Object Identiiers, Keys, and Surrogates | Object Identiiers Revisited

نویسندگان

  • Roel Wieringa
  • Wiebren de Jonge
چکیده

Sound naming schemes for objects are crucial in many parts of computer science, such as database model-ing, database implementation, distributed and federated databases, and networked and distributed operating systems. Over the past 20 years, physical pointers, keys, surrogates and object identiiers have been used as naming schemes in database systems and elsewhere. However, there are some persistent confusions about the nature, applicability and limits of these schemes. In this paper we give a detailed comparison of three naming schemes, viz. object identiiers, internal identiiers (often called surro-gates) and keys. We discuss several ways in which identi-cation schemes can be implemented, and show what the theoretical and practical limits of applicability of iden-tiication schemes are, independently from how they are implemented. In particular, we discuss problems with the recognition and authentication of identiiers. If the iden-tiied objects are persons, an additional problem is that object identiication may connict with privacy demands; for this case, we indicate a way in which identiication can be combined with privacy protection.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Identiication of Objects and Roles -object Identiiers Revisited

In this paper we investigate several concepts that are known in database research for some time but which are still surrounded by some confusion. We start with the concepts of object identiier, surrogate and key and list the diierences between these concepts, which in practice are often ignored. Sharpening these diierences allows us to analyze the distinction between objects and roles that rece...

متن کامل

Updating Metalogic Programs by Rebinding Names

Amalgamated logic programming can be used to express relationships between two theories which can be interpreted as a transformation from one theory to another, so providing a form of logical update. In a system representing objects as theories this can explain state updates of objects but it does not account properly for object identiiers. We describe a notion of rebinding for object identiier...

متن کامل

Version Management for Scienti c

Scientiic databases are used to accession objects representing the results of scientiic inquiry, such as genes and DNA sequences. These objects must have stable identiiers that can be used as references in scientiic papers and other databases. The requirement for stable object identiiers, however, connicts with the tendency of scientiic data to evolve over time. We present in this paper version...

متن کامل

Object Functional Dependencies and the Semantics of Class Extensions

We introduce the concept of object functional dependency for object oriented models, and we study consistency, satisfaction and functional implication in the context of a class extension. We then use functional implication to deene the formal semantics of a class extension by a least xpoint construction. The concepts introduced here are motivated by similar and well known concepts of the relati...

متن کامل

First - Class ExtentsShinn - Der Lee and Daniel

Adding environments as rst-class values to a language can greatly enhance its expressiveness. But rst-class environments do not mesh well into a lexically scoped language since they rely on identiiers (variable names). By distinguishing variables from identiiers and therefore extents from environments, we present an alternative: rst-class extents. First-class extents are deened on variables rat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995