INDEX Page references with w represent Web pages; those in bold represent definitions; those in italics represent figures and tables. A Aborted transaction, 590 Abstract class, w15-16 Abstract operation, w15-19 Accessor method, w16-5 Action, 181 Action assertion, 179–180 Action-oriented or active (@ctive) data warehousing, 472, 472–474, 473 ActiveX, 440 After image, 585 Aggregation, w15-21–22, 546 Agile software development, 51 Agosta, L., 543 Alerts, 5 Alias, 237 Ambler, S., w16-3, w16-18 Anchor object, 181 Anderson, D., 574, 577 Anderson-Lehman, R., 4, 5 Anomaly, 211 Apache Web Server, 442 Apollo moon-landing project, 27 Application integration, 533 Application partitioning, 410 Application Program Interface (API), 414, 439 Application programs, 19 Application tuning, 603–604 Application/Web server tier, 60 Aranow, E. B., 96 Armstrong, R., 470, 472, 511 Artificial intelligence, 29 Association, w15-8 Association class, w15-11 Association role, w15-8 Associative entity, 113 mapping, 218, 218–221, 219, 220 Asynchronous distributed database, w14-6 Atomic (or simple) attribute, 106 Atre, S., 416 Attribute(s), 105 identifier, 107–109, 108 naming and defining, 109–110 on relationships, 112 representing entities, 118–120, 119 required vs. optional, 105, 105–106 simple vs. composite, 106, 106 single valued vs. multivalued, 105, 106–107, 107 stored vs. derived, 107 Attribute inheritance, 154 Authentication services, 428 Authorization rules, 577, 577, 577–578, 578 B Babad, Y. M., 265 Backup and recovery, 18, 584–586 Backup facilities, 584 Backward recovery (rollback), 588–599 Ballinger, C., 278 Bank of America, 467 Basel Convention, 29 Base table, 342 Batra, D., w15-5, 143 Bauer, C., w16-3, w16-17, w16-18, w16-22 Before image, 585 Behavior, w15-6 Bell, D., w14-3, w14-4, w14-5 Berners-Lee, Tim, 430 Bernstein, P. A., 599, 600 Betts, M., 526 Bieniek, D., 269 Binary relationship, 117, 216 one-to-many, 216 one-to-one, 217, 217–218 Bitmap index, 277 Blaha, M., w15-2, w15-3, w15-5, w15-8, w15-16, w15-17, w15-19, w15-24 Blockbuster Video, 5 Blocking factor, 265 Bluetooth, 29 Bontempo, C. J., 278 Booch, G., w15-4, w15-6, w15-16, w15-19 Bostrom, R. B., 143 Brauer, B., 526 Brobst, S., 270, 271 Bruce, T. A., 108 Buretta, M., w14-8, w14-15, 617 Business function, 42 Business performance management (BPM), 504 Business Process Execution Language for Web Services (BPEL4WS), 450 Business process integration, 534 Business rule(s), 92, 178 action assertion stating, 181–182 types of, 182 classification of, 179–180 gathering, 93–94 good, 93, 94 identifying and testing, 185–186 object-oriented data modeling, w15-24–25, w15-25 paradigm, 92–93 representing and enforcing, 182–183 sample, 183–184, 184, 185 scope of, 93 structural assertion derived facts, 181 stating, 180–181 see also Enhanced entity-relationship (EER) model Business-to-business (B2B) relationships, 25–26 Business-to-customer (B2C) relationships, 25 C Caching, 430 Call-level application program interface, w16-7 Candidate key, 228 Cardinality constraint(s), 120 examples of, 121, 121–122 maximum, 120, 121 minimum, 120, 120 in ternary relationship, 122, 122 Cascading Style Sheets (CSS), 431–432 Catalog, 314 Catterall, R., 285 Celko, J., 597 Centralization, 29 Champlin, B., 54 Changed data capture (CDC), 534 Checkpoint facility, 586 Chen, P. P.-S., 90, 134 Chisholm, M., 492 ChoicePoint, Inc., 557–558 Chouinard, P., 224 Christerson, M., w15-3, w15-4 Class, w15-5 Class diagram, w15-6–7 Class-scope attribute, w15-17 Class-scope operation, w15-8 Clickstream analysis, 29 Client/server architecture, 60, 404–407 Client/server database environment, 401–425 chapter review case description (Mountain View Community Hospital), 424–425 field exercises, 422 further reading, 422 key terms, 420 problems and exercises, 421–422 project assignments, 425 review questions, 421 Web resources, 423 chapter summary, 419–420 client/server architectures, 404–407 data base server architectures, 406, 406–407 file server architectures, 404–405, 404–405 limitations of file servers, 405–406 issues, client/server, 415–417 JDBC, 419 location, 401–402 looking forward with client/server in mind, 419 mainframe, role of, 412–413 middleware, using, 413–415 ODBC, 417–418, 418 partitioning an application, 409–411, 411 three-tier architectures, 407–409, 408 Client/server systems, 403 Client-side extensions, 440–441 Client tier, 60 Coad, P., w15-4 Codd, E. F., 27, 28, 202, 208, 236 Coleman, D., 54 Commit protocol, w14-19, 618 Common Gateway Interface (CGI), 438–439 Common Object Request Broker Architecture (CORBA), 415, 451 Completeness constraint, w15-17, 159 Compliance regulations, 29, 123 Component Object Model (COM), 440–441 Composite attribute, 106, 213 Composite identifier, 108 Composite key, 204 Composition, w15-22 Computer-aided software engineering (CASE), 18, 53, 599 Computer forensics, 29 Conceptual schema, 56, 57 Concrete class, w15-16 Concurrency control, 592 Concurrency transparency, w14-20, 618 Conformed dimension, 488 Constraint, 16 Constructor operation, w15-8 Content-addressable storage, 29 Continental Airlines, 3–4, 466–467 Cookie, 441 Corporate information factory (CIF), 471–472 Correlated subquery, 368 Corresponding object, 181 CPU usage, 603 Cupoli, P., 54 Customer relationship management (CRM), 25 D Dashboards, 504–505, 505 Data, 6–7 accessibility and responsiveness of, 16 consistency, 15 duplication of, 12–13 program-data dependence, 12, 17 quality, 16 redundancy, 14–15 sharing, 13, 15, 21 vs. information, 7, 7–8 Data administration, 559 see also Data/database administration Data administrators, 19, 520 Data archiving, 602 Database(s), 6, 19 Database administration, 560 see also Data/database administration Database administrators, 19, 520, 564 Database application(s), 12, 20–26 case example (Mountain View Community Hospital), 35–37, 36 departmental/divisional, 23 development of, vs. file applications, 15 enterprise, 23–25, 24 personal, 20–21, 21 summary of, 26, 26 Web-enabled, 25–26 workgroup, 21–23, 22 Database approach, 13–14 advantages of, 14, 14–17 accessibility and responsiveness of data, improved, 16 application development, increased productivity of, 15 cautions about, 17 consistency of data, improved, 15 data redundancy, planned, 14–15 decision support, improved, 17 failure to achieve, 17 program-data independence, 14 program maintenance, reduced, 16–17 quality of data, improved, 16 sharing of data, improved, 15 standards, enforcement of, 15–16 costs and risks of, 17–18 backup and recovery, need for explicit, 18 conversion costs, 18 installation and management cost and complexity, 17–18 new, specialized personnel, 17 organizational conflict, 18 Database change log, 585 Database destruction, 591 Database development process, 38–86 alternative information systems development approaches, 49–51, 50 Case and a repository, role of, 53 chapter review case description (Mountain View Community Hospital), 80–86, 81, 82, 83, 84, 85, 86 field exercises, 78 further reading, 79 key terms, 75 problems and exercises, 76–78 review questions, 75–76 Web resources, 79 chapter summary, 74–75 information engineering, 41 information systems architecture (ISA), 40–41 packaged data models, role of, 51–52 industry-specific data models, 52 summary of, 52–53 universal data models, 52 people involved in, managing, 54–55 three-tiered database location architecture, 59–61, 60 see also Information systems planning; Logical database design; Pine Valley Furniture Company; Systems development life cycle (SDLC); Three-schema architecture Database-enabled services, 429 Database environment, 3–37 alerts embedded in, 5 chapter review case description (Mountain View Community Hospital), 35–37, 36 field exercises, 33 further reading, 34 key terms, 30 problems and questions, 31–33, 33 project assignments, 37 review questions, 30–31 Web resources, 34 chapter summary, 29–30 components of, 18–20, 19 design of, 402 fully distributed vs. centralized, 29 growth in, number and importance of, 5 self-healing, 29 Database management system (DBMS), 9, 441 development and evolution of, 27, 27–29 distributed, w12-15–25, 617–618 installation of, 601–602 MySQL, 442 object-relational, 29 operational environment of, 18, 19, 20 self-tuning, 29 technologies, evolution of, 27, 27–29 1960s, 27–28 1970s, 28 1980s, 28 1990s, 28 2000 and beyond, 28–29 objectives, 27 see also Distributed database(s) Database recovery, 584 Database security, 569 Database server, 406 architecture of, 406 Data Base Task Group, 28 Data control language (DCL), 315 Data/database administration, 556–614 availability of data, 604–606 downtime, cost of, 604–605, 604–605 ensuring, 605–606 backup, 584–586 chapter review case description (Mountain View Community Hospital), 614 field exercises, 612 further reading, 613 key terms, 607 problems and exercises, 609–612 project assignments, 614 review questions, 607–608 Web resources, 613 chapter summary, 606–607 concurrent access, controlling, 592–598 locking mechanisms, 593–597, 594, 595, 596 lost updates, 592, 593 serializable, 593 versioning, 597–598, 598 data administration, 559 approaches to, evolving, 563–565 traditional, core roles of, 559–560, 562 database administration, 560 traditional, core roles of, 560–561, 562 data dictionaries, 598–599 modeling enterprise data, 567–568 open-source movement, 565–567 repositories, 599–601 tuning the database for performance, 601–604 application tuning, 603–604 CPU usage, 603 DBMS installation, 601–602 input/output (I/O) contention, 602 memory and storage space usage, 602 see also Data security, managing; Recovery and restart procedures Data/database administrators, 19 roles of, 558–565 Data definition language (DDL), 314–315 Data dictionary, 598–599 Data federation, 534 Data governance, 530 Data independence, 14, 28 Data Insight XI, 549 Data integration, 533–537 approaches to, 533–535 comparison of, 535 data federation, 534 data propagation, 534 for data warehousing, reconciled data layer, 537–544 (see also Extract-Transform-Load (ETL) process) master data management, 535–537 see also Data quality Data manipulation language (DML), 315 Data mart, 469 Data mining, 505 algorithms, 29 applications, 506, 506–507 goals of, 505 techniques, 505, 506 Data model, 9 Data quality, 522–555 chapter review case description (Mountain View Community Hospital), 554–555 field exercises, 552 further resources, 553 key terms, 550 problems and exercises, 551 review questions, 550 Web resources, 553 chapter summary, 549–550 characteristics of, 524–525 data integration, 533–537 data reconciliation, 537–544 data transformation, 544–549 improvements in, 527–532, 528 managing, 524–533 importance of, 524 state of, 526, 526–527 Data Quality (cleansing tool), 549 Data reconciliation, 537–544 tools to support, 546–549 cleansing, 549 conversion, 549 quality tools, 547, 549 selecting, 549 Data scrubbing, 542 Data security, managing, 568–583 authentication schemes, 580–582 mediated authentication, 582 passwords, 580–581 strong authentication, 581–582 authorization rules, 577, 577–578, 578 challenges of, 29 client/server security, establishing, 570–571 client/server security, Web-enabled databases, 571–574, 572 Web privacy, 573–574 Web security, 572–573 concurrent access, controlling, 592–598 encryption, 579, 579–580 enforcement of, 20 integrity control, 575–577 policies and procedures, 582–583 software data security features, 574 threats, 569–570, 570 user-defined procedures, 578–579 views, 574–575 Data steward, 530 Data storage content-addressable, 29 location for, 401–402 Data transformation, 544, 544–549 functions, 545–546 complex, 546, 548 field-level, 546, 547 record-level, 545–546 Data type, 261 Data visualization, 503, 503–504, 504 Data warehouse administrator (DWA), 564–565 Data warehouse/warehousing, 24, 24, 459–518, 462 architectures, 467–476 dependent data mart, 470–472, 471 independent data mart, 468, 468–470 logical data mart, 472–474, 473 real-time data warehouse, 472–474, 473 three-layer, 475, 475–476 chapter review case description (Mountain View Community Hospital), 516–518 field exercises, 514 further reading, 515 key terms, 508 problems and exercises, 509–514 review questions, 508–509 Web resources, 515 chapter summary, 507–508 characteristics of data in, 476–480 other data warehouse changes, 479–480 status vs. event, 476–477, 477 transient vs. periodic, 477–479, 478 concepts of, basic, 462–467 Continental Airlines data warehousing project, 3–4, 466–467 conversion costs, 18 data reconciliation, 537–544 definition of data warehouse, key terms in, 462 derived data layer, 480–497 characteristics of, 480–481 (see also Star schema) enterprise, 476 government or nonprofit organizations, 476 history of, 463 integration, 476 metadata management, 476 need for, 463–467 company-wide view, 463–465 operational and informational systems, separate, 465–466, 466 success in data warehousing, 466–467 scrubbing of data, 16 user interface, 498–507 business performance management, 504 dashboards, 504–505, 505 data-mining tools, 505–507, 506 data visualization, 503–504, 504 metadata, role of, 498 OLAP tools, 500–503, 503 SQL OLAP querying, 498–500 vs. data mart, 472, 473 The Data Warehousing Institute (TDWI), 16 Date, C. J., w14-5, w14-20, w14-21, w14-22, 208, 616 DBMS. See Database management system (DBMS) Deadlock, 595, 596, 596 Deadlock prevention, 596 Deadlock resolution, 597 Decentralized database, w14-2 Decision support applications, 17 Declarative mapping schema, w16-8 Degree, 114 DeLoach, A., 294 Denormalization, 266 Departmental/divisional databases, 23 Departments, 23 Dependent data mart, 470, 470–472, 471 operational data store architecture, 470–472, 471 Derivation, 179 Derived attribute, 107 Derived data, 475 Derived fact, 181 Descollonges, M., 595 Determinant, 228 Development technologies, 441 Devlin, B., 463, 542, 546 Directory services, 428 Disaster recovery, 29 Discussion groups, 430 Disjointness constraint, w15-17, 159–160 Disjoint rule, 160 Disk mirroring, 586 Distributed database(s), w14-1–32, w14-2, 615–619, 616 chapter review field exercises, w14-31 further reading, w14-32, 619 key terms, w14-27 problems and exercises, w14-28–31 review questions, w14-28 Web resources, w14-32, 619 chapter summary, w14-25–27 distributed DBMS, w12-15–25, w14-15–25, w14-16, 617–618 commit protocol, w14-19–20 concurrency transparency, w14-20–21 evolution of, w14-23–25 distributed request, w14-25 distributed unit of work, w14-24–25 remote unit of work, w14-24 failure transparency, w14-18–19 location transparency, w14-17–18 query optimization, w14-21–23, w14-22, w14-23 replication transparency, w14-18 distributed DBMS products, w14-25, w14-26 environments distributed, w14-3 heterogeneous, w14-3, w14-5 homogeneous, w14-3, w14-4, w14-4 objectives and trade-offs, w14-5–6, 616 options for, w12-7–14, w14-7–14, 616–617 combinations of, w14-11–13, w14-12–13 data replication, w14-7, w14-7–10 database integrity with replication, w14-9–10 near real-time replication, w14-9 pull replication, w14-9 snapshot replication, w14-8–9 when to use replication, w14-10 horizontal partitioning, w14-10–11, w14-11 selecting, w14-13–14, w14-14 vertical partitioning, w14-11 query optimization, 618 Divisions, 23 Document search, 430 Document Structure Description (DSD), 434 Document type declarations (DTDs), 433–434 Domain name server (DNS) balancing, 439 Dowgiallo, E., 565 Drill-down, 502, 502 Dubois, L., 526 Dutka, A. F., 228 Dyché, J., 500, 506, 530, 536 Dynamic link libraries (DLLs), 439 Dynamic SQL, 389 Dynamic view, 342 E Eckerson, W., 526, 538, 541, 549 E-commerce, 427 application partitioning, 410 computer technology trends, 286 Internet's affect on, 411 n-tier architectures, 411 XML, 431, 433, 435 Eddy, F., w15-2, w15-3, w15-5, w15-8, w15-16, w15-17, w15-19, w15-24 Edelstein, H., w14-8, w14-9 Eisenberg, A., 381 Electronic business. See E-commerce Electronic data interchange (EDI), 25–26, 443 Electronic discovery and evidence, 29 Electronic mail, 430 Elmasri, R., w14-15, w14-22, 112, 159, 164, 238, 617, 618 Embedded SQL, 389 Encapsulation, w15-7 Encryption, 579, 579, 579–580 End-user computing, 19–20 End users, 19 English, L. P., 526, 531, 540 Enhanced entity-relationship (EER) model, 151 chapter review case description (Mountain View Community Hospital), 196–198 field exercises, 194 further reading, 195 key terms, 187 problems and exercises, 188–193 project assignments, 198 review questions, 187–188 Web resources, 195 chapter summary, 186–187 entity clustering, 169–172 modeling example (Pine Valley Furniture), 165–169, 166, 168 packaged data models, 172–178 supertypes and subtypes constraints in, specifying, 159–165 representing, 152–159 transforming into relations, 212–226 Step 1: map regular entities, 212–214, 213, 214 Step 2: map weak entities, 214, 214–216 Step 3: map binary relationships, 216, 216–218, 217 Step 4: map associative entities, 218, 218–221, 219, 220, 221 Step 5: map unary relationships, 221–222, 222 Step 6: map ternary (and n-ary) relationships, 222–224, 223 Step 7: map supertype/subtype relationships, 224–225, 224–225 summary of, 225, 225–226 see also Business rule(s) Enterprise application integration (EAI), 534 Enterprise databases, 23–25, 24 Enterprise data model, 9, 10, 14, 57 role of, in three-layer data architecture, 475–476 Enterprise data modeling, 40 Enterprise data replication (EDR), 534 Enterprise data warehouse (EDW), 470, 470–471 Enterprise key, 239 Enterprise resource planning (ERP), 23, 24 operational data store, 471 Enterprise server (minicomputer or mainframe) tier, 60 Entity class, w16-18 Entity cluster, 169 Entity/entities, 9, 10, 100 Entity instance, 101 Entity integrity rule, 208 Entity-relationship diagram (E-R diagram), 43, 63, 97 notations used in, 99–100, 100 sample of, 97–99, 98 Entity-relationship model (E-R model), 97 case example of (Pine Valley Furniture Company), 128–131, 129 model notation, 99–100, 100 sample diagram, 97–99, 98 see also Entity/entities Entity type(s), 101 associative, 112–114, 113 attributes represented by, 118–120, 119 naming and defining, 103–104 relationships between, 9–10 strong vs. weak, 102–103, 103 vs. instance, 101, 101 vs. system input, output, or user, 101–102, 102 see also Attribute(s) Equi-join, 358, 358–360, 360 Evans, M., 90, 118 Exclusive lock (X lock or write lock), 595 Exploration warehouse, 472 eXtensible Business Reporting Language (XBRL), 433 Extent, 272 External schema, 55 Extract-Transform-Load (ETL) process, 462, 468, 537 cleanse, 540–543 data after, characteristics of, 537–538 extract, 539–540 load and index, 543–544 mapping and metadata management, 539 process of, 538, 539 Extranets, 26 F Fact, 95–96 Failure transparency, w14-19, 618 Fat client, 405 FBI, 4 Fernandez, E. B., 577 Fetching strategy, w16-21 Field, 261 File, 11–12 File organization, 273–274 File processing systems, 11 case example of (Pine Valley Furniture Company), 11–12, 12 disadvantages of, 12, 12–13 development times, lengthy, 13 duplication of data, 12–13 program-data dependence, 12 program maintenance, excessive, 13 File server, 405 File Transfer Protocol (FTP), 430, 441 Finkelstein, R., 266 Firewall, 26 Firewalls, 430 First normal form (1NF), 231 Fitchwood Insurance Company, 511–514, 512–513 Fleming, C. C., 203 FLWOR expression, 437 Foreign key, 204 Form, 72 Fortune magazine Most Admired Global Companies, 4 Forward recovery (rollforward), 589–590 Fosdick, H., 565 Fowler, M., w15-8, w15-9, w15–21, w15-22, w15-24, 51 Froemming, G., w14-9, w14-10 Fry, J. P., 90 Frye, C., 186 Function, 386 Functional decomposition, 42 Functional dependency, 228 G Gant, S., 270, 271 Garbage-in, garbage-out (GIGO), 526 Gehtland, J., w16-7, 631 Generalization, 156 George, J. F., w15-5, 44, 45, 54, 91, 529 Global transaction, w14-16 Gottesdiener, E., 92, 94, 194 Grain, 485 Gramm-Leach-Bliley, 558 Gray, J., 28 Grid computing, 29 Grimes, S., 28 Grimson, J., w14-3, w14-4, w14-5 Groth, R., 408, 409 GUIDE Business Rules Project, 92, 95, 179, 194 Gulutzan, P., 373, 387 H Hackathorn, R., 462, 463, 474 Hall, M., 566 Hanson, H. H., 228 Hashed file organization, 279 Hash index table, 280 Hashing algorithm, 279 Hay, D. C., 52, 90, 172, 175, 532 Hays, C., 460 Health Insurance Portability and Accountability Act (HIPAA), 29, 35, 123, 554, 558 Heartbeat query, 603 Henderson, D., 54 Henschen, D., 433 Hoberman, S., 173, 267 Hoffer, J. A., 4, 5, w15-5, 44, 45, 54, 91, 143, 265, 529 Holmes, J., 294 Homeland Security, 4 Homonym, 237–238 Horizontal partitioning, 269 Howarth, L., 54 “Hub and spoke” approach, 471 Hudica, J., 16 Hurwitz, J., 412, 413 Hypertext Markup Language (HTML), 430–432 I Identifier, 107–108 Identifying owner, 102 Identifying relationship, 103 Imhoff, C., 471, 535, 564 Incomplete constraint, w15-17 Inconsistent read problem, 592 Incremental commitment, 55 Incremental extract, 540 Independent data mart, 468, 468–470, 469 data warehousing environment, 468, 468–470 limitations of, 470 Index, 274 Indexed file organization, 274 Informatica, 524, 528 Information, 7 vs. data, 7, 7–8 Informational processing, 461 Informational system, 466 Information engineering, 41 Information repository, 599 Information Repository Dictionary System (IRDS), 599 Information services, television-like, 29 Information Systems Architecture (ISA), 40–41, 568 Information systems planning, 41, 41 corporate planning objects, identifying, 42 enterprise model, developing, 42–44, 43, 44, 45 strategic planning factors, identifying, 41–42, 42 Inmon, B., 470, 511 Inmon, W. H., 52, 59, 266, 462, 463, 471, 472, 485, 529, 564 Input/output (I/O) contention, 602 Internal schema, 56 Internet e-commerce, affect on, 411 PDAs connecting to, 29 related languages, 430–433 universal servers, 29 Web-enabled databases, 25–26 Internet database environment, 426–458 chapter review case description (Mountain View Community Hospital), 457–458 field exercises, 455 further reading, 455–456 key terms, 453 problems and exercises, 454–455 project assignments, 458 review questions, 453–454 Web resources, 456 chapter summary, 452–453 Internet architecture components, common, 430–441 client-side extensions, 440–441 related languages, 430–433 server-side extensions, 437–438, 438 Web server interfaces, 438–439 Web servers, 439–440 XML and XQuery overview, 433–437 Internet/database connection, 427–428 Internet environment, 428–430, 429 Web-to-database tools, 441–452 development environment, 442 Internet technology rate-of-change issues, 451–452 open source components, 442 Semantic Web, 451 service-oriented architecture, 451 Web services, 443–450 Intranet, 26 services provided by, 429–430 Iowa Department of Revenue, 467 ISO/IEC, 94, 96 J Jacobson, I., w15-3, w15-4 Java Database Connectivity (JDBC), 419 JavaScript, 431 Java servlet, 439 Java Virtual Machines (JVMs), 431 Jenkins, A. M., 50 Johnston, T., 239 Join, 358 Join index, 278 Joining, 545 Jonsson, P., w15-3, w15-4 Jordan, A., 16 Journalizing facilities, 585 K Kellner, Larry, 4 Keuffel, W., 415 Kimball, R., 52, 470, 481, 484, 485, 488, 492, 494, 495, 496, 510, 511, 538 King, G., w16-3, w16-17, w16-18, w16-22 Klimchenko, V., 524 Koop, P., w14-7 Krudop, M. E., 538 Kulkarni, K., 381 L Langer, A., 565 Larson, J., 238 LaRue, M., 415 Laurent, W., 529 Lefkovitz, H. C., 599 Legacy system, 5, 18 Legislative requirements, 29, 123 Leon, M., 530 Levy, E., 536 Liberty Alliance, 450 Linthicum, D. S., 415 Lirov, Y., 565 Load balancing, 430 Local autonomy, w14-5, 616 Local transaction, w14-16 Location transparency, w14-5, 616 Locking, 593 Locking level (lock granularity), 594–595 Logical database design, 201–256 chapter review case description (Mountain View Community Hospital), 252–255 field exercises, 250 further reading, 251 key terms, 242 problems and exercises, 243–250 project assignments, 255, 256 review questions, 242–243 Web resources, 251 chapter summary, 240–242 integrity constraints, 207–212 action assertions, 209–210 domain, 207, 208 entity integrity, 208 referential integrity, 208–209, 209 relational tables, creating, 210, 210–211 well-structured relations, 211, 212 merging relations, 236–238 relational data model, 202–207 relational keys, defining, 239–240, 240 SDLC, 48–49 see also Enhanced entity-relationship (EER) model; Normalization Logical data mart, 472, 472–474, 473 Logical schema, 57–58 Long, D., 15, 26 Lorensen, W., w15-2, w15-3, w15-5, w15-8, w15-16, w15-17, w15-19, w15-24 Loshin, D., 523, 524 Lyle, B., 381 M Manufacturing resources planning (MRP-II), 24 Many-to-many (M:N) relationship, 9 Many-to-many relationships, 532, 532 Marco, D., 470, 476 Master data management (MDM), 535–536, 535–537 Materialized view, 342 Materials requirements planning (MRP), 24 Maximum cardinality, 121 McGovern, D., w14-20 Mediated authentication, 582 Melton, J., 381 Memory and storage space usage, 602 Metadata, 8, 8 ETL process, 539 role of in three-layer data architecture, 476 in user interface, 498 Method, w15-19 Meyer, A., 470 Meyer, S., 549 Michaelson, J., 566 Michels, J. E., 381 Microsoft Internet Explorer, 431 Middleware, 413, 413–415 server-side extensions, 437–438, 438 Minimum cardinality, 120 Modeling data in the organization, 89–91 case example of (Pine Valley Furniture Company), 128, 129, 133, 134 chapter review case description (Mountain View Community Hospital), 148–149 field exercises, 146 further reading, 147 key terms, 135 problems and exercises, 137, 137–146, 140, 141–142 project assignments, 149 review questions, 136 Web resources, 147 chapter summary, 134–135 data definitions, 95–97 data names, 94–95 rules, 91–94 time-dependent data, 123, 123–125, 124 see also Attribute(s); Business rule(s); Entity-relationship model (E-R model); Entity type(s) Moriarty, T., 53, 93, 185, 529 Morrow, J. T., 558, 569, 605 Mullins, C. S., 9, 384, 558, 560, 564, 591, 604, 605 Multidimensional data, 28 Multidimensional OLAP (MOLAP), 501 Multifield transformation, 546, 548 Multimedia data, 6 Multiple classification, w15-21 Multiplicity, w15-9 Multivalued attribute, 107, 213–214 Mundy, J., 498 Murphy, P., 463 Musciano, C., 286 MySQL, 442 N NationsBank, 467 Natural join, 360, 360–361 Naumann, J. D., 50 Navathe, S. B., w14-15, w14-22, 112, 159, 164, 238, 617, 618 Neward, T., w16-3 Newcomer, E., 445, 447, 449 News groups, 430 Nike, 522–523 Normal form, 227 Normalization, 226, 226–230 example (Pine Valley Furniture Company), 230–236 functional dependencies and keys, 228–230, 229 candidate keys, 228–230 determinants, 228 steps in, 227, 227–228 N+1 selects problem, w16-21 Null, 208 O OAG Airline of the Year awards, 4 OASIS, 448, 450 Object, w15-5 Object diagram, w15-7 Object identity, w16-5 Object Linking and Embedding (OLE), 440 Object-oriented data modeling, w15-1–41, 620–628, 623–627 aggregation, representing, w15-21–24, w15-22, w15-23, w15-24, 627, 627 associations, representing, w15-8–11, w15-9, w15-11 associations classes, representing, w15-11, w15-11–13, w15-13, w15-14 business rules, w15-24–25, w15-25 chapter review field exercises, w15-40–41 further reading, w15-41, 628 key terms, w15-29 problems and exercises, w15-33–40 review questions, w15-29–32 Web resources, w15-41, 628 chapter summary, w15-28–29 derived attributes, associations, and roles, representing, w15-13–14 example of (Pine Valley Furniture Company), w15-26–28, w15-27 generalization, representing, w15-14–19, w15-15, w15-18 inheritance multiple, representing, w15-21, w15-21 overriding, interpreting, w15-19–20, w15-20 objects and classes, representing, w15-5–7, w15-6 operations, types of, w15-8 systems development cycle, w15-2 Unified Modeling Language, w15-1–41, w15-4–5, 621 Object-relational mapping (ORM), w16-3 Object-relational mismatch, w16-3 OMA, 431 One-to-many (1:M) relationship, 9 Online analytical processing (OLAP), 391, 500 SQL OLAP querying, 498–500 tools, 500–503, 503 drill-down, 502, 502 slicing a cube, 501, 501 summarizing more than three dimensions, 503 Online transaction processing (OLTP), 391 Open database connectivity (ODBC) standard, 417, 417–418, 418 Open-Source DBMS, 566 Operation, w15-7 Operational data store (ODS), 471 Operational processing, 461 Operational system, 465 Optional attribute, 105 Organizational conflict, 18 Outer join, 361, 361–362 Overgaard, G., w15-3, w15-4 Overlapping constraint, w15-17, w15-18 Overlap rule, 161–162 Overriding, w15-19 Owen, J., 93 Owner, 102 Özsu, M. T., w14-22 P Page, 265 Park, E. K., 90, 118 Partial functional dependency, 233 Partial specialization rule, 159 Pascal, F., 266–267 Pelzer, T., 373, 387 Periodic data, 477, 477–479, 478 Persistence, w16-3 Persistent Stored Modules (SQL/PSM), 383 Personal computers (PCs), 20 Personal databases, 20–21, 21 Personal digital assistant (PDA), 20, 29, 452, 564 Petabyte, 6 PHP, 442–443, 444–446 Physical database design and performance, 257–306 chapter review case description (Mountain View Community Hospital), 304–306 field exercises, 302 further reading, 303 key terms, 297 problems and exercises, 298–302 project assignments, 306 review questions, 298 Web resources, 303 chapter summary, 296–297 denormalization, 266–272 designing, 288–290 fields, 261–265 indexes, using and selecting, 283–285 physical files, 272–283 physical records, 265 process of, 258–261 query performance, optimizing for, 291–296 RAID, 285–288 SDLC, 49 Physical file, 272 Physical record, 265 Physical schema, 58 Pierce, E. M., 526 Pine Valley Furniture Company, 11–12, 12 database application development at, 61, 62 administering the database, 74 database requirements, analyzing, 68, 68–69, 69, 70 designing the database, 69–71, 70–71, 72, 73 matching user needs to information systems architecture, 66–68, 67, 68 project request, 65–66 simplified project data model example, 62–65, 63, 64 using the database, 71–73, 73 Plotkin, D., 94 Plug-ins, 440 Poe, V., 488 Pointer, 273 Polymorphism, w15-19 Pooling of database connections, w16-17 Premerlani, W., w15-2, w15-3, w15-5, w15-8, w15-16, w15-17, w15-19, w15-24 Primary key, 203 Procedure, 386 Program-data dependence, 12, 17 Program maintenance, 16–17 Programming languages, 441 Project, 54 Project data models, 9, 10 Proof-of-concept period, 28 Prototyping, 50 Proxy servers, 430 Q Query, 72 Query operation, w15-8 Quinlan, T., 407, 563, 565 R Real-time data warehouse, 472, 472–474, 473 Reconciled data, 475 Record-at-a-time procedures, 28 Recovery and restart procedures, 586–590 backward recovery, 588–589 basic recovery facilities, 584–586 disaster recovery, 591–592 disk mirroring, 586 failures, 590, 590–592 forward recovery, 589–590 restore/rerun, 586–587 transaction integrity, maintaining, 587–588 Recovery manager, 586 Recursive foreign key, 221 Redman, T., 524 Redundant Array of Inexpensive Disks (RAID), 286 Referential integrity, 322 Referential integrity constraint, 208–209 Refresh mode, 543 Relation, 11, 203 Relational databases, 11, 16, 17, 27, 28 Relational databases, object persistence, w16-1–29, 629–639 approaches to, selecting, w16-8–10 call-level APIs, w16-8, w16-9 ORM frameworks, w16-10 SQL query mapping frameworks, w16-9, w16-9–10 call-level application program interfaces, 631 chapter review field exercises, w16-28 further reading, w16-29, 639 key terms, w16-27 problems and exercises, w16-28 review questions, w16-27 Web resources, w16-29, 639 chapter summary, w16-25–26, 637–638 object-relational mapping frameworks, w16-17–21, 631–632 advantages and disadvantages of, w16-9 aggregation and composition, w16-20 class, w16-17–18, w16-18 examples of, 633–634, 633–634 mapping files, w16-13–16, 634–636 using hibernate, w16-11–13, w16-11–17 HQL, w16-22–25 inheritance/superclass-subclass, w16-18, w16-19 many-to-many associations, w16-20, w16-21 many-to-one and one-to-many associations, w16-20, w16-20 one-to-one association, w16-18–19, w16-19 responsibilities of, w16-21, w16-21–25, 636–637 object-relational mismatch, w16-3–7, w16-4, w16-6 persistence for objects using, providing, w16-7–10, 631–632 call-level application program interface, w16-7, 631 object-relational mapping frameworks, w16-8, 631–632, 633–634 proprietary approaches, 632 proprietary approaches, w16-8, 632, 632–633 SQL query mapping frameworks, w16-7, w16-9–10, 631 SQL query mapping frameworks, w16-9, 631 Relational data model, 202–207 database example, 205–207, 206, 207 definitions, basic, 203 multivalued attributes, removing from tables, 204–205, 205 properties of relations, 204 relational data structure, 203, 203 relational keys, 203–204 see also Logical database design Relational DBMS (RDBMS), 312 Relational OLAP (ROLAP), 500–501 Relationship instance, 110–112, 111, 112 Relationships associative entities on, 112–114, 113 attributes on, 112, 112 binary, 116, 117 degree of, 114, 115 multiple, 125–127, 126 naming and defining, 127–128 ternary, 116, 117, 117 types and instances, distinguishing between, 110–111, 111 unary, 114–117, 115, 116 Relationships between entities, 9–10 Relationship type, 110–112, 111, 111–112 RELAX NG, 434 Rennhackkamp, M., 385 Replication transparency, w14-18, 618 Report, 72 Repository, 14, 16, 18, 599–601, 600 Required attribute, 105 Resource Description Framework (RDF), 451 Restore/rerun, 586 Return on investment (ROI), 531 Reverse proxy, 440 Richardson, C., w16-3, w16-8, 631 Riggs, S., 29 Ritter, D., 18 Rodgers, U., 267, 594 Ross, M., 52 Ross, R. G., 183, 184 Royal Bank of Canada, 467 Rumbaugh, J., w15-2, w15-3, w15-4, w15-5, w15-8, w15-16, w15-17, w15-19, w15-24 Russom, P., 524, 526, 527, 530 S Salin, T., 94, 95 Saracco, C. M., 278 Sarbanes-Oxley Act (SOX), 29, 123, 200, 263, 524, 529, 533, 536, 558, 569 Scalar aggregate, 340 Schema, 314 see also Three-schema architecture Schumacher, R., 277, 285, 291, 292 Scrub, 16 Secondary key, 274 Second normal form (2NF), 233 Security administrators' role in, 20 wireless technology, 29 Security Assertion Markup Language (SAML), 450 Security services, 428 Seiner, R., 530 Selection, 545 Self-healing databases and operating systems, 29 Semantic Web, 451 Semijoin, w14-22, 618 Separation of concerns, w16-9 September 11, 2001 terrorist attacks, 4 Sequential file organization, 274 Serializable, 593 Serialization, w16-3 Server-side extension, 437–438, 438 Service-oriented architecture (SOA), 451 Shah, R., 288 Shared lock (S lock or read lock), 595 Silverston, L., 52, 172, 175, 177 Simple (or atomic) attribute, 106 Simple Object Access Protocol (SOAP), 448, 448–450, 449 Single-field transformation, 546, 547 Smart card, 581, 582 Snowflake schema, 492–493 Software, 17–18 user interface, 19 Software and hardware load balancing, 439–440 Song, I.-Y., 90, 118 Sousa, R., 564 Sowa, J. F., 40 Specialization, 157 Standard Generalized Markup Language (SGML), 430–431 Standards, 15–16, 28 Star schema, 481 dimension tables, 481–482, 482 determining, 496–497, 497 hierarchies, 491, 491–493, 493 multivalued, 490, 490–491 normalizing, 490 slowly changing, 493–496, 495 example of, 482–484, 483, 484 fact tables, 481–482, 482, 486–487 date and time, modeling, 487, 487 determining, 496–497, 497 duration of, 486 factless, 489, 489–490 grain of fact, 485 multiple, 488, 488–489 size of, 486–487 surrogate key, 484–485 State, w15-6 Static extract, 540 Storage. See Data storage Stored procedure, 407 Storey, V. C., 90 Stripe, 286 Strong authentication, 581–582 Strong entity type, 102 Structural assertion, 179 Structured data, 6–7 Structured Product Labeling (SPL), 433 Structured Query Language (SQL), advanced, 356–400 chapter review case description (Mountain View Community Hospital), 400 field exercises, 399 further reading, 399 key terms, 394 problems and exercises, 395–398 project assignments, 400 review questions, 394 Web resources, 399 chapter summary, 393 data dictionary facilities, 378–379 embedded and dynamic, 388–390 OLAP, 391–393 querying, 498–500 routines, 386–388, 387 SQL:200n enhancements and extensions, 380–384 analytical functions, 380, 380–381 new data types, 381 other enhancements, 382 programming extensions, 382–384 tables, processing multiple, 357, 357–376 combining queries, 369–372, 370–372 complicated queries, 373–374 conditional expressions, 372–373, 373 correlated subqueries, 368–369 derived tables, using, 369 developing queries, tips for, 375–376 equi-join, 358–360, 360 natural join, 360–361 outer join, 361–362 sample multiple join involving four tables, 363, 363–364 subqueries, 364, 364–368, 367 union join, 362–363 transaction integrity, ensuring, 376–378, 377 triggers, 384, 384–386, 385 Structured Query Language (SQL), introduction to, 309–355 chapter review case description (Mountain View Community Hospital), 355 field exercises, 353 further reading, 354 key terms, 347 problems and exercises, 349–353 project assignments, 355 review questions, 347–348 Web resources, 354 chapter summary, 347 data and time values, handling, 310 defining a database in, 318–324 data integrity controls, creating, 322–323, 323 removing tables, 324 SQL database definitions, generating, 318–319 table definitions, changing, 323–324 tables, creating, 319–322, 320, 321 environment of, 313–318, 314–318 history of, 311–312 inserting, updating, and deleting data in, 324–327 internal schema definition in RBDMSs, 327–328 OLAP querying, 498–500 role of, in database architecture, 312–313 single tables in, processing, 328–346 Boolean operators, using, 333–336, 335, 336 categorizing results: the GROUP clause, 340–341 comparison operators, using, 333, 333 distinct values, using, 337–338 expressions, using, 331 functions, using, 331–332 In and NOT IN with lists, using, 339 qualifying results by categories: the HAVING clause, 341–342 ranges for qualifications, using, 336–337 SELECT statement, clauses of, 329–330 sorting results; the ORDER by clause, 339–340 views, using and defining, 342–346, 343 wildcards, using, 332–333 tools, 500–503 drill-down, 502, 502 slicing a cube, 501, 501 summarizing more than three dimensions, 503 Subtype, 152 Subtype discriminator, 162 Summers, R. C., 577 Sun Microsystems, 431 Supertype, 152 Supertype/subtype hierarchy, 164 constraints in, specifying, 159–165 mapping, 224–225, 224–225 merging relations, 238 representing, 152–159 Surrogate primary key, 215, 215–216 Synchronous distributed database, w14-5 Synonyms, 237 System catalog, 598 System developers, 19 System of record, 8 Systems development life cycle (SDLC), 45–46 Systems development life cycle (SDLC), 45–49 analysis-conceptual data modeling, 48 design-logical database design, 48–49 implementation-database implementation, 49 maintenance-database maintenance, 49 planning-conceptual data modeling, 47–48 planning-enterprise modeling, 47–48 T Tablespace, 272 Tate, B., w16-7, 631 TDWI, 466 Television-like information services, 29 Teorey, T. J., 90, 169 Terabyte, 6 Term, 95 Ternary relationship, 117 in cardinality constraints, 122, 122 mapping, 222–224, 223 Text editor, 441 Thé, L., w14-8 Thin client, 409 Third normal form (3NF), 234 Thompson, C., w14-25, 409 Thompson, F., 270, 271 Three-factor authentication, 581 Three-schema architecture, 55 components of, 55–56, 56 conceptual schema, 57 development of, strategies for, 58, 58–59 enterprise data model, 57 logical schema, 57–58 physical schema, 58 user views, 57 Three-tier architecture, 407, 407–409, 408 Three-tiered database location architecture, 59–61, 60 Time stamp, 123 Time-stamping, w14-20 Top-down planning, 41 Total Quality Management (TQM), 531 Total specialization rule, 159 Toyota Motor Sales USA, 467 Transaction, 585 Transaction boundaries, 588 Transaction log, 585, 585 Transaction manager, w14-19 Transaction processing, 461 Transient data, 477, 477–479, 478 Transitive dependency, 234, 238 Transparent persistence, w16-8 Trigger, 384 Trillium, 549 Two-factor authentication, 581 Two-phase commit, w14-19, 618 Two-phase locking protocol, 596 U Ullman, L., 443, 446 UML Notation Guide, w15-8, w15-11, w15-21, w15-25 UML Superstructure Specification, w15-17 Unary relationship, 114 mapping, 221, 221, 222 many-to-many, 221–222 one-to-many, 221 Unified Modeling Language (UML), w15-4–5 object-oriented data modeling, w15-1–41, w15-4–5, 621 Uniform Resource Identifier (URI), 451 Uniform Resource Locators (URLs), 451, 573 Union join, 362–363 Universal data model, 172–173 Universal Description, Discovery, and Integration (UDDI), 446–447 UDDI Business Registry, 448, 450 UDDI Project, 446, 448 Universal servers, 29 Unstructured data Update mode, 543 Update operation, w15-8 User-defined data type (UDT), 380 User-defined procedures, 578 User interaction integration, 534 User interface, 19 User view, 15, 57 V Valacich, J. S., w15-5, 44, 45, 54, 91, 529 Valduriez, P., w14-22 Value type, w16-18 Variar, G., 543 VBScript, 431 Vector aggregate, 340 Versioning, 597, 597–598, 598 Vertical partitioning, 271 Viehman, P., 285 Views, 574–575 data security, managing, 574–575 user, three-schema architecture, 57 using and defining, 342–346 Virtual table, 342 Von Halle, B., 92, 203 W Wal-Mart, 460 Watson, H. J., 4, 5 Weak entity type, 102 Web browser, 25, 441 Web-enabled databases, 25–26, 29 Web Ontology Language (OWL), 451 Web server(s), 429, 439–440, 441, 442 interfaces, 438–439 Web services, 443 deployment, 449 order entry system, 447 protocol stack, 447 security, lack of, 450 standards, lack of, 450 Web-to-database tools, 441–443, 442 Web Services Description Language (WSDL), 448 Weldon, J. L., 505 Well-structured relation, 211 Westerman, P., 543 White, C., 533, 535, 538, 540, 549 Whiting, R., 462, 466 Wi-Fi, 29, 452 Winter, R., 6 Wireless technology improved transmission rates, 29 Witkowski, A., 381 Wixom, B., 4, 5 WizRule, 549 Wood, C., 577 Workgroup databases, 21–23, 22 World Wide Web Consortium (W3C), 430 WS-I, 450 W3C, 450 X XHTML, 431 XLink, 433 XML, 431, 433–437 XML Query Working Group, 435 XML Schema, 434 XML Schema Definition (XSD), 433–434 XML Web services, 26, 29 XPath, 432 XPointer, 433 XQuery, 433–437, 435 XSL, 432 XSLT, 432 Y Yang, D., 90 “Year 2000” problem, 16 Young, C., 565 Yugay, I., 524 Yuhanna, N., 293 Z Zachman, J. A., 40, 568 Zemke, F., 381