Skip to main content
Log in

A deontic approach to database integrity

  • Published:
Annals of Mathematics and Artificial Intelligence Aims and scope Submit manuscript

Abstract

The logical theory of database integrity is developed as an application of deontic logic. After a brief introduction to database theory and Kripke semantics, a deontic operator X, denoting “what should hold, non-trivially, given a set of constraints”, is defined and axiomatized. The theory is applied to updates, to dynamic constraints and to databases extended with nulls.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. L. Åqvist,Introduction to Deontic Logic (Bibliopolis, Napoli, 1987).

    Google Scholar 

  2. F. Bancilhon and N. Spyratos, Update semantics of relational views, ACM Trans. Database Syst. 6(1981)557–575.

    Google Scholar 

  3. E.F. Codd, Extending the relational database model to capture more meaning, ACM Trans. Database Syst. 4(1979).

  4. E.F. Codd,The Relational Model for Database Management: Version 2 (Addison-Wesley, 1990).

  5. C.J. Date,An Introduction to Database Systems, Vol II (Addison-Wesley, 1983).

  6. C.J. Date,Relational Database: Selected Writings (Addison-Wesley, 1986).

  7. S.J. van Denneheuvel and K.L. Kwast, Weak equivalence for constraint sets, in:Proc. IJACI'91, Sydney, ed. J. Mylopoulos and R. Reiter (Kaufmann, 1991).

  8. L. Fariñas del Cerro and A. Herzig, An automated modal logic of elementary changes, in:Non-Standard Logics for Automated Reasoning, ed. Ph. Smets et al. (Academic Press, 1988).

  9. R. Fagin, J. Ullman and M. Vardi, On the semantics of updates in databases, in:Proc. PODS'83: 2nd ACM Symp. on Principles of Database Systems, Atlanta (1983).

  10. S.J. Hegner, Canonical view update support through Boolean algebras of components, J. ACM 31(1984).

  11. W. van der Hoek, Modalities for reasoning about knowledge and quantities, Thesis, Vrije Universiteit, Amsterdam (1992).

    Google Scholar 

  12. C.E. Hughes and M.J. Cresswell,An Introduction to Modal Logic (Methuen, 1968).

  13. T. Imielinski and W. Lipski, The relational model of data and cylindric algebras, J. Comp. Syst. Sci. 28(1984).

  14. R. Koymans, Specifying message passing and time-critical systems with temporal logic, Thesis, Technische Universiteit Eindhoven (1989).

    Google Scholar 

  15. S. Kripke, Identity and necessity, in:Identity and Individuation, ed. M.K. Munitz (New York University Press, 1971). Reprinted in:Naming, Necessity and Natural Kinds, ed. S.P. Schwartz (Cornell University Press, 1977).

  16. K.L. Kwast, A deontic operator for database integrity, in:Proc. DEON'91, Amsterdam (1991), ed. J.-J. Ch. Meyers and R. Wieringa.

  17. K.L. Kwast, The relational database model, Thesis, University of Amsterdam (1992).

  18. K.L Kwast, Weak implication: Theory and applications, in:Proc. JELIA'92, 3rd Eur. Workshop on Logic in AI, Berlin (1992).

  19. R. Langerak, View updates in relational databases with independent scheme, ACM Trans. Database Syst. 15(1)(1984).

  20. H. Levesque, Foundations of a functional approach to knowldege representation, Artificial Intelligence 23(1984).

  21. W. Lipski, On databases with incomplete information, J. ACM 28(1981).

  22. J.-J. Ch. Meyer, H. Weigand and R. Wieringa, Specifying dynamic and deontic integrity constraints, Report IR-175, Vrije Universiteit, Amsterdam (1988).

    Google Scholar 

  23. J.-J. Ch. Meyer and W. van der Hoek, Non-monotonic reasoning by monotonie means, Report IR-171, Vrije Universiteit, Amsterdam (1988).

    Google Scholar 

  24. J.-J. Ch. Meyer and R. Wieringa, Applications of deontic logic in computer science: A concise overview, in:Proc. DEON'91, Amsterdam (1991), ed. J.-J. Ch. Meyer and R. Wieringa.

  25. J. Paredeans, P. de Bra, M. Gyssens and D. van Gucht,The Structure of the Relational Database Model (Springer, 1989).

  26. R. Reiter, On integrity constraints, in:Proc. 2nd TARK: Conf. on Theoretical Aspects of Reasoning about Knowledge (1988), ed. M. Vardi.

  27. J.D. Ullman,Principles of Database Systems (Computer Science Press, 1982).

  28. J.D. Ullman,Principles of Data and Knowledge-based Systems, Vols. I and II (Computer Science Press, 1989).

  29. M. Vardi, Fundamentals of dependency theory, in:Trends in Theoretical Computer Science, ed. E. Borger (Computer Science Press, 1988).

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kwast, K.L. A deontic approach to database integrity. Ann Math Artif Intell 9, 205–238 (1993). https://doi.org/10.1007/BF01531267

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF01531267

Keywords

Navigation