Abstract
This paper develops algorithms for verifying pointer values in DBTG (Data Base Task Group) type databases. To validate pointer implemented access paths and set structures, two algorithms are developed. The first procedure exploits the “typed pointer” concept employed in modern programming languages to diagnose abnormalities in directories and set instances. The second algorithm completes pointer validation by examining set instances to ensure that each DBTG set has a unique owner. Sequential processing is used by both algorithms, allowing a straightforward implementation which is efficient in both time and space. As presented, the algorithms are independent of implementation schema and physical structure.
- 1 CODASYL Data Base Task Group Report, April 1971 (available from ACM, New York).Google Scholar
- 2 JENS~N, K., AND WIBTH, N. PASCAL User Manual and Report. Springer-Verlag, New York, 1975. Google ScholarDigital Library
- 3 LAVALLEE, P.A., AND OHAYON, S. DMS applications and experience. In Data Base Management Systems, D.A. Jardine, Ed., North-Holland Pub. Co., Amsterdam, 1974, pp. 47--68.Google Scholar
- 4 SPERRY UNIVAC. DMS 1100 system support functions. UP-7909 REV3.Google Scholar
- 5 THOMAS, D.A. Integrity checking algorithms for CODASYL data bases. M.Eng. Th., Carleton U., Ottawa, Ont., Canada, 1976.Google Scholar
- 6 XEROX Extended Data Management System Reference Manual. 1975 (available from Honeywell Information Systems).Google Scholar
Index Terms
- Validation algorithms for pointer values in DBTG databases
Recommendations
Associative hardware and software techniques for integrity control
This paper presents the integrity control mechanism of the associative processing system, CASSM. The mechanism takes advantage of the associative techniques, such as content and context addressing, tagging and marking data, parallel processing, ...
Efficient checking of temporal integrity constraints using bounded history encoding
We present an efficient implementation method for temporal integrity constraints formulated in Past Temporal Logic. Although the constraints can refer to past states of the database, their checking does not require that the entire database history be ...
Integrity coded databases - protecting data integrity for outsourced databases
AbstractIn recent years, cloud storage has become a viable option for businesses to store and retrieve information. This storage service allows its clients releasing from financial burden of hiring professionals to maintain local databases. However, it ...
Comments