{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T22:46:00Z","timestamp":1648853160808},"reference-count":21,"publisher":"Elsevier BV","issue":"2-3","license":[{"start":{"date-parts":[[1983,5,1]],"date-time":"1983-05-01T00:00:00Z","timestamp":420595200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[1983,5]]},"DOI":"10.1016\/0020-0255(83)90017-8","type":"journal-article","created":{"date-parts":[[2003,6,30]],"date-time":"2003-06-30T17:28:37Z","timestamp":1056994117000},"page":"249-257","source":"Crossref","is-referenced-by-count":0,"title":["Site autonomy issues in R\u2217: A distributed database management system"],"prefix":"10.1016","volume":"29","author":[{"given":"P.","family":"Selinger","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D.","family":"Daniels","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"L.","family":"Haas","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B.","family":"Lindsay","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Ng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"P.","family":"Wilms","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Yost","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/0020-0255(83)90017-8_BIB1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1145\/320455.320457","article-title":"System r: A relational approach to database management","volume":"1","author":"Astrahan","year":"1976","journal-title":"ACM Trans. Database Systems"},{"key":"10.1016\/0020-0255(83)90017-8_BIB2","article-title":"System r: An architectural update","author":"Blasgen","year":"1979","journal-title":"IBM Research Report RJ2581"},{"key":"10.1016\/0020-0255(83)90017-8_BIB3","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1147\/rd.206.0560","article-title":"sequel 2: A unified approach to data definition, manipulation and control","author":"Chamberlin","year":"1976","journal-title":"IBM J. Res. Develop."},{"key":"10.1016\/0020-0255(83)90017-8_BIB4","series-title":"Query compilation in a distributed database system","author":"Daniels","year":"1982"},{"issue":"11","key":"10.1016\/0020-0255(83)90017-8_BIB5","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1145\/360363.360369","article-title":"The notions of consistency and predicate locks in a database system","volume":"19","author":"Eswaran","year":"1976","journal-title":"Comm. ACM"},{"key":"10.1016\/0020-0255(83)90017-8_BIB6","series-title":"Operating Systems: An Advanced Course","first-page":"393","article-title":"Notes on data base operating systems","volume":"60","author":"Gray","year":"1978"},{"key":"10.1016\/0020-0255(83)90017-8_BIB7","series-title":"An authorization mechanism for a relational data base system","author":"Griffiths","year":"1976"},{"key":"10.1016\/0020-0255(83)90017-8_BIB8","article-title":"Reliability mechanisms for sdd-i: A system for distributed databases","author":"Hammer","year":"1979","journal-title":"Computer Corporation of America Technical Report"},{"key":"10.1016\/0020-0255(83)90017-8_BIB9","article-title":"Lab. for Computer Science TR-162","author":"Kent","year":"1976"},{"key":"10.1016\/0020-0255(83)90017-8_BIB10","unstructured":"B. W. Lampson and H. E. Sturgis, Crash recovery in a distributed data storage system, Comm. ACM, to appear."},{"key":"10.1016\/0020-0255(83)90017-8_BIB11","series-title":"Notes on distributed databases","author":"Lindsay","year":"1979"},{"key":"10.1016\/0020-0255(83)90017-8_BIB12","series-title":"Proceedings of the 3rd Berkeley Workshop on Distributed Data Management and Computer Networks","first-page":"215","article-title":"Locking and deadlock detection in distributed databases","author":"Menasce","year":"1978"},{"issue":"12","key":"10.1016\/0020-0255(83)90017-8_BIB13","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","article-title":"Using encryption for authentication in large networks of computers","volume":"21","author":"Needham","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0020-0255(83)90017-8_BIB14","series-title":"Distributed compilation and recompilation of database queries","author":"Ng","year":"1982"},{"issue":"2","key":"10.1016\/0020-0255(83)90017-8_BIB15","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1145\/319702.319717","article-title":"Distributed deadlock detection algorithm","volume":"7","author":"Obermarck","year":"1982","journal-title":"ACM Trans. Database Systems"},{"issue":"1","key":"10.1016\/0020-0255(83)90017-8_BIB16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/320128.320129","article-title":"Introduction to system for distributed databases (sdd-I)","volume":"5","author":"Rothnie","year":"1980","journal-title":"ACM Trans. Database Systems"},{"issue":"2","key":"10.1016\/0020-0255(83)90017-8_BIB17","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1145\/320251.320260","article-title":"System level concurrency control for distributed database systems","volume":"3","author":"Rosenkrantz","year":"1978","journal-title":"ACM Trans. Database Systems"},{"key":"10.1016\/0020-0255(83)90017-8_BIB18","series-title":"Proceedings of the 2nd Berkeley Workshop on Distributed Data Management and Computer Networks, Lawrence Berkeley Lab., Univ. of California","first-page":"19","article-title":"A distributed data base version of ingres","author":"Stonebraker","year":"1977"},{"key":"10.1016\/0020-0255(83)90017-8_BIB19","series-title":"R\u2217: An overview of the architecture","author":"Williams","year":"1981"},{"key":"10.1016\/0020-0255(83)90017-8_BIB20","series-title":"A database authorization mechanism supporting individual and group authorization","author":"Wilms","year":"1981"},{"key":"10.1016\/0020-0255(83)90017-8_BIB21","series-title":"Proceedings 2nd International Conference on Distributed Computing Systems","article-title":"Object naming and catalog management for a distributed database manager","author":"Lindsay","year":"1981"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0020025583900178?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0020025583900178?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,18]],"date-time":"2019-03-18T12:53:23Z","timestamp":1552913603000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0020025583900178"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1983,5]]},"references-count":21,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[1983,5]]}},"alternative-id":["0020025583900178"],"URL":"https:\/\/doi.org\/10.1016\/0020-0255(83)90017-8","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[1983,5]]}}}