Advertisement

SICSDD: Techniques and implementation

  • H. Ibrahim
  • W. A. Gray
  • N. J. Fiddian
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1191)

Abstract

This paper presents the constituent techniques and the implementation of a semantic integrity subsystem for a distributed database (SICSDD). The subsystem provides complete functionality and an efficient strategy for constraint enforcement. Complete functionality is attained through a modular and extensible architecture in which several techniques are incorporated. These are either modifications/extensions of techniques developed by other researchers or new techniques proposed by us. The integration of these techniques is necessary to achieve efficient constraint enforcement, particularly in a distributed database.

Keywords

Constraint Violation Integrity Test Integrity Constraint Conjunctive Normal Form Integrity Rule 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [CHA73]
    Chang, C. and Lee, R.C. Symbolic Logic and Mechanical Theorem Proving. Academic Press, 1973.Google Scholar
  2. [CRE83]
    Cremers, A.B. and Domann G. AIM — An Integrity Monitor for The Database System INGRES. Proceedings of the 9th International Conference on Very Large Data Bases, Italy, 1983.Google Scholar
  3. [DAT86]
    Date, C.J. An Introduction to Database Systems. Addison-Wesley Publishing Company, 1986.Google Scholar
  4. [ESW75]
    Eswaran, K.P. and Chamberlin, D.D. Functional Specifications of A Subsystem for Database Integrity. Proceedings of the 1st International Conference on Very Large Data Bases, 1975, pp. 48–68.Google Scholar
  5. [FRO86]
    Frost, R.A. Introduction to Knowledge Base Systems. Collins Professional and Technical Books, 1986.Google Scholar
  6. [GRE93a]
    Grefen, P.W.P.J. Combining Theory and Practice in Integrity Control: A Declarative Approach to the Specification of a Transaction Modification Subsystem. Proceedings of the 19th International Conference on Very Large Data Bases, Ireland, 1993, pp. 581–591.Google Scholar
  7. [GRE93b]
    Grefen, P.W.P.J. and Apers, P.M.G. Integrity Control in Relational Database Systems — An Overview. Data and Knowledge Engineering, North-Holland, 1993, pp. 187–223.Google Scholar
  8. [GRE91]
    Grefen, P.W.P.J. and Apers, P.M.G. Parallel Handling of Integrity Constraints on Fragment Relations. Proceedings of the 2nd DEXA Conference, Germany, August 1991.Google Scholar
  9. [GRE90]
    Grefen, P.W.P.J., Flokstra, J. and Apers, P.M.G. Parallel Handling of Integrity Constraints. Proceedings of the Prisma Workshop on Parallel Database Systems, 1990, pp. 242–258.Google Scholar
  10. [GUP94]
    Gupta, A. Partial Information Based Integrity Constraint Checking. PhD Thesis, Stanford University, 1994.Google Scholar
  11. [GUP93]
    Gupta, A. and Widom, J. Local Verification of Global Integrity Constraints in Distributed Databases. Proceedings of the ACM SIGMOD Conference, 1993, pp. 49–58.Google Scholar
  12. [HAM75]
    Hammer, M.M. and Mcleod, D.J. Semantic Integrity in a Relational Database System. Proceedings of the 1st International Conference on Very Large Data Bases, 1975, pp. 25–47.Google Scholar
  13. [HEN84]
    Henschen, L.J., McCune, W.W. and Naqvi, S.A. Compiling Constraint-Checking Programs from First-Order Formulas. Advances in Database Theory, Vol. 2, Gallaire, H., Minker, J. and Nicolas, J.M. (Eds), Plenum Press, 1984, pp. 145–170.Google Scholar
  14. [IBR96a]
    Ibrahim, H., Gray, W.A. and Fiddian, N.J. The Development of a Semantic Integrity Constraint Subsystem for a Distributed Database (SICSDD). Proceedings of the 14th British National Conference on Databases, Edinburgh, July 1996.Google Scholar
  15. [IBR96b]
    Ibrahim, H., Gray, W.A. and Fiddian, N.J. Efficient Constraint Checking in Distributed Databases. Proceedings of the 16th Annual Database Conference DATASEM'96, Czech Republic, 1996.Google Scholar
  16. [McC95]
    McCarroll, N.F. Semantic Integrity Enforcement in Parallel Database Machines, PhD Thesis, Sheffield, 1995.Google Scholar
  17. [McC89]
    McCune, W.W. and Henschen, L.J. Maintaining State Constraints in Relational Databases: A Proof Theoretic Basis. Journal of the Association for Computing Machinery, Vol. 36, No. 1, January 1989, pp. 46–68.Google Scholar
  18. [NIC82]
    Nicolas, J.M. Logic for Improving Integrity Checking in Relational Data Bases. Acta Informatica, Vol. 8, No. 3, 1982, pp. 227–253.Google Scholar
  19. [QIA89]
    Qian, X. Distribution Design of Integrity Constraints. Proceedings of the 2nd International Conference on Expert Database Systems, 1989, pp. 205–226.Google Scholar
  20. [OZS91]
    Ozsu, M.T. and Valduriez, P. Principles of Distributed Database Systems. Prentice-Hall International Edition, 1991.Google Scholar
  21. [SHE84]
    Shepherd, A. and Kerschberg, L. PRISM: A Knowledge Based System for Semantic Integrity Specification and Enforcement in Database Systems, Proceedings of the ACM SIGMOD Conference, 1984, pp. 307–315.Google Scholar
  22. [SIM84]
    Simon, E. and Valduriez P. Design and Implementation of an Extendible Integrity Subsystem. Proceedings of the ACM SIGMOD Conference, 1984, pp. 9–17.Google Scholar
  23. [WAN92]
    Wang, X.Y. The Development of a Knowledge-Based Transaction Design Assistant. PhD Thesis, UWCC Cardiff, 1992.Google Scholar
  24. [WID94]
    Widom, J., Gupta, A., Sagiv, Y. and Ullman, J.D. Validating Constraints with Partial Information: Research Overview. Proceedings of the 13th Symposium on Principles of Database Systems (PODS), 1994.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1996

Authors and Affiliations

  • H. Ibrahim
    • 1
  • W. A. Gray
    • 1
  • N. J. Fiddian
    • 1
  1. 1.Department of Computer ScienceUniversity Of WalesCardiff

Personalised recommendations