This volume contains the 13 best of the 18 papers presented at the first MFDBS conference held in Dresden, GDR, January 19-23, 1987. A short summary of the two panel discussions is also included. The volume is intended to be a reflection of the current state of knowledge and a guide to further development in database theory. The main topics covered are: theoretical fundaments of the relational data model (dependency theory, design theory, null values, query processing, complexity theory), and of its extensions (graphical representations, NF2-models), conceptual modelling of distributed...
This volume contains the 13 best of the 18 papers presented at the first MFDBS conference held in Dresden, GDR, January 19-23, 1987. A short summary o...
Containing the papers selected for a conference on database theory, this book is organized into sections on constraints and decomposition, query languages, updates and active databases, concurrency control and recovery, knowledge bases, datalog complexity and optimization, among other topics.
Containing the papers selected for a conference on database theory, this book is organized into sections on constraints and decomposition, query langu...
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, computing refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e., by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the information society, we are challenged to maintain our values, to pursue our goals and to enforce our...
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of...
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, computing refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e., by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the information society, we are challenged to maintain our values, to pursue our goals and to enforce our...
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of...