33 pages matching access control in this book
Results 1-3 of 33
What people are saying - Write a review
We haven't found any reviews in the usual places.
Logical Structuring and Data Independence
Security and Integrity
5 other sections not shown
access control Access Method ADABAS allocated allows application programs automatically batch buffer pool called Central Version CODASYL contains control field control key copy Data Base Data Description Language data independence Data Manipulation Language data structures database key database record DBMOD DBMS defined deleted dependent segments described Entry Data Set ESDS ESDS records facilities Figure five DBMSs format free space group field HDAM HIDAM hierarchical host language identified IDMS implemented IMS-DLI1 interface linked linkpath loaded location mode locked logical structure Master Data Set member records modules multithreaded on-line operating system optimise optionally overflow owner parameters performance physical block physical database file pointer array preprocessor reorganised request response code retrieval rollback run-unit schema segment type sequence Sequential Access space management specified stored subschema teleprocessing tion TOTAL update utility Variable Entry Data virtual machines VSAM