Object Identiiers, Keys, and Surrogates | Object Identiiers Revisited
نویسندگان
چکیده
Sound naming schemes for objects are crucial in many parts of computer science, such as database model-ing, database implementation, distributed and federated databases, and networked and distributed operating systems. Over the past 20 years, physical pointers, keys, surrogates and object identiiers have been used as naming schemes in database systems and elsewhere. However, there are some persistent confusions about the nature, applicability and limits of these schemes. In this paper we give a detailed comparison of three naming schemes, viz. object identiiers, internal identiiers (often called surro-gates) and keys. We discuss several ways in which identi-cation schemes can be implemented, and show what the theoretical and practical limits of applicability of iden-tiication schemes are, independently from how they are implemented. In particular, we discuss problems with the recognition and authentication of identiiers. If the iden-tiied objects are persons, an additional problem is that object identiication may connict with privacy demands; for this case, we indicate a way in which identiication can be combined with privacy protection.
منابع مشابه
The Identiication of Objects and Roles -object Identiiers Revisited
In this paper we investigate several concepts that are known in database research for some time but which are still surrounded by some confusion. We start with the concepts of object identiier, surrogate and key and list the diierences between these concepts, which in practice are often ignored. Sharpening these diierences allows us to analyze the distinction between objects and roles that rece...
متن کاملUpdating Metalogic Programs by Rebinding Names
Amalgamated logic programming can be used to express relationships between two theories which can be interpreted as a transformation from one theory to another, so providing a form of logical update. In a system representing objects as theories this can explain state updates of objects but it does not account properly for object identiiers. We describe a notion of rebinding for object identiier...
متن کاملVersion Management for Scienti c
Scientiic databases are used to accession objects representing the results of scientiic inquiry, such as genes and DNA sequences. These objects must have stable identiiers that can be used as references in scientiic papers and other databases. The requirement for stable object identiiers, however, connicts with the tendency of scientiic data to evolve over time. We present in this paper version...
متن کاملObject Functional Dependencies and the Semantics of Class Extensions
We introduce the concept of object functional dependency for object oriented models, and we study consistency, satisfaction and functional implication in the context of a class extension. We then use functional implication to deene the formal semantics of a class extension by a least xpoint construction. The concepts introduced here are motivated by similar and well known concepts of the relati...
متن کاملFirst - Class ExtentsShinn - Der Lee and Daniel
Adding environments as rst-class values to a language can greatly enhance its expressiveness. But rst-class environments do not mesh well into a lexically scoped language since they rely on identiiers (variable names). By distinguishing variables from identiiers and therefore extents from environments, we present an alternative: rst-class extents. First-class extents are deened on variables rat...
متن کامل