Abstract
Data base integrity refers to both the accuracy and the availability of the data base. If a data base has integrity, then it is a correct and dependable model of the organization’s information processing requirements. To maintain the integrity of a data base, the dba must be able to ensure both the quality of the data base contents and the correctness of the processing applied against that data base.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Davis, G., Auditing and EDP, AICPA, New York, 1968.
Yourdon, E., Design of On-Line Computer Systems, Prentice-Hall, Englewood Cliffs, N.J., 1972.
Martin, J., Security, Accuracy, and Privacy in Computer Systems, Prentice-Hall, Englewood Cliffs, N.J., 1973.
Tonik, A. B., Checkpoint, restart, and recovery: Selected annotated bibliography, ACM SIGMOD—FDT 7(3–4), pp. 72–765, 1975.
Arthur Andersen and Co., lexicon: Automation Concept for Business Information Systems, General Description Manual, third edition (1345 Avenue of the Americas, New York, N.Y. 10019), 1974.
Eswaran, K. P., and Donald D. Chamberlain, Functional specifications of a subsystem for data base integrity, Proceedings of the Conference on Very Large Data Bases (Framingham, Mass.,), pp. 48–68, Association for Computing Machinery, New York, September 1975.
Thomas, D. A., B. Pagurek, and R. J. Buhr, Validation algorithms for pointer values in dbtg databases, ACM Transactions on Database Systems 2(4), pp. 352–369, December 1977.
Severance, D., and G. Lohman, Differential files: their application to the maintenance of large databases, ACM TODS 1(3), pp. 256–267, September 1976.
Lorie, Raymond, Physical integrity in a large segmented database, ACM TODS 2(1), pp. 91–104, March 1977.
Giordano, N. J., and M. S. Schwartz, Data base recovery at CMIC, Proceedings of the Association for Computing Machinery SIGMOD Conference, pp. 33–42, Association for Computing Machinery, New York, 1976.
Verhofsted, J., Recovery and crash resistance in a filing system, Proceedings of the Association for Computing Machinery SIGMOD Conference, pp. 158–167, Association for Computing Machinery, New York, 1977.
Ries, Daniel R., and Michael Stonebraker, Effects of locking granularity in a database management system, ACM TODS 2(3), pp. 233–246, September 1977.
Eswaran, K. P., J. N. Gray, R. A. Lorie, and I. L. Traiger, The notions of consistency and predicate locks in a database system, CACM 19(11), pp. 624–633, November 1976.
Rosenkrantz, Daniel J., R. E. Stearns, and P. M. Lewis II, System level concurrency control for distributed database systems, ACM TODS 3(2), pp. 178–198, June 1978.
Macri, P. P., Deadlock detection and resolution in a codasyl based data management system, Proceedings of the Association for Computing Machinery SIGMOD Conference, pp. 45-50, Association for Computing Machinery, New York, 1976.
Date, C. J., An Introduction to Database Systems, second edition, Addison-Wesley, Reading, Mass., 1977.
British Computer Society, codasyl ddlc Data Base Administration Working Group, June 1975 report. (Available from the British Computer Society, 29 Portland Place, London WIN 4HU.)
Walsh, D. A., Structured testing, Datamation, pp. 111–118, July 1977.
Lohman, Guy M., and J. A. Muckstadt, Optimal policy for batch operations: Backup, checkpointing, reorganization, and updating, ACM TODS 2(3), pp. 109–222, September 1977.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1981 Plenum Press, New York
About this chapter
Cite this chapter
Weldon, JL. (1981). Maintaining Data Base Integrity. In: Data Base Administration. Applications of Modern Technology in Business. Springer, Boston, MA. https://doi.org/10.1007/978-1-4684-3869-7_11
Download citation
DOI: https://doi.org/10.1007/978-1-4684-3869-7_11
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4684-3871-0
Online ISBN: 978-1-4684-3869-7
eBook Packages: Springer Book Archive