SIMULA 67 common base language, (Norwegian Computing Center. Publication)
SIMULA 67 common base language, (Norwegian Computing Center. Publication)
Intentional resolution of privacy protection in database systems
Communications of the ACM
The data management facilities of PLAIN
SIGMOD '79 Proceedings of the 1979 ACM SIGMOD international conference on Management of data
Cost and performance analysis of semantic integrity validation methods
SIGMOD '79 Proceedings of the 1979 ACM SIGMOD international conference on Management of data
Translating advanced integrity checking technology to SQL
Database integrity
Interaction with databases through procedural languages
ACM '78 Proceedings of the 1978 annual conference - Volume 2
Semantic integrity in a relational data base system
VLDB '75 Proceedings of the 1st International Conference on Very Large Data Bases
VLDB '75 Proceedings of the 1st International Conference on Very Large Data Bases
Synergistic authorization in database systems
VLDB '81 Proceedings of the seventh international conference on Very Large Data Bases - Volume 7
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Hi-index | 0.02 |
The main thesis of this paper is that interaction with data bases is fundamentally different from file manipulation: In the former case the data base should be “the master,” while the file is a passive collection of data. The main corollaries of this observaction are: a) The conventional update and retrieval operations, traditionally used for files, are not satisfactory as the primitives of users data-base interaction. b) The privacy and integrity of the data base cannot be secured by “access control” alone; there must be a way for the data base to control the user's program itself.