Advertisement

Transaction-based specification of database evolution

  • Lars Bækgaard
Session 4a: Languages
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1331)

Abstract

We present a two-layer language for the specification of database evolution in terms of transaction-based, dynamic integrity constraints. The first language layer is based on first-order logic and it is used to express dynamic constraints in terms of queries on the transaction history of a database. The second layer uses a customizable combination of text and graphics and its semantics are defined in terms of the first-order language. Our language is orthogonal to state-based constraint languages and it can be used as a supplement to these. Also, our language can be used in combination with all object-based or entity-based data models. We use examples to illustrate the use of the specification language.

Key Terms

Database evolution database integrity dynamic constraint specifications transaction-based constraint specifications 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Brodie, M. L. (1980). “The Application of Data Types to Database Semantic Integrity.” Information Systems 5: 287–296.Google Scholar
  2. Brodie, M. L. and D. Ridjanovic (1984). “On the Design and Specification of Database Transactions”. Topics in Information Systems. On Conceptual Modeling. M. L. Brodie, J. Mylopoulos and J. W. Schmidt, Springer-Verlag: 277–312.Google Scholar
  3. Bækgaard, L. (1993). “Specification and Efficient Monitoring of Transaction Dependencies. Ph.D. Thesis”. Department of Mathematics and Computer Science, Aalborg University.Google Scholar
  4. Castilho, J. M. V. D., M. A. Casanova, et al. (1982). “A Temporal Framework for Database Specifications”. 8th International Conference on Very Large Databases, Mexico City, Mexico.Google Scholar
  5. Cervasato, I. and C. F. Eick (1992). “Specification and Enforcement of Dynamic Consistency Constraints”. CIKM'92. ISSM International Conference on Information and Knowledge Management, Baltimore, Maryland, USA.Google Scholar
  6. Chomicki, J. (1992). “History-Less Checking of Dynamic Integrity Constraints”. 8th International Conference on Data Engineering, Tempe, Arizona, USA, Computer Society Press.Google Scholar
  7. Codd, E. F. (1970). “A Relational Model of Data for Large Shared Data Banks.” Communications of the ACM 13(6): 377–387.Google Scholar
  8. Formica, A. and M. Missikoff (1992). “Adding Integrity Constraints to Object-Oriented Models”. CIKM'92. ISSM International Conference on Information and Knowledge Management, Baltimore, Maryland, USA.Google Scholar
  9. Gray, J. (1981). “The Transaction Concept. Virtues and Limitations”. VLDB'81. 7th International Conference on Very Large Databases, Cannes, France.Google Scholar
  10. Hall, G. and R. Gupta (1991). “Modeling Transition”. 7th International Conference on Data Engineering, Kobe, Japan, Computer Society Press.Google Scholar
  11. Hammer, H. and D. McLeod (1981). “Database Description with SDM. A Semantic Database Model.” ACM Transactions of Database Systems 6(3): 351–386.Google Scholar
  12. Jackson, M. (1983). System Development, Prentice-Hall.Google Scholar
  13. Kappel, G. and M. Schrefl (1991). “Object/Behavior Diagrams”. 7th International Conference on Data Engineering, Kobe, Japan, Computer Society Press.Google Scholar
  14. Khoshafian, S. and G. P. Copeland (1986). “Object Identity”. Object-Oriented Programming Systems, Languages, and Applications-86, ACM.Google Scholar
  15. Kim, W., Ed. (1995). Modern Database Systems. The Object Model, Interoperability, and Beyond, Addison-Wesley.Google Scholar
  16. Kim, W. and F. H. Lochocsky, Eds. (1989). Object-Oriented Concept, Databases, and Applications, ACM Press, Addison-Wesley Publishing Company.Google Scholar
  17. Kung, C. H. (1985). “On Verification of Temporal Database Constraints”. SIGMOD'85. International Conference on Management of Data, Austin, Texas, USA.Google Scholar
  18. Leonard, M. and B. Y. Luong (1981). “Information Systems Design Approach Integrating Data and Transactions”. VLDB'81. 7th International Conference on Very Large Databases, Cannes, France.Google Scholar
  19. Lipeck, U. W. (1986). “Stepwise Specification of Dynamic Database Behaviour”. SIGMOD'86. International Conference on Management of Data, Washington, D.C.Google Scholar
  20. Lipeck, U. W. and G. Saake (1987). “Monitoring Dynamic Integrity Constraints Based on Temporal Logic.” Information Systems 12(3): 255–269.Google Scholar
  21. Martin, H., M. Abida, et al. (1992). “Consistency Checking in Object-Oriented Databases. A Behavioral Approach”. CIKM'92. ISSM International Conference on Information and Knowledge Management, Baltimore, Maryland, USA.Google Scholar
  22. Motro, A. (1989). “Integrity = Validity + Completeness.” ACM Transaction on Database Systems 14(4): 480–502.Google Scholar
  23. Mück, T. and G. Vinek (1989). “Modeling Dynamic Constraints Using Augmented Place Transition Nets.” Information Systems 14(4): 327–340.Google Scholar
  24. Mylopoulos, J. (1992). “Conceptual Modeling and Telos”. Conceptual Modeling, Databases, and CASE. An Integrated View of Information Systems. P. Loucopoulos and R. Zicari, John Wiley & Sons.Google Scholar
  25. Ngu, A. H. H. (1984). “Transaction Modeling”. 5th International Conference on Data Engineering, Los Angeles, USA, Computer Society Press.Google Scholar
  26. Ngu, A. H. H. (1990). “Specification and Verification of Temporal Relationships in Transaction Modeling.” Information Systems 15(2): 257–267.Google Scholar
  27. Qian, X. (1988). “A Transaction Logic for Database Specification”. SIGMOD'88. International Conference on Management of Data, Chicago, Illinois, USA.Google Scholar
  28. Rosenquist, C. J. (1982). “Entity Life Cycle Models and their Applicability to Information Systems Development Life Cycles.” Computer Journal 25(3).Google Scholar
  29. Shipman, D. W. (1981). “The Functional Data Model and the Data Language DAPLEX.” ACM Transactions on Database Systems 6(1): 140–173.Google Scholar
  30. Simon, E. and P. Valduriez (1984). “Design and Implementation of an Extendible Integrity Subsystem”. SIGMOD'84. International Conference on Management of Data, Boston, USA.Google Scholar
  31. Stonebraker, M. (1975). “Implementation of Integrity Constraints and Views by Query Modification”. SIGMOD'75. Workshop on Management of Data, San Jose, California, USA.Google Scholar
  32. Vianu, V. (1988). “Database Survivability Under Dynamic Constraints.” Acta Informatica 25: 55–84.Google Scholar
  33. Wieringa, R., J.-J. Meyer, et al. (1989). “Specifying Dynamic and Deontic Integrity Constraints.” Data & Knowledge Engineering 4: 157–189.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1997

Authors and Affiliations

  • Lars Bækgaard
    • 1
  1. 1.Department of Information Sciencethe Aarhus School of BusinessAarhus VDenmark

Personalised recommendations