Advertisement

Integrity constraint checking in Chimera

Extended abstract
  • E. Bertino
  • B. Catania
  • S. Bressan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1191)

Abstract

Integrity constraints are general properties that a given database is expected to satisfy. Integrity constraints can be implicit in the schema of the database or explicitly expressed as, for instance, logical formulae. Since the database is expected to be consistent with respect to these properties, one important issue is the verification of integrity constraints upon updates. Such a operation is called constraints verification or constraints checking. Constraint verification is potentially an expensive operation for all types of database and in particular for deductive databases [34], and deductive and object-oriented Databases (DOOD), where the modification of a single data can have a substantial impact on other data because of the presence of deductive rules and inheritance. Chimera is one instance of a DOOD data model and language. It has been developed in the context of the ESPRIT project 6333 IDEA.

In this paper, we show how integrity constraint checking can be applied to Chimera databases. We show that integrity constraint checking in Chimera databases can be reduced to integrity constraint checking for deductive databases relying on a translation of Chimera databases into Datalog rules, extended with stratified negation, records, sets and arithmetic and set comparisons. Finally, we take advantage of our observation to present the application of one specific deductive method for integrity constraint checking to Chimera databases.

Keywords

Extensional Attribute Integrity Constraint Deductive Database Deductive Rule Constraint Check 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    S. Abiteboul and S. Grumbach. COL: A Logic Based Language for Complex Objects. In F. Bancilhon and P. Buneman, editors, Advances in Database Programing Languages, pages 347–377, 1990. ACM Press.Google Scholar
  2. 2.
    S. Abiteboul, R. Hull, and V. Vianu. Foundations of Databases. Addison-Wesley, 1995.Google Scholar
  3. 3.
    P. Bayer. Update Propagation for Integrity Cheching, Materialized View Maintenance and Production Rule Triggering. Technical Report 92-10, ECRC, Munich, Germany, 1992.Google Scholar
  4. 4.
    S. Bressan and Ph. Bonnet. Flora-Prime: Implementing a Nested Relational Model with ECLiPSe and Bang. IDEA Technical Report IDEA.DE.3E.26.2, 1994.Google Scholar
  5. 5.
    C. Beeri, S. Naqvi, R. Ramakrishnan, O. Shmueli, and S. Tsur. Sets and Negation in a Logic Database Language (LDL1). In Proc. of the Sixth ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems, pages 21–37, San Diego, California, March 1987.Google Scholar
  6. 6.
    M. Benedikt, T. Griffin, L. Libkin. Verifiable Properties of Database Transactions. In Proc. of the Sixth ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems, pages 117–127, Montreal, Canada, June 1996.Google Scholar
  7. 7.
    E. Bertino and L. Martino. Object-Oriented Database Systems — Concepts and Architectures. Addison-Wesley Int., 1993.Google Scholar
  8. 8.
    F. Bry, H. Decker, and R. Manthey. A Uniform Approach to Constraint Satisfaction and Constraint Satisfiability in Deductive Databases. In Proc. of the Int. Conf. on Extending Database Technology, EDBT'88, pages 488–504, Venice, Italy, 1988.Google Scholar
  9. 9.
    S. Ceri, P. Fraternali, S. Paraboschi, and L. Tanca. Automatic Generation of Production Rules for Integrity Maintenance. ACM Transactions on Database Systems. 19(3):367–422, 1994.Google Scholar
  10. 10.
    S. Ceri, R. Manthey, E. Baralis, E. Bertino, C. Draxler, U. Griefahn, D. Montesi, A. Sikeler and L. Tanca. Consolidated Specification of Chimera, CM and CL. IDEA Deliverable, Politecnico of Milano, November 1993.Google Scholar
  11. 11.
    S. Ceri and J. Widom. Deriving Production Rules for Constraint Maintenance. In Proc. of the 16th Int. Conf. On Very Larga Data Bases, Brisbane, Australia, 1990.Google Scholar
  12. 12.
    S.K. Das and M.H. Williams. A Path Finding Method for Constraint Checking in Deductive Databases. Data and Knowledge Engineering, pages 223–244, 1989.Google Scholar
  13. 13.
    H. Decker. Integrity Enforcement in Deductive Databases. In Proc. of the First Int. Workshop on Expert Database Systems, 1986.Google Scholar
  14. 14.
    A. Formica and M. Missikoff. Integrity Constraint Representation in Object-Oriented Databases. In Information and Knowledge Management, Lecture Notes in Computer SCience n. 752, selected papers from CIKM'92, Baltimore, Maryland, pages 69–85, 1992.Google Scholar
  15. 15.
    N. Gehani and H.V.Jagadish. Ode as an Active Database: Constraints and Triggers. In Proc. of the 17th Int. Conf on Very Large Data Bases, Barcelona Spain, 1991.Google Scholar
  16. 16.
    S. Greco and N. Leone and P. Rullo. COMPLEX: An Object-Oriented Logic Programming System. IEEE Transactions on Knowledge and Data Engineering, 4(4): 344–359, 1990.Google Scholar
  17. 17.
    L.J. Henshen, W.W. MacCune, and S.A. Naqvi. Compiling Constraint Checking Programs from First Order Formulas. In H. Gallaire and J. Minker, editors, Logic and Databases, pages 145–169, 1984.Google Scholar
  18. 18.
    M. Jarke. ConceptBase V3.0 User Manual Technical report MIP-9106, Universitat Passau.Google Scholar
  19. 19.
    W. Jonker and S. Bressan. ECLiPSe CHIMERA Subset IDEA Technical Report WP.3E.016.1,2, 1994.Google Scholar
  20. 20.
    M. Jeusfeld and M. Jarke From Relational to Object-Oriented Integrity Simplification. In Proc. of the Conf. on Deductive and Object-oriented Databases, DOOD, pages 460–477, 1991.Google Scholar
  21. 21.
    A.P. Karadimce and S.D. Urban. A Framework for Declarative Updates and Constraint Maintenance on Object-Oriented Databases. In Proc. of the IEEE Int. Conf. On Data Engineering, pages 391–398, 1993.Google Scholar
  22. 22.
    I. Kobayashi. Validing Database Updates. Information Systems, 9(1):1–17, 1984.Google Scholar
  23. 23.
    R. Kowalski, F. Sadri, and P. Soper. Integrity Checking in Deductive Databases. In Proc. of the 13th Int. Conf. On Very Larga Data Bases, pages 61–69, Brighton, 1987.Google Scholar
  24. 24.
    J.W. Lloyd. Foundations of Logic Programming. Springer Verlag, 1987.Google Scholar
  25. 25.
    J.W. Lloyd, E.A. Sonenberg, and R.W. Topor. Integrity Constraint Checking in Stratified Databases. Journal of Logic Programming, 4:331–343, 1987.Google Scholar
  26. 26.
    Y. Lou and Z. M. Ozsoyoglu. LLO: An Object-Oriented Deductive Language with Methods and Methods Inheritance. In Proc. of the Int. Conf. on Management of Data, pages 198–207, 1991.Google Scholar
  27. 27.
    The Object Database Standard: ODGM-93. Edited by R.G.G. Cattell, Morgan-Kauffman, 1996.Google Scholar
  28. 28.
    H. Martin, M. Adiba, and B. Defude. Consistency Checking in Object-oriented Databases: a Behavioral Approach. In Information and Knowledge Management, Lecture Notes in Computer SCience n. 752, selected papers from CIKM'92, Baltimore, Maryland, pages 53–68, 1992.Google Scholar
  29. 29.
    J.M. Nicolas. Logic for Improving Integrity Checking in Relational Databases. Acta Informatica, 18(3): 227–253, 1982.Google Scholar
  30. 30.
    D. Plexousakis and J. Mylopoulos. Accomodating Integrity Constraints During Database Design. In Proc. of the Fifth Int. Conf. on Extending Database Technology, Volume 1057 of Lecture Notes in Computer Science, pages 497–513, Avigno, France, March 1996.Google Scholar
  31. 31.
    K.A. Ross, D. Srivastava, P.J. Stuckey, and S. Sudarshan. Foundations of Aggregation Constraints. In Proc. of the Second Int. Workshop on Principles and Practive of Constraint Programming, Volume n. 874 of Lecture Notes in Computer Science, pages 193–204, May 1994.Google Scholar
  32. 32.
    S.D. Urban and L.M.L. Delcambre. Constraint Analysis: a Design Process fir Specifying Operations. IEEE Transactions on Knowledge and Data Engineering, 1991.Google Scholar
  33. 33.
    S.D. Urban, A.P. Karadimce, and R.B. Nannapaenni. The Implementation and Evaluation of Integrity Maintenance Rules in an Object-Oriented Database. In Proc. of the IEEE Int. Conf. On Data Engineering, pages 565–572, 1992.Google Scholar
  34. 34.
    J.D. Ullman. Principles of Database and Knowledge-Base Systems, volume 1 and 2. Computer Science Press, 1989.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • E. Bertino
    • 1
  • B. Catania
    • 1
  • S. Bressan
    • 2
  1. 1.Dipartimento di Scienze dell'InformazioneUniversity of MilanoMilanoItaly
  2. 2.MIT Sloan School of ManagementCambridgeUSA

Personalised recommendations