An Introduction to Database Systems, Volume II

C. J. Date

Publisher: Addison-Wesley, 1985, 383 pages

ISBN: 0-201-14474-3

Keywords: Databases

Last modified: Aug. 7, 2021, 4:33 p.m.

As its title indicates, this book is a sequel to the earlier book An Introduction to Database Systems. Its overall objective is to describe a somewhat miscellaneous collection of "further database topics" — topics that, despite their importance, had to be omitted from Volume 1 for a variety of reasons.

Reprinted with corrections, July 1985

  1. Recovery
    1. Introduction
    2. Transactions
      • Messages
      • Transaction structure
      • Types of failures
    3. Transaction Failures
      • Undoing changes
      • On-line log
      • UNDO logic
      • Long transactions
      • log compression
    4. System Failures
      • Redoing changes
      • REDO logic
      • Log write-ahead
      • System startup
      • Messages
      • A refinement of the checkpoint/recovery procedure
    5. Media Failures
    6. Two-Phase Commit
    7. Data Manipulation Language Recovery Operations
      • SQL (System R)
      • DL/I /IMS)
      • DBTG
      • UDL
  2. Integrity
    1. Introduction
    2. Integrity Rules
    3. Domain Integrity Rules
    4. Relation Integrity Rules
      • Examples
      • Some comments
    5. Fanset Integrity Constraints
    6. Triggered Procedures
    7. Some Existing Systems
      • SQL and System R
      • Query By Example
      • INGRES
      • IMS
      • DBTG
  3. Concurrency
    1. The Problems of Interference
    2. Exclusive Locks
    3. Serializability
    4. Deadlock
    5. The Lost Update Problem Required
    6. Shared Locks
    7. Update Locks
    8. Two-Phase Locking
    9. Deadlock Avoidance
      • Transaction scheduling
      • Request rejection
      • Transaction retry
      • Timestamping
    10. Locking Granularity
    11. Intent Locking
    12. Levels of Isolation
    13. Data Manipulation Language Locking Operations
      • UDL
      • SQL (System R)
      • DL/I (IMS)
      • DBTG
    14. Timestamp Techniques
  4. Security
    1. Introduction
    2. Identification and Authentication
    3. Authorization Rules
      • The arbiter
    4. Some Existing Systems
      • System R
      • INGRES
      • Query By Example
      • IMS
      • DBTG
      • UDL
    5. Data Classification
    6. Statistical Databases
    7. Data Encryption
      • The Data Encryption Standard
      • Public-key encryption
  5. Data Models
    1. Introduction
    2. What is a Data Model?
    3. The Relational Model
      • Relational database
      • Relational operations
      • Relational algebra: additional operators
      • Relational rules
      • Some consequences of the definitions
    4. Irreducible Models
      • Binary relational models
      • Irreducible relational models
      • Functional models
      • An alternative view
    5. Null Values
      • A scheme for handling nulls
      • Effect on the relational algebra
      • Additional operators
      • Consequences of the foregoing treatment
      • Implementation anomalies
      • Default values
    6. Semantic Data Modeling
      • The "basic semantic model"
      • The entity-relationship approach
      • Data abstraction
  6. The Extended Relational Model: RM/T
    1. Introduction
    2. Entities
      • Entity classification
      • Entity subtypes and supertypes
    3. Surrogates
    4. The E-Domain, E-Attributes, and E-Relations
    5. Properties and P-Relations
    6. Entity References
    7. Characteristic Entities
    8. Associative Entities
    9. Designative Entities
    10. Entity Types
      • Type hierarchy
      • Multiple supertypes
      • Subtype integrity
      • Alternative generalization
    11. The RM/T Catalog
      • The property graph
      • The characteristic graph
      • The associative graph
      • The designation graph
      • The subtype graph
    12. RM/T Operators
    13. Summary
      • Objects
      • Operators
      • Integrity rules
      • Naming conventions
      • Catalog relations
      • Hypothetical syntax
  7. Distributed Databases
    1. Introduction
      • Location transparency
      • Replication transparency
      • Advantages of distributed systems
    2. Distributed System Structure
      • Reliable communications
      • Data fragmentation
      • Transaction management
      • Homogeneous vs. heterogeneous systems
      • Problems of distributed system
    3. Distributed Database and IMS
    4. Distributed Database and CICS
    5. Query Processing
    6. Update Propagation
    7. Concurrency Control
      • Locking
      • Global Deadlock
      • Timestamping
      • Conservative timestamping
      • Transaction classes
      • Conflict graph analysis
    8. Commit Protocols
    9. Catalog Management
    10. Conclusion
  8. Database Machines
    1. Introduction
      • What is a database machine?
      • Advantages and disadvantages
    2. The Dedicated Conventional Machine Approach
      • Performance
      • Backend software
      • Some implemented systems
    3. The Associative Disk Approach
      • Device categorization
      • Performance
    4. Conclusions

Reviews

An Introduction to Database Systems, Volume II

Reviewed by Roland Buresund

Very Good ******** (8 out of 10)

Last modified: May 21, 2007, 2:54 a.m.

This one is a must read, together with Volume I. Admittedly, extremely boring, but useful…

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required