The design of a rotating associative memory for relational database applications
ACM Transactions on Database Systems (TODS) - Special issue: papers from the international conference on very large data bases: September 22–24, 1975, Framingham, MA
Performance evaluation of a relational associative processor
ACM Transactions on Database Systems (TODS)
Computer Security
The design of a mass memory for a database computer
ISCA '78 Proceedings of the 5th annual symposium on Computer architecture
A microprogrammed keyword transformation unit for a database computer
MICRO 10 Proceedings of the 10th annual workshop on Microprogramming
The architecture of CASSM: A cellular system for non-numeric processing
ISCA '73 Proceedings of the 1st annual symposium on Computer architecture
Structure memory designs for a database computer
ACM '77 Proceedings of the 1977 annual conference
Hi-index | 0.00 |
The database computer (DBC) is a specialized back-end computer which is capable of managing data 1010 bytes in size and supporting known data models such as relational, network, hierarchical and attribute-based models. It is also perhaps the first database machine to have a built-in security mechanism for access control. At the outset, the security mechanism was made an integral part of the DBC design. This design philosophy not only allowed us to construct a system that has no “backdoors”, but also ensured that all access requests are, in fact, controlled by DBC's security mechanism. The DBC security mechanism is based on the concept of security atoms, aggregates of data units being definable by the user in terms of conjunctions of query predicates. The fundamental gain in utilizing query conjunctions for the purpose of access control is that any data that is accessible or updateable is also protectable. It is believed that the DBC security mechanism is less cumbersome than the view mechanism of some database systems and more efficient than the query modification mechanism used by some other systems. This is demonstrated at three levels of access control, namely the subfile, record and field (attribute) levels.