Abstract is missing.
- Data Base Design in Theory and Practice - Towards an Integrated MethodologyBo Sundgren. 3-23
- Data Base Design ToolsJanis A. Bubenko Jr., S. Bing Yao. 25-26
- Comments on the paper Data Base Design in Theory and Practice by Bo SundgrenJohn Miles Smith. 31-32
- Modularity in Data Base System Design: A Software Engineering View of Data Base SystemsHerbert Weber. 65-91
- Comments on the Papers A Software Engineering View of Data Base Management by I. A. Wasserman and A Software Engineering View of Data Base Systems by H. WeberJohn Miles Smith. 99-102
- Data Base Design in Software Systems for Process Monitoring and ControlHeinz Trauboth. 103-107
- Software and Data Base Engineering - Towards a Common Design MethodologyRaymond T. Yeh, Agustin A. Araya, Philip Chang. 109-123
- Issues in Distributed Data Base Management Systems: A Technical OverviewMichel E. Adiba, Jean-Claude Chupin, Robert Demolombe, Georges Gardarin, Jean Le Bihan. 127-153
- A Note on Theoretical Problems in Distributed Database ManagementPhilip A. Bernstein. 155-157
- Issues in Distributed Database SystemsMurray Edelberg. 159-161
- Important Issues in Distributed Data Base Management SystemsErich J. Neuhold. 163-165
- Issues in Distributed Database Management Systems: A Technical OverviewJames B. Rothnie Jr.. 167-170
- Some Remarks on a Paper of Adiba, M. et al. on Issues in Distributed Data Base Management Systems: A Technical Overview H.-J. Schneider. 171-173
- Computer Technology and the Database UserTien Chi Chen. 177-201
- Statement for the Session on Impact of New TechnologiesP. Bruce Berra. 203
- Statement for the Session on Impact of New TechnologiesLee A. Hollaar. 205-206
- Statement for the Session on Impact of New TechnologiesDavid K. Hsiao. 207-208
- Impact of New TechnologiesHans-Otto Leilich. 215
- Privacy and Security of Data Communications and Data BasesDavid K. Hsiao, Douglas S. Kerr, Stuart E. Madnick. 223-248
- Privacy, Security and Databases: Any Solutions?George I. Davida. 249-251
- Database SecurityRichard A. DeMillo. 253-256
- Authorization and Database SecurityPeter C. Lockemann. 257-258
- Six Principles for Improving Security in the Use of Medical Data BasesAnthony I. Wasserman. 259-261