfurt-New York 1974, pp. 63–90.Google Scholar
  200. NaS 89.
    Nationale IT-Sicherheitskrite rien, Bundesanzeiger-Verlag, 1989.Google Scholar
  201. NyOs 95.
    M. Nyanchama, S. Osborn, Access rights administration in role-based security systems, Database Security, VIII: Status and Prospects (eds: J. Biskup, M. Morgenstern, C.E. Landwehr), North-Holland, Amsterdam etc., 1995, pp. 37–56.Google Scholar
  202. OmWe 83.
    K.A. Omar, D.L. Wells, Modified architecture for the sub-keys model, Proc. IEEE Symposium on Security and Privacy, 1983, Oakland, pp. 79–86.Google Scholar
  203. Ont 92b.
    Ontos Inc., Ontos DB 2.2: Reference Manual, Volume 1, Class and Function Libraries, Ontos Inc., Burlington, 1992.Google Scholar
  204. Ora 90.
    Oracle Corporation, SQL Language Reference Manual, Version 6.0, Redwood Shores, 1990.Google Scholar
  205. OtWi 90.
    T. Ottmann, P. Widmayer, Algorithmen und Datenstrukturen, BI-Wissenschaftsverlag, Mannheim etc., 1990.zbMATHGoogle Scholar
  206. ÖzVa 91.
    M.T. Özsu, P. Valduriez, Principles of Distributed Database Systems, Prentice-Hall, Englewood Cliffs, 1991.Google Scholar
  207. Pa 78.
    J. Paredaens, On the expressive power of the relational algebra, Information Processing Letters 7 (1978), pp. 44–49.MathSciNetCrossRefGoogle Scholar
  208. Pa 86.
    C. Papadimitriou, The Theory of Database Concurrency Control, Computer Science Press, Rockville, 1986.zbMATHGoogle Scholar
  209. Pa 92.
    D.B. Parker, Restating the foundation of information security, IT- Security: The Need for International Cooperation, Proc. IFIP/SEC ‘82, North-Holland, Amsterdam etc., 1992, pp. 139–151.Google Scholar
  210. PaDGV 89.
    J. Paredaens, P. De Bra, M. Gyssens, D. Van Gucht, The Structure of the Relational Database Model, Spnnger, Berlin etc., 1989.zbMATHGoogle Scholar
  211. PaVa 92.
    M. Papazoglou, W. Valder, Entwurf relationaler Datenbanken in C, Hanser/Prentice-Hall, Wien/London, 1992.Google Scholar
  212. Pe 62.
    C.A. Petri, Kommunikation mit Automaten,Schriften des Institutes für Instrumentelle Mathematik Nr.2, Bonn, 1962.Google Scholar
  213. PeMa 88.
    J. Peckham, F. Maryanski, Semantic data models,ACM Computing Surveys 20 (1988), pp. 153–189.zbMATHCrossRefGoogle Scholar
  214. Pr 94.
    I. Pratt, Artificial Intelligence, Macmillan, Houndsmills — London, 1994.Google Scholar
  215. Ra 82.
    P. Raulefs, Methoden der künstlichen Intelligenz: Übersicht und Anwendungen in Expertensystemen, GI-Jahrestagung ‘82, Informatik-Fachbericht 57, Berlin etc., 1982, pp. 170–187.Google Scholar
  216. Ra 88.
    F. Rabitti, D. Woelk, W. Kim, A model of authorization for object-oriented and semantic databases,Proc. Int. Conf. on Extending Database Technology, Venice, March 1988, Lecture Notes in Computer Science 303, Springer, Berlin etc., 1988, pp. 231–250.Google Scholar
  217. Re 85a.
    W. Reisig, Petri Nets - An Introduction,EATCS Monographs on Theoretical Computer Science, Springer, Berlin etc., 1985.Google Scholar
  218. Re 85b.
    W. Reisig, Systementwurf mit Netzen, Springer, Berlin etc., 1985.zbMATHCrossRefGoogle Scholar
  219. Re 89.
    H.L. Resnikoff, The Illusion of Reality, Springer, New York etc., 1989.zbMATHCrossRefGoogle Scholar
  220. Re 93.
    B. Reinwald, Workflow-Management in verteilten Systemen, Teubner, Stuttgart-Leipzig, 1993.Google Scholar
  221. RiAdDe 78.
    R.L. Rivest, L. Adleman, M.L. Dertouzos, On data banks and privacy homomorphisms, in: Foundation of Secure Computation (eds: DeMillo, Dobkin, Jones, Lipton), Academic Press, New York, 1978, pp. 169–177.Google Scholar
  222. RuBPEL 91.
    J. Rumbaugh, M. Blaha, W. Premerlani, F. Eddy, W. Lorensen, Object-Oriented Modeling and Design, Prentice-Hall, Englewood Cliffs, 1991.Google Scholar
  223. Sa 83.
    Y. Sagiv, A characterization of globally consistent databases and their correct access paths, ACM Transactions on Database Systems 8 (1983), pp. 266–286.CrossRefGoogle Scholar
  224. Sag 88.
    Y. Sagiv, Optimizing datalog programs, Foundations of Deductive Databases and Logic Programming (ed.: J. Minker), Morgan-Kaufmann, Los Altos, 1988, pp.659–698.Google Scholar
  225. SaJa 92.
    R.S. Sandhu, S. Jajodia, Polyinstantiation for cover stories, Proc. 2nd European Symposium on Research in Computer Security, ESORICS ‘82, Lecture Notes in Computer Science 648, Springer, Berlin etc., 1992, pp. 307–328.Google Scholar
  226. SaSwWa 94.
    K. Sagonas, T. Swift, D.S. Warren, XSB as an efficient deductive database engine, Proc. ACM SIGMOD Int. Conference on Management of Data, Minneapolis, 1994, pp. 442–453.Google Scholar
  227. Sch 76.
    G. Schlageter, Prozeßsynchronisation in Datenbanksystemen, Habilitationsschrift, Universität Karlsruhe, 1976 (Process synchronization in database systems, ACM Transactions on Database Systems 3 (1978), pp. 248–271).CrossRefGoogle Scholar
  228. SchBr 83.
    J.W. Schmidt, M.L. Brodie, Relational Database Systems - Analysis and Comparison, Springer, Berlin etc., 1983.CrossRefGoogle Scholar
  229. SeTu 94.
    P.S. Sell, B.M. Thuraisingham, Applying OMT for designing multilevel database application,Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 41–64.Google Scholar
  230. Sh 67.
    J.R. Shoenfield, Mathematical Logic, Addison-Wesley, Reading etc., 1967.zbMATHGoogle Scholar
  231. Shm 87.
    O. Shmueli, Decidability and expressiveness aspects of logic queries, Proc. ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1987, pp.237–249.Google Scholar
  232. Si 90.
    D. Siefkes, Formalisieren und Beweisen - Logik für Informatiker, Vieweg, Braunschweig-Wiesbaden, 1990.zbMATHGoogle Scholar
  233. SmSm 77.
    J.M. Smith, D.C.P. Smith, Database abstraction: aggregation and generalization, ACM Transactions on Database Systems 2 (1977), pp. 105–133.CrossRefGoogle Scholar
  234. SmWi 92.
    K. Smith, M. Winslett, Entity modeling in the MLS relational model Proc. 18th Int. Conf. on Very Large Data Bases, 1992, pp. 199–210.Google Scholar
  235. SpKWSH 86.
    D. Spooner, A.M. Keller, G. Wiederhold, J. Solasin, D. Heystek, Framework for the security component of an ADA DBMS, Proc. 12 th. Int. Conf. on Very Large Data Bases, Kyoto, 1986, pp. 347–354.Google Scholar
  236. SpLa 90.
    D.L. Spooner, C.E. Landwehr, editors, Database Security, III: Status and Prospects,North-Holland, Amsterdam etc., 1990.Google Scholar
  237. St 86.
    M. Stonebraker (ed.), The INGRES Papers: Anatomy of a Relational Database System,Addison-Wesley, Reading etc., 1986.Google Scholar
  238. StLeRo 76.
    R.E.Stearns, P.M.Lewis II, D.J.Rosenkrantz, Concurrency control for database systems, Proc. 17th IEEE Symp. on Foundations of Computer Science, 1976, pp. 19–32.Google Scholar
  239. Str 86.
    B. Stroustrup, The C++ Programming Language, Addison-Wesley, Reading etc., 1986.zbMATHGoogle Scholar
  240. StWKH 76.
    M. Stonebraker, E. Wong, P. Kreps, G. Held, The design and implementation of INGRES, ACM Transactions on Database Systems 1 (1976), pp. 189–222.CrossRefGoogle Scholar
  241. Ta 88.
    A.S. Tanenbaum, Computer Networks (2nd edition), Prentice-Hall, Englewood Cliffs, 1988.Google Scholar
  242. TaZa 71.
    G. Takeuti, W.M. Zaring, Introduction to Axiomatic Set Theory, Springer, Berlin etc., 1971.zbMATHGoogle Scholar
  243. TeYaFr 86.
    T.J. Teory, D. Yang, J.P. Fry, A logical design methodology for relational databases using the extended entity-relationship model, ACM Computing Surveys 18 (1986), pp.197–222.CrossRefGoogle Scholar
  244. Th 91.
    B. Thalheim, Dependencies in Relational Databases, Teubner, Stuttgart - Leipzig, 1991.zbMATHGoogle Scholar
  245. ThLa 93.
    B.M. Thuraisingham, C.E. Landwehr, editors, Database Security, VI: Status and Prospects, North-Holland, Amsterdam etc., 1993.Google Scholar
  246. ThSa 94.
    R.K. Thomas, R.S. Sandhu, Towards a unified framework and theory for reasoning about security and correctness of transactions in multilevel databases, Database Security, VII: Status and Prospects (eds: T.F. Keefe, C.E. Landwehr), North-Holland, Amsterdam etc., 1994, pp. 309–328.Google Scholar
  247. Ti 88.
    T.C. Ting, A user-role based data security approach, Database Security: Status and Prospects (ed.: C.E. Landwehr), North-Holland, Amsterdam etc., 1988, pp. 187–208.Google Scholar
  248. TiTu 88.
    M.-T. Tinnefeld, H. Tubies, Datenschutzrecht, Oldenbourg, MünchenWien, 1988.Google Scholar
  249. TsK1 78.
    D. Tsichritzis, A. Klug, The ANSI/X3/SPARC DBMS framework, Information Systems 3 (1978), pp.173–191.CrossRefGoogle Scholar
  250. Ul 88.
    J.D. Ullman, Principles of Database and Knowledge-Base Systems, Volume I, Computer Science Press, Rockville, 1988.Google Scholar
  251. Ul 89.
    J.D. Ullman, Principles of Database and Knowledge-Base Systems, Volume II, Computer Science Press, Rockville, 1989.Google Scholar
  252. Ul 91.
    J.D. Ullman, A comparison between deductive and object-oriented database systems, Proc. 2nd Inf. Conf. on Deductive and Object-Oriented Databases (DOOD `91), Munich, Lecture Notes in Computer Science 566, Springer, Berlin etc., 1991, pp. 263–277.Google Scholar
  253. Va 84.
    M.Y. Vardi, The implication and finite implication problem for typed template dependencies, Journal of Computer and System Sciences 28 (1984), pp. 3–28.MathSciNetzbMATHCrossRefGoogle Scholar
  254. Va 88.
    M.Y. Vardi, Fundamentals of dependency theory, Trends in Theoretical Computer Science (E.Börger, ed.), Computer Science Press, Rockville, 1988, pp. 171–224.Google Scholar
  255. Va 88a.
    M.Y. Vardi, The universal-relation data model for logical independence, IEEE Software 5 (1988), pp. 80–85.CrossRefGoogle Scholar
  256. VaVo 93.
    J. Van den Bussche, G. Vossen, An extension of path expresssions to simplify navigation in object-oriented queries, Proc. 3rd International Conference on Deductive and Object-Oriented Databases, Lecture Notes in Computer Science 760, Springer, Berlin etc., 1993, pp. 267–282.Google Scholar
  257. ViVi 87.
    B. Vickery, A. Vickery, Information Science in Theory and Practice, Bowker-Saur, London etc., 1987.Google Scholar
  258. Vo 94.
    G. Vossen, Datenmodelle Datenbanksprachen und Datenbank- management-Systeme, Addison-Wesley, Bonn etc., 2. aktualisierte und veränderte Auflage 1994.Google Scholar
  259. Vo 91a.
    G. Vossen, Data Models, Database Languages and Database Management Systems,Addison-Wesley, Wokingham etc., 1991.Google Scholar
  260. Vo 91b.
    G. Vossen, Modellbildung für Datenbank-Transaktionen, in: Entwicklungstendenzen bei Datenbanksystemen (Hrsg.: G. Vossen, K.U. Witt), Oldenbourg, München, 1991, pp. 277–316.Google Scholar
  261. VoHa 93.
    G. Vossen, M. Gross-Hardt, Grundlagen der Transaktionsverarbeitung, Addison-Wesley, Bonn etc., 1993.Google Scholar
  262. VoWi 88.
    G. Vossen, K.-U. Witt, Das SQL/DS - Handbuch, Addison-Wesley, Bonn etc., 1988.Google Scholar
  263. We 88.
    G. Weikum, Transaktionen in Datenbanksystemen, Addison-Wesley, Bonn etc., 1988.Google Scholar
  264. We 85.
    C.F. von Weizsäcker, Aufbau der Physik, Hanser, München-Wien, 1985.Google Scholar
  265. We 92.
    H. Wedekind, Objektorientierte Schemaentwicklung — Ein kategorialer Ansatz für Datenbanken und Programmierung, BI-Wissenschaftsverlag, Mannheim etc., 1992.Google Scholar
  266. WeHä 76.
    H. Wedekind, T. Härder, Datenbanksysteme II Bibliographisches Institut Mannheim etc., 1976.zbMATHGoogle Scholar
  267. Wi 86.
    N. Wirth, Algorithmen und Datenstrukturen mit Modula-2, Teubner, Stuttgart, 1986.zbMATHGoogle Scholar
  268. Wi 87.
    G. Wiederhold, File Organization for Database Design, McGraw-Hill, New York, 1987.Google Scholar
  269. Ya 79.
    S.B. Yao, Optimization of query evaluation algorithms, ACM Transactions on Database Systems 4 (1979), pp.133–155.CrossRefGoogle Scholar
  270. Za 76.
    C. Zaniolo, Analysis and design of relational schemata for database systems,UCLA-ENG-7669, Computer Science Department, University of California Los Angelos, 1976.Google Scholar
  271. Ze 71.
    H. Zemanek, Was ist Informatik ?, Symposium “Informatik: Aspekte und Studienmodelle”, 17.-19.2.1971, Technische Hochschule Wien, 1971, pp. 5–18.Google Scholar
  272. Ze 89.
    C.A. Zehnder, Informationssysteme und Datenbanken (5. Auflage), Teubner, Stuttgart, 1989.Google Scholar
  273. Ze 92.
    H. Zemanek, Das geistige Umfeld der Informationstechnik, Springer, Berlin etc., 1992.zbMATHGoogle Scholar
  274. Zl 77.
    M.M. Zloof, Query-by-Example: a data base language, IBM Systems Journal 16 (1977), pp. 324–343.CrossRefGoogle Scholar
  275. Zl 82.
    M.M. Zloof, Office-by-Example: a business language that unifies data, word processing and electronic mail, IBM Systems Journal 21 (1982), pp. 272–304.CrossRefGoogle Scholar

Copyright information

© Friedr. Vieweg & Sohn Verlagsgesellschaft mbH, Braunschweig/Wiesbaden 1995

Authors and Affiliations

  1. 1.HildesheimDeutschland

Personalised recommendations