首页 > 最新文献

[1989] Proceedings. Fifth International Conference on Data Engineering最新文献

英文 中文
Read-only transactions in partitioned replicated databases 分区复制数据库中的只读事务
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47258
K. Brahmadathan, K. Ramarao
Environments where read-only transactions predominate update transactions are considered. The notion of a group in replicated databases, the recognition of which maximizes the data availability for read-only transactions in error-prone environments, is developed. It is shown that the group identification problem is NP-complete. Replica control algorithms that attempt to approximately determine groups are presented. In one algorithm, groups are determined dynamically; in the other techniques, groups are predefined. It is shown formally that both approaches yield algorithms that preserve the consistency of the database. In the environments considered, the approaches presented are shown to yield significant improvements over other fault-tolerant replica control algorithms.<>
考虑只读事务主导更新事务的环境。提出了复制数据库中的组的概念,在容易出错的环境中,对组的识别可以最大限度地提高只读事务的数据可用性。证明了群体识别问题是np完全的。提出了一种尝试近似确定组的副本控制算法。其中一种算法动态确定分组;在其他技术中,组是预定义的。结果表明,这两种方法产生的算法都能保持数据库的一致性。在考虑的环境中,所提出的方法被证明比其他容错副本控制算法产生显著的改进。
{"title":"Read-only transactions in partitioned replicated databases","authors":"K. Brahmadathan, K. Ramarao","doi":"10.1109/ICDE.1989.47258","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47258","url":null,"abstract":"Environments where read-only transactions predominate update transactions are considered. The notion of a group in replicated databases, the recognition of which maximizes the data availability for read-only transactions in error-prone environments, is developed. It is shown that the group identification problem is NP-complete. Replica control algorithms that attempt to approximately determine groups are presented. In one algorithm, groups are determined dynamically; in the other techniques, groups are predefined. It is shown formally that both approaches yield algorithms that preserve the consistency of the database. In the environments considered, the approaches presented are shown to yield significant improvements over other fault-tolerant replica control algorithms.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131668260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Time-critical database scheduling: a framework for integrating real-time scheduling and concurrency control 时间关键型数据库调度:一个集成实时调度和并发控制的框架
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47251
A. Buchmann, Dennis R. McCarthy, M. Hsu, U. Dayal
A framework is presented for analysis of time-critical scheduling algorithms. The main assumptions are analyzed behind real-time scheduling and concurrency control algorithms, and a unified approach is proposed. Two main classes of schedulers are identified according to the availability of information about resource requirements and execution times: conflict-resolving schedulers resolve conflicts at run-time, and hence can only produce a sequence of operations satisfying task priorities and resource constraints; and conflict-avoiding schedulers determine resource requirements and expected execution times through offline transaction-class preanalysis and produce a complete time-critical schedule satisfying both timing and resource constraints. For the latter case, the resolution of overload is essential. Examples are given to illustrate the framework and the main classes of scheduling algorithms.<>
提出了一种分析时间关键调度算法的框架。分析了实时调度和并发控制算法背后的主要假设,并提出了统一的方法。根据有关资源需求和执行时间的信息的可用性,确定了两类主要的调度器:解决冲突的调度器在运行时解决冲突,因此只能产生满足任务优先级和资源约束的操作序列;避免冲突的调度器通过离线事务类预分析确定资源需求和预期执行时间,并生成满足时间和资源约束的完整时间关键型调度。对于后一种情况,解决过载是至关重要的。举例说明了调度算法的框架和主要分类。
{"title":"Time-critical database scheduling: a framework for integrating real-time scheduling and concurrency control","authors":"A. Buchmann, Dennis R. McCarthy, M. Hsu, U. Dayal","doi":"10.1109/ICDE.1989.47251","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47251","url":null,"abstract":"A framework is presented for analysis of time-critical scheduling algorithms. The main assumptions are analyzed behind real-time scheduling and concurrency control algorithms, and a unified approach is proposed. Two main classes of schedulers are identified according to the availability of information about resource requirements and execution times: conflict-resolving schedulers resolve conflicts at run-time, and hence can only produce a sequence of operations satisfying task priorities and resource constraints; and conflict-avoiding schedulers determine resource requirements and expected execution times through offline transaction-class preanalysis and produce a complete time-critical schedule satisfying both timing and resource constraints. For the latter case, the resolution of overload is essential. Examples are given to illustrate the framework and the main classes of scheduling algorithms.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132259255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 126
Composition of database relations 数据库关系的组成
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47205
R. Agrawal, Shaul Dar, H. Jagadish
The authors argue for implementing composition as a primitive operation and present a single-sided composition algorithm that performs join protection and duplicate elimination as one unified operation. They report experimental results that show an operating region in which this algorithm outperforms composition by the standard method. This operating region is characterized by a join result many times larger than the source relations, and many duplicates after projection over the nonjoin attributes. This occurs, for example, in deductive databases when computing transitive closures of dense graphs.<>
作者主张将组合作为一个基本操作来实现,并提出了一个将连接保护和重复消除作为一个统一操作来执行的单面组合算法。他们报告的实验结果显示,在一个操作区域,该算法优于标准方法的合成。该操作区域的特点是连接结果比源关系大许多倍,并且在非连接属性上进行投影后有许多重复。例如,在演绎数据库中,当计算密集图的传递闭包时,就会发生这种情况。
{"title":"Composition of database relations","authors":"R. Agrawal, Shaul Dar, H. Jagadish","doi":"10.1109/ICDE.1989.47205","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47205","url":null,"abstract":"The authors argue for implementing composition as a primitive operation and present a single-sided composition algorithm that performs join protection and duplicate elimination as one unified operation. They report experimental results that show an operating region in which this algorithm outperforms composition by the standard method. This operating region is characterized by a join result many times larger than the source relations, and many duplicates after projection over the nonjoin attributes. This occurs, for example, in deductive databases when computing transitive closures of dense graphs.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134104925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Communications issues in data engineering: 'have bandwidth-will move data' 数据工程中的通信问题:“拥有带宽——将移动数据”
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47276
O. Frieder
It is argued that those areas of data engineering research which are based on the assumption that communication bandwidth is a constraint, should be investigated. Some additional distributed database issues that require reinvestigation include concurrency control, network partitioning, backup storage and recovery algorithms. With the availability of increased bandwidth, global flooding of information can result in lower processing times than conventional approaches. Hence, broadcast-based solutions which continuously inform the various sites of the system status and data modifications need to be reconsidered. Novel transmission rates also invalidate old assumptions.<>
有人认为,那些基于通信带宽是一个约束的假设的数据工程研究领域应该进行研究。需要重新研究的其他分布式数据库问题包括并发控制、网络分区、备份存储和恢复算法。随着可用带宽的增加,信息的全球泛滥可能导致比传统方法更短的处理时间。因此,需要重新考虑基于广播的解决方案,这种解决方案可以不断地通知各个站点系统状态和数据修改。新的传播速率也使旧的假设失效。
{"title":"Communications issues in data engineering: 'have bandwidth-will move data'","authors":"O. Frieder","doi":"10.1109/ICDE.1989.47276","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47276","url":null,"abstract":"It is argued that those areas of data engineering research which are based on the assumption that communication bandwidth is a constraint, should be investigated. Some additional distributed database issues that require reinvestigation include concurrency control, network partitioning, backup storage and recovery algorithms. With the availability of increased bandwidth, global flooding of information can result in lower processing times than conventional approaches. Hence, broadcast-based solutions which continuously inform the various sites of the system status and data modifications need to be reconsidered. Novel transmission rates also invalidate old assumptions.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133030460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An object-based query evaluation scheme for deductive databases in massively parallel computing environment 大规模并行计算环境中演绎式数据库的基于对象的查询评估方案
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47255
Won S. Lee, P. Sheu
An algorithm is introduced to evaluate queries in a massively parallel computing environment under an object-based representation of a database. By distributing facts into connected networks of processing elements, it is shown that parallel execution of a query can be achieved in a cooperative way, so that the conventional tuple-by-tuple evaluation can be avoided. Furthermore, it is shown that dependency imposed by shared variables is not a major problem in achieving AND parallelism any longer. Although only a single query is considered, the evaluation scheme can be extended to multiple queries with multiple query networks and with replication of counters in the fact network.<>
本文介绍了在大规模并行计算环境中,在基于对象的数据库表示法下评估查询的算法。通过将事实分布到处理元素的连接网络中,可以证明查询的并行执行可以以合作的方式实现,从而避免了传统的逐个元组评估。此外,研究还表明,共享变量带来的依赖性不再是实现 AND 并行性的主要问题。虽然只考虑了单个查询,但该评估方案可以扩展到具有多个查询网络和在事实网络中复制计数器的多个查询。
{"title":"An object-based query evaluation scheme for deductive databases in massively parallel computing environment","authors":"Won S. Lee, P. Sheu","doi":"10.1109/ICDE.1989.47255","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47255","url":null,"abstract":"An algorithm is introduced to evaluate queries in a massively parallel computing environment under an object-based representation of a database. By distributing facts into connected networks of processing elements, it is shown that parallel execution of a query can be achieved in a cooperative way, so that the conventional tuple-by-tuple evaluation can be avoided. Furthermore, it is shown that dependency imposed by shared variables is not a major problem in achieving AND parallelism any longer. Although only a single query is considered, the evaluation scheme can be extended to multiple queries with multiple query networks and with replication of counters in the fact network.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127728711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Tangram stream query processing system 七巧板流查询处理系统
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47262
D. S. Parker, R. Muntz, H. L. Chau
Tangram, an environment for modeling which is under development at UCLA, is discussed. One of the driving concepts behind Tangram has been the combination of large-scale data access and data reduction with a powerful programming environment. The Tangram environment is based on PROLOG, extending it with a number of features, including process management, distributed database access, and generalized stream processing. The authors describe the Tangram stream processor, the part of the Tangram environment performing query processing on large streams of data. The paradigm of transducers on streams is used throughout this system, providing a database flow computation capability.<>
讨论了UCLA正在开发的建模环境Tangram。Tangram背后的驱动概念之一是将大规模数据访问和数据缩减与强大的编程环境相结合。Tangram环境是基于PROLOG的,它扩展了许多特性,包括进程管理、分布式数据库访问和通用流处理。作者描述了Tangram流处理器,这是Tangram环境中对大型数据流执行查询处理的部分。在整个系统中使用了流上换能器的范例,提供了数据库流计算能力。
{"title":"The Tangram stream query processing system","authors":"D. S. Parker, R. Muntz, H. L. Chau","doi":"10.1109/ICDE.1989.47262","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47262","url":null,"abstract":"Tangram, an environment for modeling which is under development at UCLA, is discussed. One of the driving concepts behind Tangram has been the combination of large-scale data access and data reduction with a powerful programming environment. The Tangram environment is based on PROLOG, extending it with a number of features, including process management, distributed database access, and generalized stream processing. The authors describe the Tangram stream processor, the part of the Tangram environment performing query processing on large streams of data. The paradigm of transducers on streams is used throughout this system, providing a database flow computation capability.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115266085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Synchronized counting method 同步计数法
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47237
H. Aly, Z. M. Özsoyoglu
A direct extension to the counting method is presented which can deal efficiently with both acyclic and cyclic relations. The extension to cycle cases, called the synchronized counting method, is simulated and studied using a Petri net model. Worst-case analysis shows that n/sup 2/ semijoin operations are required, where n is the number of nodes in the graph representing the relevant part of the input relations. The algorithm is shown to be sound and complete, and a comparison with other methods in the literature is included.<>
提出了一种直接推广的计数方法,可以有效地处理非循环和循环关系。利用Petri网模型对循环情况的扩展,即同步计数法进行了模拟和研究。最坏情况分析表明,需要n/sup 2/半连接操作,其中n为表示输入关系相关部分的图中的节点数。该算法被证明是健全和完整的,并与文献中的其他方法进行了比较。
{"title":"Synchronized counting method","authors":"H. Aly, Z. M. Özsoyoglu","doi":"10.1109/ICDE.1989.47237","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47237","url":null,"abstract":"A direct extension to the counting method is presented which can deal efficiently with both acyclic and cyclic relations. The extension to cycle cases, called the synchronized counting method, is simulated and studied using a Petri net model. Worst-case analysis shows that n/sup 2/ semijoin operations are required, where n is the number of nodes in the graph representing the relevant part of the input relations. The algorithm is shown to be sound and complete, and a comparison with other methods in the literature is included.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"372 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115566396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Fault tolerant commit protocols 容错提交协议
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47227
S. Yuan, P. Jalote
Two different schemes are presented to make commit protocols fault-tolerant. The first scheme ensures that a failed site can directly recover to a state which is consistent with all other sites, using only its local information. This scheme can only make commit protocols resilient to a single site failure. The second scheme ensures that failed sites can recover to a state consistent with all others with as few information exchanges as possible. This scheme can make commit protocols resilient to any type of site failure.<>
提出了两种不同的提交协议容错方案。第一种方案确保故障站点可以直接恢复到与所有其他站点一致的状态,仅使用其本地信息。该方案只能使提交协议对单个站点故障具有弹性。第二种方案确保故障站点可以在尽可能少的信息交换下恢复到与所有其他站点一致的状态。该方案可以使提交协议对任何类型的站点故障都具有弹性。
{"title":"Fault tolerant commit protocols","authors":"S. Yuan, P. Jalote","doi":"10.1109/ICDE.1989.47227","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47227","url":null,"abstract":"Two different schemes are presented to make commit protocols fault-tolerant. The first scheme ensures that a failed site can directly recover to a state which is consistent with all other sites, using only its local information. This scheme can only make commit protocols resilient to a single site failure. The second scheme ensures that failed sites can recover to a state consistent with all others with as few information exchanges as possible. This scheme can make commit protocols resilient to any type of site failure.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116090215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An implementation and performance analysis of spatial data access methods 空间数据访问方法的实现与性能分析
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47268
Derek Greene
Four spatial data access methods, R-trees, K-D-B-trees, R+trees, and 2-D-Isam, have been implemented within a preliminary version of the POSTGRES DBMS (database management system). These access methods have been tested over a range of shapes and sizes of two-dimensional objects and for a range of logical page sizes. The CPU time, number of disk reads and writes, and the resulting tree sizes have been tabulated for insert and retrieve operations. It is concluded that R-trees provide the best tradeoff between performance and implementation complexity and that choice of implementation is crucial to the performance of all the methods investigated.<>
四种空间数据访问方法,R-树,k - d - b -树,R+树和2-D-Isam,已经在POSTGRES DBMS(数据库管理系统)的初步版本中实现。这些访问方法已经在二维对象的各种形状和大小以及各种逻辑页面大小上进行了测试。CPU时间、磁盘读写次数以及生成的树大小已被制成表格,用于插入和检索操作。结论是,r树提供了性能和实现复杂性之间的最佳权衡,实现的选择对所研究的所有方法的性能至关重要。
{"title":"An implementation and performance analysis of spatial data access methods","authors":"Derek Greene","doi":"10.1109/ICDE.1989.47268","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47268","url":null,"abstract":"Four spatial data access methods, R-trees, K-D-B-trees, R+trees, and 2-D-Isam, have been implemented within a preliminary version of the POSTGRES DBMS (database management system). These access methods have been tested over a range of shapes and sizes of two-dimensional objects and for a range of logical page sizes. The CPU time, number of disk reads and writes, and the resulting tree sizes have been tabulated for insert and retrieve operations. It is concluded that R-trees provide the best tradeoff between performance and implementation complexity and that choice of implementation is crucial to the performance of all the methods investigated.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"5a 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128201375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 159
An access authorization model for relational databases based on algebraic manipulation of view definitions 一种基于视图定义的代数操作的关系数据库访问授权模型
Pub Date : 1989-02-06 DOI: 10.1109/ICDE.1989.47234
Amihai Motro
A model of access authorization is described for relational databases. In this model access permissions are a form of database knowledge, from which access permissions that apply to specific requests are inferred. Database access is specified in terms of views: a set of views is defined, and each user is granted permission to access one or more views. Users direct queries at the actual database, not at any particular view. When a request to access a view is presented to the database system, the system derives views of the request that are views of the views to which the user has access permission and presents the user only with these views. The model represents the definitions of views in special metarelations and extends standard algebraic operators to these relations.<>
描述了关系数据库的访问授权模型。在此模型中,访问权限是数据库知识的一种形式,从中可以推断出适用于特定请求的访问权限。数据库访问是根据视图来指定的:定义了一组视图,每个用户被授予访问一个或多个视图的权限。用户直接查询实际的数据库,而不是任何特定的视图。当向数据库系统提出访问视图的请求时,系统派生出该请求的视图,这些视图是用户具有访问权限的视图的视图,并且只向用户显示这些视图。该模型表示特定元关系中的视图定义,并将标准代数运算符扩展到这些关系。
{"title":"An access authorization model for relational databases based on algebraic manipulation of view definitions","authors":"Amihai Motro","doi":"10.1109/ICDE.1989.47234","DOIUrl":"https://doi.org/10.1109/ICDE.1989.47234","url":null,"abstract":"A model of access authorization is described for relational databases. In this model access permissions are a form of database knowledge, from which access permissions that apply to specific requests are inferred. Database access is specified in terms of views: a set of views is defined, and each user is granted permission to access one or more views. Users direct queries at the actual database, not at any particular view. When a request to access a view is presented to the database system, the system derives views of the request that are views of the views to which the user has access permission and presents the user only with these views. The model represents the definitions of views in special metarelations and extends standard algebraic operators to these relations.<<ETX>>","PeriodicalId":329505,"journal":{"name":"[1989] Proceedings. Fifth International Conference on Data Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125129424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
期刊
[1989] Proceedings. Fifth International Conference on Data Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1