COS
597A, Fall 2011
Solutions
to
Problem Set 3
Part A. Is Result_not_in_Rome = πbname(Acct ) - Result_in_Rome ? No. Consider a branch that has one account owned by a customer living in Rome and another account with no owner living in Rome. The first account satisfies the WHERE condition of Result_in_Rome; therefore, the branch is in Result_in_Rome and not in πbname(Acct ) - Result_in_Rome. The second account satisfies the WHERE condition of Result_not_in_Rome; therefore, the branch is in Result_not_in_Rome.
Part B.
Part 1.
SELECT
DISTINCT A.author
FROM
main M, authors A
WHERE
(M.date = 'June 2002' OR
M.date = 'July 2002' OR
M.date = 'August 2002') AND
M.id = A.id
28 matches found:
|
author |
|
Tsioutsiou, Kostas |
|
Tzanetakis, George |
|
Wang, Limin |
|
Pai, Vivek |
|
Peterson, Larry |
|
Walker, David |
|
Ligatti, Jay |
|
Bauer, Lujo |
|
Shalaby, Nadia |
|
Gottlieb, Yitzchak |
|
Wawrzoniak, Mike |
|
Craver, Scott A. |
|
McGregor, John P. |
|
Wu, Min |
|
Liu, Bede |
|
Stubblefield, Adam |
|
Swartzlander, Ben |
|
Wallach, Dan S. |
|
Dean, Drew |
|
Felten, Edward W. |
|
Correa, Wagner T. |
|
Klosowski, James T. |
|
Silva, Claudio T. |
|
Pang, Ruoming |
|
Qie, Xiaohu |
|
Essl, George |
|
Ji, Minwen |
|
Kleinstein, Steven H. |
(b)
SELECT
M.id, M.title,
M.date
FROM
main M
WHERE
M.abstract LIKE
'%security%'
| id | title | date |
|---|---|---|
| TR-323-91 | Hyperfile, A Database Manager for Documents (Thesis) | June 1991 |
| TR-501-95 | Security Flaws in the HotJava Web Browser | November 1995 |
| TR-520-96 | A Revocable Backup System | March 1996 |
| TR-523-96 | Studies in Computational Number Theory with Applications to Cryptography | July 1996 |
| TR-540-96 | Web Spoofing: An Internet Con Game | December 1996 |
| TR-546-97 | Extensible Security Architectures for Java | April 1997 |
| TR-558-96 | Security and Document Compatability for Electronic Refereeing | October 1996 |
| TR-560-97 | Experience with Secure Multi-Processing in Java | September 1997 |
| TR-566-97 | Java Security: Web Browsers and Beyond | February 1997 |
| TR-567-97 | A Java Filter | December 1997 |
| TR-619-00 | Machine Instruction Syntax and Semantics in Higher Order Logic | April 2000 |
| TR-634-01 | Access Control for Ad-hoc Collaboration (Thesis) | January 2001 |
| TR-636-01 | Models for Security Policies in Proof-Carrying Code | March 2001 |
| TR-638-01 | A Proof-Carrying Authorization System | April 2001 |
| TR-647-02 | JVM TCB: Measurements of the Trusted Computing Base of Java Virtual Machines | April 2002 |
| TR-648-02 | A Trustworthy Proof Checker | April 2002 |
| TR-649-02 | More Enforceable Security Policies | June 2002 |
| TR-657-02 | Reading Between the Lines: Lessons from the SDMI Challenge | July 2002 |
| TR-655-02 | A Calculus for Composing Security Policies | August 2002 |
| TR-677-03 | Access Control for the Web via Proof-Carrying Authorization (Thesis) | September 2003 |
| TR-679-03 | Analysis of the MediaMax CD3 Copy-Prevention System | October 2003 |
| TR-681-03 | Edit Automata: Enforcement Mechanisms for Run-time Security Policies | May 2003 |
| TR-687-03 | Secure Linking: a logical framework for policy-enforced component (Thesis) | December 2003 |
| TR-699-04 | A Language and System for Composing Security Policies | April 2004 |
| TR-714-04 | Network Security Management with High-level Security Policies | September 2004 |
| TR-710-04 | Nicephorus: Striking a Balance between the Recovery Capability and the Overhead of Byzantine Detection | October 2004 |
| TR-715-04 | Safe Heterogeneous Applications: Curing the Java Native Interface | October 2004 |
| TR-718-04 | Policy-based Multihost Multistage Vulnerability Analysis | December 2004 |
| TR-720-05 | Enforcing Non-safety Security Policies with Program Monitors | January 2005 |
| TR-735-05 | A logic-programming approach to network security analysis | September 2005 |
| TR-744-06 | Windows Access Control Demystified | January 2006 |
| TR-752-06 | Policy Enforcement via Program Monitoring | May 2006 |
| TR-775-07 | A Formal Approach to Practical Network Security Management | February 2007 |
| TR-783-07 | A Cryptographic Study of Secure Internet Measurement | May 2007 |
| TR-784-07 | Morpheus: Making Routing Programmable | June 2007 |
| TR-787-07 | Towards Internet-wide Multipath Routing | June 2007 |
| TR-795-07 | Analyzing Security Advice in Functional Aspect-oriented Programming Languages | August 2007 |
| TR-800-07 | A Cryptographic Study of Secure Fault Detection in the Internet | October 2007 |
| TR-808-07 | How Small Groups Can Secure Interdomain Routing | December 2007 |
(c)
SELECT
DISTINCT B.author
FROM
main M, authors A, authors
B
WHERE
M.id = A.id AND
M.id = B.id
AND
A.author LIKE 'Appel%'
AND
M.date LIKE '%2001%' AND
NOT (B.author
LIKE 'Appel%')
2 matches found:
|
author |
|
Chen, Juan |
|
Felten, Edward W. |
(d)
SELECT
A.author, COUNT(M.id)
AS 'Number of TRs'
FROM
main M, authors A
WHERE
M.id = A.id AND
M.date LIKE '%2004%'
GROUP BY
A.author
HAVING
COUNT(M.id)
> 1
| author | Number of TRs |
|---|---|
| Appel, Andrew W. | 3 |
| Avramopoulos, Ioannis | 2 |
| Garg, Nitin | 2 |
| Govindavajhala, Sudhakar | 2 |
| Kobayashi, Hisashi | 2 |
| Krishnamurthy, Arvind | 5 |
| Lai, Junwen | 2 |
| Li, Kai | 3 |
| Nakao, Akihiro | 2 |
| Ou, Xinming | 3 |
| Pai, Vivek | 2 |
| Peterson, Larry | 2 |
| Rusinkiewicz, Szymon M. | 2 |
| Sobti, Sumeet | 2 |
| Tan, Gang | 2 |
| Walker, David | 3 |
| Wang, Randolph Y. | 6 |
| Zheng, Fengzhou | 2 |
(e)
SELECT M.entry as entries, COUNT(*) as number
FROM
main M
GROUP BY M.entry
HAVING COUNT(*) >= all (SELECT COUNT(*)1 match found:
| entries | number |
|---|---|
| 1994-04-04 | 101 |
In the
given database schema, the author-lists of the technical
reports are stored in a separate table. This makes it
convenient to record an arbitrary number of authors for any
technical report, and it also allows one to write
sophisticated queries involving authors.