Semantic interoperation via intelligent mediation

The author proposes an approach to semantic interoperation via intelligent mediation. The key idea is the separation of heterogeneity in the semantics of data from heterogeneity in the representation of data. Instead of a rich multidatabase language, he advocates a language with minimal representational bias. The semantics of heterogeneous data is communicated independent of representation, and is compiled into homogeneous representation schemes. The approach directly addresses the critical issues in the semantic interoperation of heterogeneous data.<<ETX>>

[1]  Xiaolei Qian,et al.  Inference channel-free integrity constraints in multilevel relational databases , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[2]  Timothy W. Finin,et al.  Enabling Technology for Knowledge Sharing , 1991, AI Mag..

[3]  Glenn H. MacEwen,et al.  A logic for reasoning about security , 1992, TOCS.

[4]  Jan Chomicki,et al.  Declarative Definition of Object-Oriented Multidatabase Mappings , 1992, IWDOM.

[5]  Vipul Kashyap,et al.  So Far (Schematically) yet So Near (Semantically) , 1992, DS-5.

[6]  Arnon Rosenthal,et al.  Using semantic values to facilitate interoperability among heterogeneous information systems , 1994, TODS.

[7]  LINDA G. DEMICHIEL,et al.  Resolving Database Incompatibility: An Approach to Performing Relational Operations over Mismatched Domains , 1989, IEEE Trans. Knowl. Data Eng..

[8]  Sushil Jajodia,et al.  Eliminating polyinstantiation securely , 1992, Comput. Secur..

[9]  Sushil Jajodia,et al.  A novel decomposition of multilevel relations into single-level relations , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[10]  Dorothy E. Denning,et al.  The SeaView Security Model , 1990, IEEE Trans. Software Eng..

[11]  Gio Wiederhold,et al.  Views, Objects, and Databases , 1986, Computer.

[12]  Jack Minker,et al.  Logic and Databases: A Deductive Approach , 1984, CSUR.

[13]  Günther Pernul Canonical Security Modeling for Federated Databases , 1992, DS-5.

[14]  Bhavani M. Thuraisingham,et al.  A nonmonotonic typed multilevel logic for multilevel secure data/knowledge base management systems , 1991, Proceedings Computer Security Foundations Workshop IV.

[15]  Sushil Jajodia,et al.  Polyinstantiation integrity in multilevel relations , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[16]  Carl E. Landwehr,et al.  Formal Models for Computer Security , 1981, CSUR.

[17]  Gultekin Özsoyoglu,et al.  Controlling FD and MVD Inferences in Multilevel Relational Database Systems , 1991, IEEE Trans. Knowl. Data Eng..

[18]  Brian W. Beach,et al.  Connecting software components with declarative glue , 1992, International Conference on Software Engineering.

[19]  William Kent Solving Domain Mismatch and Schema Mismatch Problems with an Object-Oriented Database Programming Language , 1991, VLDB.

[20]  Nick Roussopoulos,et al.  Interoperability of multiple autonomous databases , 1990, CSUR.

[21]  Gio Wiederhold,et al.  Mediators in the architecture of future information systems , 1992, Computer.

[22]  Li Gong,et al.  The complexity and composability of secure interoperation , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[23]  Jeffrey D. Ullman,et al.  Principles Of Database And Knowledge-Base Systems , 1979 .

[24]  Dan Thomsen,et al.  The LDV Secure Relational DBMS Model , 1990, DBSec.

[25]  Karen R. Sollins,et al.  Towards Security in an Open Systems Federation , 1992, ESORICS.

[26]  Amit P. Sheth,et al.  Semantic Issues in Multidatabase Systems - Preface by the Special Issue Editor , 1991, SIGMOD Rec..

[27]  Sushil Jajodia,et al.  A new polyinstantiation integrity constraint for multilevel relations , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.

[28]  Ravi S. Sandhu The typed access matrix model , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[29]  Jeffrey D. Ullman,et al.  Protection in operating systems , 1976, CACM.

[30]  Thierry Barsalou,et al.  M(DM): an open framework for interoperation of multimodel multidatabase systems , 1992, [1992] Eighth International Conference on Data Engineering.

[31]  Simon R. Wiseman Control of confidentiality in databases , 1990, Comput. Secur..

[32]  J. Lloyd Foundations of Logic Programming , 1984, Symbolic Computation.

[33]  Mahadev Satyanarayanan,et al.  Integrating security in a large distributed system , 1989, TOCS.

[34]  Ravi Krishnamurthy,et al.  Language features for interoperability of databases with schematic discrepancies , 1991, SIGMOD '91.

[35]  Rae K. Burns Referential secrecy , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[36]  Weimin Du,et al.  Query Optimization in a Heterogeneous DBMS , 1992, VLDB.

[37]  Zohar Manna,et al.  The logical basis for computer programming , 1985 .

[38]  Marianne Winslett,et al.  Entity Modeling in the MLS Relational Model , 1992, VLDB.

[39]  Thierry Barsalou,et al.  On the semantic equivalence of heterogeneous representations in multimodel multidatabase systems , 1991, SGMD.

[40]  Matthew L. Ginsberg,et al.  Knowledge Interchange Format: the KIF of Death , 1991, AI Mag..

[41]  Ronald Fagin,et al.  Horn clauses and database dependencies , 1982, JACM.

[42]  Gary W. Smith,et al.  Modeling security-relevant data semantics , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.

[43]  Michael Kifer,et al.  Querying object-oriented databases , 1992, SIGMOD '92.

[44]  Ronald J. Brachman,et al.  The Future of Knowledge Representation , 1990, AAAI.