Object Identifiers, Keys, and Surrogates: Object Identifiers Revisited
- 1 January 1995
- journal article
- research article
- Published by Wiley in Theory and Practice of Object Systems
- Vol. 1 (2) , 101-114
- https://doi.org/10.1002/j.1096-9942.1995.tb00011.x
Abstract
Sound naming schemes for objects are crucial in many parts of computer science, such as database modeling, database implementation, distributed and federated databases, and networked and distributed operating systems. Over the past 20 years, physical pointers, keys, surrogates and object identifiers have been used as naming schemes in database systems and elsewhere. However, there are some persistent confusions about the nature, applicability and limits of these schemes. In this article we give a detailed comparison of three naming schemes, viz. object identifiers, internal identifiers (often called surrogates) and keys. We discuss several ways in which identification schemes can be implemented, and show what the theoretical and practical limits of applicability of identification schemes are, independently from how they are implemented. In particular, we discuss problems with the recognition and authentication of identifiers. If the identified objects are persons, an additional problem is that object identification may conflict with privacy demands; for this case, we indicate a way in which identification can be combined with privacy protection.Keywords
This publication has 10 references indexed in Scilit:
- Using Dynamic Classes and Role Classes to Model Object MigrationTheory and Practice of Object Systems, 1995
- Roles and dynamic subclasses: A modal logic approachPublished by Springer Nature ,1994
- The breakdown of the information model in multi-database systemsACM SIGMOD Record, 1991
- Prepared testimony and statement for the record of Marc Rotenberg director, Washington office, computer professionals for social responsibility (CPSR) on the use of the social security number as a national identifier before the subcommittee on social secu rity, committee on ways and means, U.S house of representatives February 27, 1991ACM SIGCAS Computers and Society, 1991
- Object specializationACM Transactions on Information Systems, 1989
- Information technology and dataveillanceCommunications of the ACM, 1988
- Object identityACM SIGPLAN Notices, 1986
- Security without identification: transaction systems to make big brother obsoleteCommunications of the ACM, 1985
- Extending the database relational model to capture more meaningACM Transactions on Database Systems, 1979
- On semantic issues in the relational model of dataPublished by Springer Nature ,1976