Advertisement

Integrity verification in knowledge bases

  • François Bry
  • Rainer Manthey
  • Bern Martens
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 592)

Abstract

In order to faithfully describe real-life applications, knowledge bases have to manage general integrity constraints. In this article, we analyse methods for an efficient verification of integrity constraints in updated knowledge bases. These methods rely on the satisfaction of the integrity constraints before the update for simplifying their evaluation in the updated knowledge base. During the last few years, an increasing amount of publications has been devoted to various aspects of this problem. Since they use distinct formalisms and different terminologies, they are difficult to compare. Moreover, it is often complex to recognize commonalities and to find out whether techniques described in different articles are in principle different. A first part of this report aims at giving a comprehensive state-of-the-art in integrity verification. It describes integrity constraint verification techniques in a common formalism. A second part of this report is devoted to comparing several proposals. The differences and similarities between various methods are investigated.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [Abi88]
    S. Abiteboul. Updates, a New Frontier. In Proc. 2 nd Int. Conf. on Database Theory (ICDT), 1988.Google Scholar
  2. [ABI89]
    P. Asirelli, C. Billi, and P. Inverardi. Selective Refutation of Integrity Constraints in Deductive Databases. In Proc. 2nd Int. Symp. on Math. Fundamentals of Database Theory (MFDBS), June 1989.Google Scholar
  3. [AIM88]
    P. Asirelli, P. Inverardi, and A. Mustaro. Improving Integrity Constraint Checking in Deductive Databases. In Proc. Int. Conf. on Database Theory (ICDT), Sept. 1988.Google Scholar
  4. [AMM85]
    P. Asirelli, De Santis M., and M. Martelli. Integrity Constraints in Logic Data Bases. Journal of Logic Programming, 2(3), 1985.Google Scholar
  5. [AV87]
    S. Abiteboul and V. Vianu. A Transaction Language Complete for Update and Specification. In Proc. 6th ACM Symp. on Principles of Database Systems (PODS), 1987.Google Scholar
  6. [AV88]
    S. Abiteboul and V. Vianu. Procedural and Declarative Database Update Languages. In Proc. 7th ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems (PODS), Austin, Texas, March 1988.Google Scholar
  7. [BB82]
    P. A. Bernstein and B. T. Blaustein. Fast Methods for Testing Quantified Relational Calculus Assertions. In Proc. ACM-SIGMOD Int. Conf. on Management of Data (SIGMOD), June 1982.Google Scholar
  8. [BBC80]
    B. Bernstein, B. T. Blaustein, and E. M. Clarke. Fast Maintenance of Semantic Integrity Assertions Using Redundant Aggregate Data. In Proc. 6th Int. Conf. on Very Large Data Bases (VLDB), 1980.Google Scholar
  9. [BD88]
    F. Bry and H. Decker. Préserver l'Intégrité d'une Base de Données Deductive: une Méthode et son Implementation. In Proc. 4mnes Journéees Bases de Données Avancées (BDA), May 1988.Google Scholar
  10. [BDM88]
    F. Bry, H. Decker, and R. Manthey. A Uniform Approach to Constraint Satisfaction and Constraint Satisfiability in Deductive Databases. In Proc. 1st Int. Conf. Extending Database Technology (EDBT), March 1988.Google Scholar
  11. [Bla81]
    B. T. Blaustein. Enforcing Database Assertions: Techniques and Applications. PhD thesis, Harvard Univ., Comp. Sc. Dept., Cambridge, Mass., Aug. 1981.Google Scholar
  12. [Bry89a]
    F. Bry. Logical Rewritings for Improving the Evaluation of Quantified Queries. In Proc. 2 nd Int. Symp. on Mathematical Fundamentals of Data Base Theory (MFDBS), Visegrad, Hungary, June 1989. Springer-Verlag LNCS 364.Google Scholar
  13. [Bry89b]
    F. Bry. Towards an Efficient Evaluation of General Queries: Quantifier and Disjunction Processing Revisited. In Proc. ACM-SIGMOD Int. Conf. on Management of Data (SIGMOD), Portland, Oregon, May–June 1989.Google Scholar
  14. [GD83]
    C. Cremers and G. Domann. AIM — An Integrity Monitor for the Database System Ingres. In Proc. 9th Int. Conf. on Very Large Data Bases (VLDB), 1983.Google Scholar
  15. [Dat85]
    C. J. Date. A Guide to DB2. Addison-Wesley, Reading, Massachusetts, 1985.Google Scholar
  16. [Dec86]
    H. Decker. Integrity Enforcement on Deductive Databases. In Proc. 1st Int. Conf. Expert Database Systems (EDS), April 1986.Google Scholar
  17. [Di 69]
    R. A. Di Paola. The Recursive unsolvability of the Decision Problem for the Class of Definite Formulas. Jour, of the ACM, 16(2), 1969.Google Scholar
  18. [dS88a]
    C. de Maindreville and E. Simon. A Production Rule Based Approach to Deductive Databases. In Proc. 4th Int. Conf. on Data Engineering, Los Angles, Calif., Feb. 1988.Google Scholar
  19. [dS88b]
    C. de Maindreville and E. Simon. Modelling Queries and Updates in a deductive Database. In Proc. 14th Int. Conf. on Very Large Data Bases (VLDB), Los Angles, Calif., Aug. 1988.Google Scholar
  20. [DW89]
    S. K. Das and M. H. Williams. A Path Finding Method for Constraint Checking in Deductive Databases. Data & Knowledge Engineering, 4(3), 1989.Google Scholar
  21. [End72]
    H. B. Enderton. A Mathematical Introduction to Logic. Academic Press, New York, 1972.Google Scholar
  22. [Fag80]
    R. Fagin. Horn Clauses and Data Dependencies. In Proc. 12th Annual ACM Symp. on Theory of Computing, pages 123–134, 1980.Google Scholar
  23. [Fdd81]
    A. L. Furtado, C. S. dos Santos, and J. M. V. de Castilho. Dynamic Modelling of a Simple Existence Constraint. Information Systems, 6, 1981.Google Scholar
  24. [Flo74]
    J. J. Florentin. Consistency Auditing of Databases. The Computer Journal, 17(1), 1974.Google Scholar
  25. [FV83]
    R. Fagin and M. Y. Vardi. Armstrong Databases for Functional and Inclusion Dependencies. Information Processing Letters, 16:13–19, Jan. 1983.CrossRefGoogle Scholar
  26. [FW83]
    R. A. Frost and S. Whittaker. A Step towards the Automatic Maintenance of the Semantic Integrity of Databases. The Computer Journal, 26(2), 1983.Google Scholar
  27. [GM79]
    G. Gardarin and M. Melkanoff. Proving Consistency of Database Transactions. In Proc. 5th Int. Conf. on Very Large Data Bases (VLDB), Sept. 1979.Google Scholar
  28. [GMN84]
    H. Gallaire, J. Minker, and J.-M. Nicolas. Logic and Databases: A Deductive Approach. ACM Computing Surveys, 16(2):153–185, June 1984.CrossRefGoogle Scholar
  29. [HI85]
    A. Hsu and T. Imielinski. Integrity Checking for Multiple Updates. In Proc. ACMSIGMOD Int. Conf. on Management of Data (SIGMOD), 1985.Google Scholar
  30. [HK78]
    M. Hammer and S. K. Karin. Efficient Monitoring of Database Assertions. In Proc. Int. Conf. on Management of Data (SIGMOD), 1978.Google Scholar
  31. [HM75]
    H. H. Hammer and D. J. McLeod. Semantic Integrity in a Relational Data Base System. In Proc. 1st Int. Conf. on Very Large Data Bases (VLDB), 1975.Google Scholar
  32. [KSS87]
    R. Kowalski, F. Sadri, and P. Soper. Integrity Checking in Deductive Databases. In Proc. 13th Int. Conf. on Very Large Data Bases (VLDB), Brighton, UK, Sept. 1987.Google Scholar
  33. [Kuh67]
    J. L. Kuhns. Answering Questions by Computer: A Logical Study. Technical Report RM-5428-PR, Rand Corp., 1967.Google Scholar
  34. [Laf82]
    G. M. E. Lafue. Semantic Integrity Dependencies and Delayed Integrity Checking. In Proc. 8th Int. Conf. on Very Large Data Bases (VLDB), 1982.Google Scholar
  35. [LST87]
    J. W. Lloyd, E. A. Sonenberg, and R. W. Topor. Integrity Constraint Checking in Stratified Databases. Jour. of Logic Programming, 4(4), 1987.Google Scholar
  36. [LT84]
    J. W. Lloyd and R. W. Topor. Making Prolog more Expressive. Jour. of Logic Programming, 1(3), 1984.Google Scholar
  37. [LT85]
    J. W. Lloyd and R. W. Topor. A Basis for Deductive Database Systems. Jour. of Logic Programming, 2(2), 1985.Google Scholar
  38. [LT86]
    J. W. Lloyd and R. W. Topor. A Basis for Deductive Database Systems II. Jour. of Logic Programming, 3(1):55–67, 1986.CrossRefGoogle Scholar
  39. [MB88]
    B. Martens and M. Bruynooghe. Integrity Constraint Checking in Deductive Databases Using a Rule/Goal Graph. In Proc. 2nd Int. Conf. Expert Database Systems (EDS), April 1988.Google Scholar
  40. [MK88]
    G. Moerkotte and S. Karl. Efficient Consistency Control in Deductive Databases. In Proc. 2nd Int. Conf. on Database Theory (ICDT), 1988.Google Scholar
  41. [MKW89]
    R. Manthey, V. Küchenhoff, and M. Wallace. KBL: Design Proposal for a Conceptual Language of EKS. Research Report TR-KB-29, ECRC, 1989.Google Scholar
  42. [Nic79]
    J.-M. Nicolas. Logic for Improving Integrity Checking in Relational Databases. Technical report, ONERA-CERT, Feb. 1979. Also in Acta Informatica 18(3), Dec. 1982, 227–253.CrossRefGoogle Scholar
  43. [NK87]
    S. Naqvi and R. Krishnamurthy. Database Updates in logic Programming. In Proc. 7th ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems (PODS), pages 251–262, Austin, Texas, March 1987.Google Scholar
  44. [NT89]
    S. Naqvi and S. Tsur. A Logical Language for Data and Knowledge Bases. Computer Science Press, New-York, 1989.Google Scholar
  45. [NY78]
    J.-M. Nicolas and K. Yazdanian. Logic and Data Bases, chapter Integrity Checking in Deductive Databases. Plenum Press, New York, 1978.Google Scholar
  46. [Rei81]
    R. Reiter. Advances in Data Base Theory, volume 1, chapter On the Integrity of Typed First-Order Data Bases. Plenum Press, New York, 1981.Google Scholar
  47. [Rei84]
    R. Reiter. On Conceptual Modelling, chapter Towards a Logical Reconstruction of Relational Database Theory. Springer-Verlag, Berlin, New York, 1984.Google Scholar
  48. [She88]
    J. C. Shepherdson. Foundations of Deductive Databases and Logic Programming, chapter Negation in Logic Programming, pages 19–88. Morgan Kaufmann, Los Altos, Calif., 1988.Google Scholar
  49. [SK87]
    F. Sadri and R. Kowalski. A Theorem-Proving Approach to Database Integrity. In Proc. Workshop on Foundations of Deductive Databases and Logic Programming, 1987.Google Scholar
  50. [Smu88]
    R. M. Smullyan. First-Order Logic. Springer-Verlag, Berlin, New-York, 1988.Google Scholar
  51. [Sto75]
    M. Stonebraker. Implementation of Integrity Constraints and Views by Query Modification. In Proc. ACM SIGMOD Int. Conf. on Management of Data (SIGMOD), May 1975.Google Scholar
  52. [TKW85]
    R. W. Topor, T. Keddis, and D. W. Wright. Deductive Database Tools. Technical Report 84/7, University of Melbourne, 1985.Google Scholar
  53. [Ull88]
    J. D. Ullman. Principles of Database and Knowledge-Base Systems, volume 1. Computer Science Press, Rockville, Maryland, 1988.Google Scholar
  54. [VGT87]
    A. Van Gelder and R. W. Topor. Safety and Correct Translation of Relational Calculus Formulas. In Proc. 6th ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems (PODS), pages 317–327, San Diego, Calif., March 1987.Google Scholar
  55. [Wil80]
    G. A. Wilson. A Conceptual Model for semantic Integrity Checking. In Proc. 6th Int. Conf. on Very Large Data Bases (VLDB), Oct. 1980.Google Scholar
  56. [WSK83]
    W. Weber, W. Stucky, and J. Karszt. Integrity Checking in Data Base Systems. Information Systems, 8(2), 1983.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1992

Authors and Affiliations

  • François Bry
    • 1
  • Rainer Manthey
    • 1
  • Bern Martens
    • 2
  1. 1.ECRCMünchen 81West-Germany
  2. 2.Department of Computer ScienceKatholieke Universiteit LeuvenHeverleeBelgium

Personalised recommendations