skip to main content
10.1145/1734714.1734717acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
research-article
Free access

Unacceptable file operations in a relational data base

Published: 11 November 1971 Publication History

Abstract

This paper is written within the context of a relational data base model as presented by E. F. Codd in [1]. It also serves as a companion paper to his paper [2].
The central thesis is that a file operation should not produce unexpected 'side effects' in order to maintain a restriction (such as one-one, or many-one) on the file. Any file operation which would violate a restriction for some possible data is called 'violative'. It is determined which cases of the file operations WRITE, REWRITE and DELETE are violative. We argue that most violative file operations should be rejected. Instead, the equivalent operations should be carried out on projections in E. F. Codd's 'third normal form' in order to alleviate the necessity for spurious side effects. It is therefore convenient for the programmer to be able to refer directly to these projections by name and for the data management system to allow operations on them. This provides further justification to that in [2] for modelling the data base interface between programmer and data management system in terms of relations in 'third normal form'.

References

[1]
E. F. Codd, 'A Relational Model of Data for Large Shared Data Banks' Comm. ACM 13, 6 (June 1970), 377--387
[2]
E. F. Codd, 'Further Normalization of the Data Base Relational Model' Courant Computer Science Symposia 6 'Data Base Systems' New York City, May 24--25, 1971. To be published by Prentice-Hall.
[3]
C. J. Date & P. Hopewell, 'File Definition and Logical Data Independence' To be presented at ACM SIGFIDET Workshop, November, 1971.
[4]
C. J. Date & P. Hopewell, 'Storage Structure and Physical Data Independence' To be presented at ACM SIGFIDET Workshop, November, 1971.

Cited By

View all
  • (2024)Factorizing formal contexts from closures of necessity operatorsComputational and Applied Mathematics10.1007/s40314-024-02590-043:3Online publication date: 23-Mar-2024
  • (2023)Composite Object Normal Forms: Parameterizing Boyce-Codd Normal Form by the Number of Minimal KeysProceedings of the ACM on Management of Data10.1145/35886931:1(1-25)Online publication date: 30-May-2023
  • (2023)Uniqueness Constraints for Object StoresJournal of Data and Information Quality10.1145/358175815:2(1-29)Online publication date: 19-Jan-2023
  • Show More Cited By
  1. Unacceptable file operations in a relational data base

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGFIDET '71: Proceedings of the 1971 ACM SIGFIDET (now SIGMOD) Workshop on Data Description, Access and Control
    November 1971
    368 pages
    ISBN:9781450373005
    DOI:10.1145/1734714
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 11 November 1971

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)118
    • Downloads (Last 6 weeks)15
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Factorizing formal contexts from closures of necessity operatorsComputational and Applied Mathematics10.1007/s40314-024-02590-043:3Online publication date: 23-Mar-2024
    • (2023)Composite Object Normal Forms: Parameterizing Boyce-Codd Normal Form by the Number of Minimal KeysProceedings of the ACM on Management of Data10.1145/35886931:1(1-25)Online publication date: 30-May-2023
    • (2023)Uniqueness Constraints for Object StoresJournal of Data and Information Quality10.1145/358175815:2(1-29)Online publication date: 19-Jan-2023
    • (2021)60 Years of DatabasesPROBLEMS IN PROGRAMMING10.15407/pp2021.03.040(040-071)Online publication date: Sep-2021
    • (2021)Mapping of the descriptive logic into RDF using binary relational data modelPROBLEMS IN PROGRAMMING10.15407/pp2021.01.056(056-083)Online publication date: Mar-2021
    • (2021)Embedded Functional Dependencies and Data-completeness Tailored Database DesignACM Transactions on Database Systems10.1145/345051846:2(1-46)Online publication date: 29-May-2021
    • (2021)Synthesis-Analysis of Derivation Sequences of Tables’ Functional DependencesJournal of Computer and Systems Sciences International10.1134/S106423072003013259:6(957-980)Online publication date: 4-Feb-2021
    • (2021)“Set-of-Strings” Framework Application to Imperfect Data Fusion2021 International Conference on Information Technology and Nanotechnology (ITNT)10.1109/ITNT52450.2021.9649387(1-10)Online publication date: 20-Sep-2021
    • (2019)Embedded functional dependencies and data-completeness tailored database designProceedings of the VLDB Endowment10.14778/3342263.334262612:11(1458-1470)Online publication date: 1-Jul-2019
    • (2019)Algebraization of Inferring Functional Dependences in Relational DatabasesJournal of Computer and Systems Sciences International10.1134/S106423071902015158:2(212-228)Online publication date: 1-Mar-2019
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media