skip to main content
article
Free Access

Recovery Techniques for Database Systems

Published:01 June 1978Publication History
First page image

References

  1. ANDE75 ANDERSON, T. Provably safe programs, Tech. Rep. 70, Computing Laboratory, Univ. Newcastle upon Tyne, UK, Feb. 1975.Google ScholarGoogle Scholar
  2. ASTR76 ASTRAHAN, M. M., et al. "System R: Relational approach to data base management," in A CM Trans. Data Base Syst. 1, 2 (June 1976), 97-137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. BANA77 BANATRE, J. P.; AND SHRIVASTAVA, S. K. Rehable resource allocatwn between unrehable processes, Tech. Rep. 99, Computing Laboratory, Univ. Newcastle upon Tyne, UK, April 1977.Google ScholarGoogle Scholar
  4. BJOR72 BJORK, L. A.; AND DAVIES, C.W. The semantws of the presentatwn and recovery of integrity m a data base system, IBM Tech. Rep. TR 02.540, Dec. 1972.Google ScholarGoogle Scholar
  5. BJOR75 BJORK, L.A. "Generalmed audit trail requirements and concepts for data base applications," IBM Syst J. 14, 3 (1975), 229-245.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. CURT77 CORTICE, R.M. "Integrity in data base systems," Datamation 23, 5 (May 1977), 64-68.Google ScholarGoogle Scholar
  7. DALE65 DALE~, D. C.; AND NEUMANN, P.G. "A general purpose file system for secondary storage," in 1965 AFIPS Fall Jt. Computer Con{., Vol. 27, Part 1, Spartan Books, Washington, D.C., pp. 213-229.Google ScholarGoogle Scholar
  8. DAVI72 DAVIES, C. T. A recovery/integr$ty architecture for a data system, IBM Tech. Rep. TR 02.528, May 1972.Google ScholarGoogle Scholar
  9. DENN76 DENNING, P. J. "Fault-tolerant operating systems," Comput. Surv. 8, 4 (Dec. 1976), 359-389. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. EMAS74 REES, D. J. The EMAS directory, (EMAS report 2), MILLARD, G. E ; REES, D. J.; AND WHITFIELD, H. The standard EMAS subsystem, (EMAS report 3); SHELNESS, N. A.; STEPHENS P. D.; AND WHITFIELD, H. The Edtnburgh multi-access system scheduhng and allocatton procedures tn the restdent supervisor, (EMAS report 4); Dept. Computer Science, Univ. Edinburgh, Edinburgh, UK, April 1974.Google ScholarGoogle Scholar
  11. FRAS69 FRASER, A. G. "Integrity of a mass storage filing system," Comput. J. 12, 1 (Feb. 1969), 1-5.Google ScholarGoogle ScholarCross RefCross Ref
  12. GAMB73 GAMBLE, J N. "A file storage system for a mult2-machme enwronment," PhD Thesis, Victoria Univ., Manchester, UK, Oct. 1973.Google ScholarGoogle Scholar
  13. GIOR76 GIORDANO, N. J.; AND SCHWARTZ, M. S. "Data base recovery at CMIC," m Proc. 1976 SIGMOD Int. Conf. on Management of Data, ACM, New York, pp. 33-42. Google ScholarGoogle Scholar
  14. GRAY70 GRAY, J. N. "Locking," in Record of the Project MAC Conf. on Concurrent Systems and Parallel Computatmn, 1970, Jack Dennis (Ed.), ACM, New York, pp. 97-112.Google ScholarGoogle Scholar
  15. GRAY76 GRAY, J. N.; LORIE, R. A.; PUTZOLU, G. R.; AND TRAIGER, J.L. "Granularity of locks and degrees of consistency m a shared data base," m Modelling ~n data base management systems, G. M. NIjssen (Ed.), Elsevier North-Holland, Inc., New York, 1976, pp. 365-394Google ScholarGoogle Scholar
  16. GRAY77 GRAY, J.N. "Notes on data base operating systems," in Advanced course on operating systems, Technical Univ. Munich, 1977, Elsevier North-Holland, Inc., New York. Google ScholarGoogle Scholar
  17. HOAR74 HOARE, C. A.R. "Monitors: an operating system structuring concept," Commun. ACM 17, 10 (Oct 1974), 549-557. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. IBM IBM Information Management System reference manuals. IMS/VS, Utd~t~es reference manual, SH20--9029; IMS/ VS, Operators reference manual, SH20-9028; IMS/VS, System programmer reference manual, SH20-9027, IBM, White Plains, N.Y.Google ScholarGoogle Scholar
  19. INFO75 Infotech state of the art report: data base systems, Infotech Information Ltd., Maidenhead, UK, 1975.Google ScholarGoogle Scholar
  20. KNUT73 KNUTH, D.E. The art of computerprogrammtng, Vol. 3" sortmg and searchtng, Addison-Wesley Publ. Co., Reading, Mass., 1973. Google ScholarGoogle Scholar
  21. LAMP76 LAMPSON, B.; AND STURGIS, H. Crash recovery tna dtstrtbuted data storage system, Computer Science Laboratory, Xerox Palo Alto Research Center, Palo Alto, Callf, 1976Google ScholarGoogle Scholar
  22. LIND76 LINDEN, T. A. "Operating system structures to support security and reliable software," Comput. Surv 8, 4 (Dec. 1976), 4O9-445 Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. LOCK68 LOCKEMANN, P. C.; AND KNUTSEN, W D. "Recovery of disk contents after system failure," Commun. ACM 11, 8 (Aug. 1968), 542. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. LORI77 LORIE, R. A. "Physmal integrity in a large segmented database," ACM Trans Database Syst. 2, 1 (March 1977), 91-104 Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. MART76 MARTIN, J Principles of data-base management, Prentice-Hall, Inc., Englewood Cliffs, N J., 1976, p. 4. Google ScholarGoogle Scholar
  26. MASC71 MASCALL, A. j Studies of the rehabdsty and performance of computing systems at Barclays Bank, Internal memo SRM/10, Computing Laboratory, Univ. Newcastle upon Tyne, UK, 1971Google ScholarGoogle Scholar
  27. MASC73 MASCALL, A. J. Checkpoint, backup and restart ~n a "rehable'" system, Internal memo SRM/37, Computing Laboratory, Umv. Newcastle upon Tyne, UK, April 1973.Google ScholarGoogle Scholar
  28. MELL77 MELLIAR-SMITH, P. M.; AND RANDELL, B. "Software rehabflity: the role of programmed exception handling," m Proc. A CM Conf. on Language Design for Rehable Software, 1977, ACM, New York, pp. 95-100. Google ScholarGoogle Scholar
  29. NEWE72 NEWELL, G.B. Securtty and resd$ence ~n large scale operating systems, 1900 Series Operating Systems Division, International Computers Ltd, London, 1972.Google ScholarGoogle Scholar
  30. RAND70 RANDELL, B. Vtstt to BOAC, Internal memo SRM/5, Computmg Laboratory, Univ. Newcastle upon Tyne, UK, 1970Google ScholarGoogle Scholar
  31. RAND75 RANDELL, B. "System structure for software fault tolerance," IEEE Trans. Softw. Eng. SE-1, 2 (June 1975), 220-232.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. RAPP75 RAPPAPORT, R.L. "File structure design to facilitate on-line instantaneous updating," m Proc. 1975 ACM SIGMOD Conf., ACM, New York, pp. 1-14. Google ScholarGoogle Scholar
  33. RAND78 RANDELL, B., LEE, P. A;AND TRE- LEAVEN, P. C. "Reliability issues m computing system design," see pp 123-165 this issue Comput Surv Google ScholarGoogle Scholar
  34. RUSS77 RUSSELL, D. L. "Process backup m producer-consumer systems," m Proc. Symp. on Operatmg Systems Prtnctples 1977; Operating Syst. Rev. 11, 5 (1977), 151-157. Google ScholarGoogle Scholar
  35. SCHW73 SCHWARTZ, M S. "A storage hierarchical addressing space for a computer file system," PhD Thesis, Case Western Umv., Cleveland, Ohm, 1973 Google ScholarGoogle Scholar
  36. SEVE76 SEVERANCE, D. G.; AND LOHMAN, G. M. "Differential fries: their applicatmn to the maintenance of large databases," ACM Trans. Database Syst. 1, 3 (Sept. 1976), 256-267. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. SKLA76 SKLAROFF, J. R. "Redundancy management technique for space shuttle computers," IBM J. Res. Dev 20, 1 (Jan 1976), 20-28.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. SMIT72 SMITH, J. L.; AND HOLDEN, T. S. "Restart of an operating system having a permanent file structure," Comput. J 15, 1 (1972), 25-32.Google ScholarGoogle ScholarCross RefCross Ref
  39. STER74 STERN, J.A. Backup and recovery of on-hne tnformatton m a computer uttltty, Report MAC-TR-116, Project MAC, MIT, Cambridge, Mass., Jan. 1974 Google ScholarGoogle Scholar
  40. TAYL76 TAYLOR, J. M. Redundancy and recover, tn the HIVE vtrtual machme, Rep no. 76010, Royal Signal and Radar Establishment, Christchurch, UK, May 1976.Google ScholarGoogle Scholar
  41. TITM74 TITMAN, P. J "An experimental data base system using binary relations," m Data base management, J. W. Klimbm, and K. L. Koffeman (Eds.), Elsevier North-Holland, Inc., New York, 1974, pp. 351-360.Google ScholarGoogle Scholar
  42. TONI75 TONIK, A.B. "Checkpoint, restart and recovery: Selected annotated bibliography," FDT, Bull. A CM SIGMOD 7, 3-4 (1975), 72-76.Google ScholarGoogle Scholar
  43. VERH77a VERHOFSTAD, J. S.M. "Recovery and crash remstance m a filing system," in Proc 1977 A CM SIGMOD Int Conf on Management of Data, ACM, New York, pp. 158-167. Google ScholarGoogle Scholar
  44. VERH77b VERHOFSTAD, J. S. M "The construction of recoverable multi-level systems," PhD Thesis, Univ. Newcastle upon Tyne, UK, August 1977.Google ScholarGoogle Scholar
  45. WIMB71 WIMBROW, J. H "A large-scale interactive administrative system," IBM Syst J. 10, 4 (1971), 260-282.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. WILK75 WILKES, M.V. Ttme sharing computer systems, Elsevier North-Holland, Inc., New York, 1975 Google ScholarGoogle Scholar

Index Terms

  1. Recovery Techniques for Database Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Computing Surveys
          ACM Computing Surveys  Volume 10, Issue 2
          June 1978
          128 pages
          ISSN:0360-0300
          EISSN:1557-7341
          DOI:10.1145/356725
          Issue’s Table of Contents

          Copyright © 1978 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 June 1978
          Published in csur Volume 10, Issue 2

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • article

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader