Enforcing Integrity Constraints in Database Programming Languages

  • Véronique Benzaken
  • Christophe Lécluse
  • Philippe Richard
Conference paper
Part of the Workshops in Computing book series (WORKSHOPS COMP.)


This paper is concerned with the problem of efficiently checking of integrity constraints in data base programming languages supporting subtyping and class hierarchies. More specifically, we consider two different problems: (1) statically reduce the number of constraints to be checked, and (2) generate an efficient run time checker. Using simple strategies, one can significantly improve the efficiency of the verification. We show how to reduce the number of constraints to be checked by characterising the portions of the database that are concerned by the constraints and involved in a transaction. We also show how to generate efficient algorithms for checking a large class of constraints (universally quantified conjunctive constraints). Last, we show how all the techniques presented took great advantage of the underlying type system which provide a significant help both in solving (1) and (2).


Integrity Constraint Boolean Expression Class Vehicle Deductive Database Integrity Check 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. [1]
    P.A. Bernstein and B.T. Blaustein. Fast methods for testing quantified relational calculus expressions. In ACM SIGMOD International Conference, Orlando, Florida, June 1982.Google Scholar
  2. [2]
    F. Bry, H. Decker, and R. Manthey. A Uniform Approach to Constraint Satisfaction and Constraint Satisfiability in Deductive Databases. In EDBT International Conference, 1988.Google Scholar
  3. [3]
    F. Bry and R. Manthey. Checking Consistency of Database Constraints: A Logical Basis. In VLDB International Conference, 1986.Google Scholar
  4. [4]
    L. Cardelli. A Semantics of Multiple Inheritance. In Semantics of Data Types. Springer-Verlag, 1984.Google Scholar
  5. [5]
    G. Gardarin and M. Melkanoff. Proving the Consistency of Database Transactions. In VLDB International Conference, Rio, Brasil, October 1979.Google Scholar
  6. [6]
    A. Hsu and T. Imielinski. Integrity Checking for Multiple Updates. In ACM SIGMOD International Conference, 1985.Google Scholar
  7. [7]
    R. Hull, R. Morrison, and D. Stemple, editors. International Workshop on Database Programming Languages. Morgan Kaufmann, 1989.Google Scholar
  8. [8]
    R. Kowalski, F. Sadri, and P. Soper. Integrity Checking in Deductive Databases. In VLDB International Conference, 1987.Google Scholar
  9. [9]
    C. Lécluse and P. Richard. Modeling Complex Structures in Object-Oriented Databases. In ACM PODS International Conference, March 1989.Google Scholar
  10. [10]
    C. Lécluse and P. Richard. Data Base Schemas and Types Systems for DBPLs, a Definition and its Applications. Technical Report, GIP Altair, June 1990.Google Scholar
  11. [11]
    H. Martin. Contrôle de la cohérence dans les bases objects: Une approche par le comportement. PhD thesis, Université Joseph-Fourier - Grenoble I, 1991.Google Scholar
  12. [12]
    J.M. Nicolas. Logic for Improving Integrity Checking in Relational Databases. Technical Report, ONERA-CERT, 1979.Google Scholar
  13. [13]
    T. Sheard and D. Stemple. Automatic Verification of Database Transaction Safety. ACM Transactions on Database Systems, 14 (3), September 1989.Google Scholar
  14. [14]
    E. Simon and P. Valduriez. Design and Analysis of a Relational Integrity System. Technical Report, DB-015–87, MCC, 1987.Google Scholar
  15. [15]
    M. Stonebraker. Implementation of Integrity Constraints and Views by Query Modification. In ACM SIGMOD International Conference, San Jose, California, May 1975.Google Scholar
  16. [16]
    W. Weber, W. Stugky, and J. Karzt. Integrity Checking in database systems. Information Systems, 8 (2), 1983.Google Scholar

Copyright information

© British Computer Society 1993

Authors and Affiliations

  • Véronique Benzaken
    • 1
  • Christophe Lécluse
    • 2
  • Philippe Richard
    • 3
  1. 1.Université de Paris I — SorbonneParisFrance
  2. 2.BL/AISNeuilly sur seineFrance
  3. 3.Alcatel-Alsthom RechercheMarcoussisFrance

Personalised recommendations