skip to main content
10.1145/1499799.1499911acmotherconferencesArticle/Chapter ViewAbstractPublication PagesafipsConference Proceedingsconference-collections
research-article
Free access

Integrity aspects of a shared data base

Published: 07 June 1976 Publication History

Abstract

A simple model is formulated to represent integrity constraints and to describe the evaluation and enforcement of these constraints in a shared data base environment. The proposed model is applied to define the integrity facilities of a relational data base. This data base consists of a set of base relations, which are presented to the user through application-oriented views. These views are basically joins or projections of the base relations, and the data base is accessed through a language which by referring to predefined views, makes explicit the intentions of application programs. The types of integrity rules incorporated in this system, their description, their evaluation, and the propagation of changes to views into the shared data base, are discussed.

References

[1]
Allen, F. E., "A Basis for Program Optimization," Proc. IFIP Congress 71, North-Holland, Amsterdam, 1972.
[2]
Boyce, R. F. and D. D. Chamberlin, Using a Structured, English Query Language as a Data Definition Facility, IBM Research Dept. RJ1318, December 1973.
[3]
Chamberlin, D. E., F. N. Gray, and I. L. Traiger, "Views, Authorization, and Locking in a Relational Data Base System," Proc. 1975 National Computer Conference, AFIPS Press, Montvale, N.J., 1975.
[4]
CODASYL Data Description Language, Journal of Development, Handbook 113, Natl. Bureau of Standards, Washington, January 1974.
[5]
Codd, E. F., "A Relational Model of Data for Large Shared Data Banks," Comm. ACM, 13, 6, June 1970, pp. 377--387.
[6]
Codd, E. F., "Recent Investigations in Relational Data Base Systems," Proc. IFIP Congress 74, North-Holland, 1974.
[7]
Conway, R. W., W. L. Maxwell, and H. L. Morgan, "On the Implementation of Security Measures in Information Systems," Comm. ACM, 15, 4, April 1972, pp. 211--220.
[8]
Conway, R. W., W. L. Maxwell, and H. L. Morgan, "A Technique for File Surveillance," Information Processing 74, North Holland, 1974, pp. 998--992.
[9]
Date, C. J., An Introduction to Database Systems, Addison-Wesley, Reading, Mass., 1975.
[10]
Eswaran, K. P. and D. D. Chamberlin, "Functional Specifications of a Subsystem for Data Base Integrity," Proc. ACM-RAND Symposium on Very Large Data Bases, Boston, 1975, pp. 48--68.
[11]
Fernandez, E. B., R. C. Summers, and C. D. Coleman, "An Authorization Model for a Shared Data Base," Proc. ACM SIGMOD Int. Conf. on Management of Data, pp. 23--31, ACM, New York, 1975.
[12]
Florentin, J. J., "Consistency Auditing of Data Bases," Computer J. 17, 1, February 1974, pp. 52--58.
[13]
Graves, R. W., "Integrity Control in a Relational Data Description Language, Proc. AMC '75 Pacific, pp. 108--113, ACM, New York, 1975.
[14]
Hammer, M. M. and D. J. McLeod, "Semantic Integrity in a Relational Data Base System," Proc. ACM-RAND Int. Symposium on Very Large Data Bases, Boston, 1975, pp. 25--47.
[15]
Heath, I. J., "Unacceptable File Operations in a Relational Data Base," Proc. 1971, ACM SIGFIDET Workshop, pp. 19--33, ACM, New York, 1971.
[16]
Hoffman, L. J., "The Formulary Model for Flexible Privacy and Access Controls," Proc. 1971 FJCC, AFIPS Press, Montvale, N.J., 1971.
[17]
Stonebraker, M., "Implementation of Integrity Constraints and Views by Query Modification," Proc. 1975 ACM-SIGMOD Conference, May, 1975.
[18]
Summers, R. C., C. D. Coleman and E. B. Fernandez, "A Programming Language Approach to Secure Data Base Access, Proc. ACM Pacific 75 Reg. Conf., pp. 114--118, ACM, New York, 1975.
[19]
Summers, R. C. and E. B. Fernandez, Data Description for a Shared Data Base: Views, Integrity, and Authorization, Report G 320--2671, IBM Los Angeles Scientific Center, August 1975.
[20]
Uhrowczik, R. P., "Data Dictionary/Directories," IBM Systems J., 12, 4, 1973, pp. 332--350.

Cited By

View all
  • (1984)A Scheme for Batch Verification of Integrity Assertions in a Database SystemIEEE Transactions on Software Engineering10.1109/TSE.1984.501029510:6(664-680)Online publication date: 1-Nov-1984
  • (1981)On optimal scheduling of integrity assertions in a transaction processing systemInternational Journal of Computer & Information Sciences10.1007/BF0099315010:5(315-330)Online publication date: Oct-1981
  • (1980)Database semantic integrity for a network data managerProceedings of the May 19-22, 1980, national computer conference10.1145/1500518.1500558(261-268)Online publication date: 19-May-1980
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AFIPS '76: Proceedings of the June 7-10, 1976, national computer conference and exposition
June 1976
1125 pages
ISBN:9781450379175
DOI:10.1145/1499799
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • AFIPS: American Federation of Information Processing Societies

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 June 1976

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)54
  • Downloads (Last 6 weeks)8
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (1984)A Scheme for Batch Verification of Integrity Assertions in a Database SystemIEEE Transactions on Software Engineering10.1109/TSE.1984.501029510:6(664-680)Online publication date: 1-Nov-1984
  • (1981)On optimal scheduling of integrity assertions in a transaction processing systemInternational Journal of Computer & Information Sciences10.1007/BF0099315010:5(315-330)Online publication date: Oct-1981
  • (1980)Database semantic integrity for a network data managerProceedings of the May 19-22, 1980, national computer conference10.1145/1500518.1500558(261-268)Online publication date: 19-May-1980
  • (1979)Database Program Conversion: A Framework For ResearchFifth International Conference on Very Large Data Bases, 1979.10.1109/VLDB.1979.718145(299-312)Online publication date: 1979
  • (1979)A System For Interactive Error DetectionFifth International Conference on Very Large Data Bases, 1979.10.1109/VLDB.1979.718117(32-51)Online publication date: 1979

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media