Skip to main content

Maintaining Data Base Integrity

  • Chapter
Data Base Administration

Part of the book series: Applications of Modern Technology in Business ((AMTB))

  • 48 Accesses

Abstract

Data base integrity refers to both the accuracy and the availability of the data base. If a data base has integrity, then it is a correct and dependable model of the organization’s information processing requirements. To maintain the integrity of a data base, the dba must be able to ensure both the quality of the data base contents and the correctness of the processing applied against that data base.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Davis, G., Auditing and EDP, AICPA, New York, 1968.

    Google Scholar 

  2. Yourdon, E., Design of On-Line Computer Systems, Prentice-Hall, Englewood Cliffs, N.J., 1972.

    Google Scholar 

  3. Martin, J., Security, Accuracy, and Privacy in Computer Systems, Prentice-Hall, Englewood Cliffs, N.J., 1973.

    Google Scholar 

  4. Tonik, A. B., Checkpoint, restart, and recovery: Selected annotated bibliography, ACM SIGMOD—FDT 7(3–4), pp. 72–765, 1975.

    Google Scholar 

  5. Arthur Andersen and Co., lexicon: Automation Concept for Business Information Systems, General Description Manual, third edition (1345 Avenue of the Americas, New York, N.Y. 10019), 1974.

    Google Scholar 

  6. Eswaran, K. P., and Donald D. Chamberlain, Functional specifications of a subsystem for data base integrity, Proceedings of the Conference on Very Large Data Bases (Framingham, Mass.,), pp. 48–68, Association for Computing Machinery, New York, September 1975.

    Google Scholar 

  7. Thomas, D. A., B. Pagurek, and R. J. Buhr, Validation algorithms for pointer values in dbtg databases, ACM Transactions on Database Systems 2(4), pp. 352–369, December 1977.

    Article  Google Scholar 

  8. Severance, D., and G. Lohman, Differential files: their application to the maintenance of large databases, ACM TODS 1(3), pp. 256–267, September 1976.

    Article  Google Scholar 

  9. Lorie, Raymond, Physical integrity in a large segmented database, ACM TODS 2(1), pp. 91–104, March 1977.

    Article  Google Scholar 

  10. Giordano, N. J., and M. S. Schwartz, Data base recovery at CMIC, Proceedings of the Association for Computing Machinery SIGMOD Conference, pp. 33–42, Association for Computing Machinery, New York, 1976.

    Google Scholar 

  11. Verhofsted, J., Recovery and crash resistance in a filing system, Proceedings of the Association for Computing Machinery SIGMOD Conference, pp. 158–167, Association for Computing Machinery, New York, 1977.

    Google Scholar 

  12. Ries, Daniel R., and Michael Stonebraker, Effects of locking granularity in a database management system, ACM TODS 2(3), pp. 233–246, September 1977.

    Article  Google Scholar 

  13. Eswaran, K. P., J. N. Gray, R. A. Lorie, and I. L. Traiger, The notions of consistency and predicate locks in a database system, CACM 19(11), pp. 624–633, November 1976.

    MathSciNet  MATH  Google Scholar 

  14. Rosenkrantz, Daniel J., R. E. Stearns, and P. M. Lewis II, System level concurrency control for distributed database systems, ACM TODS 3(2), pp. 178–198, June 1978.

    Article  Google Scholar 

  15. Macri, P. P., Deadlock detection and resolution in a codasyl based data management system, Proceedings of the Association for Computing Machinery SIGMOD Conference, pp. 45-50, Association for Computing Machinery, New York, 1976.

    Google Scholar 

  16. Date, C. J., An Introduction to Database Systems, second edition, Addison-Wesley, Reading, Mass., 1977.

    MATH  Google Scholar 

  17. British Computer Society, codasyl ddlc Data Base Administration Working Group, June 1975 report. (Available from the British Computer Society, 29 Portland Place, London WIN 4HU.)

    Google Scholar 

  18. Walsh, D. A., Structured testing, Datamation, pp. 111–118, July 1977.

    Google Scholar 

  19. Lohman, Guy M., and J. A. Muckstadt, Optimal policy for batch operations: Backup, checkpointing, reorganization, and updating, ACM TODS 2(3), pp. 109–222, September 1977.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1981 Plenum Press, New York

About this chapter

Cite this chapter

Weldon, JL. (1981). Maintaining Data Base Integrity. In: Data Base Administration. Applications of Modern Technology in Business. Springer, Boston, MA. https://doi.org/10.1007/978-1-4684-3869-7_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4684-3869-7_11

  • Publisher Name: Springer, Boston, MA

  • Print ISBN: 978-1-4684-3871-0

  • Online ISBN: 978-1-4684-3869-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics