Advertisement

Modeling semantic integrity constraints in object-oriented database schemas

  • Anna Formica
  • Michele Missikoff
Part III: Complex Objects
Part of the Lecture Notes in Computer Science book series (LNCS, volume 701)

Abstract

Recent years have witnessed a continuous evolution of database models towards richer and more expressive paradigms. Along the line of enriching the modeling capabilities, Object-Oriented databases (OODBs) have been introduced. In this paper, we propose a further enhancement to OODB models aiming at enriching the database schema by explicitly declaring semantic integrity constraints therein.

In the paper, we present an Object-Oriented data definition language, referred to as TQL. It allows the construction of an OODB schema using the well known data structuring mechanisms, such as NF2 attributes, complex types, and multiple inheritance in class (type) hierarchies. In addition, TQL allows the further enrichment of the schema by expressing explicit integrity constraints. The proposal includes the definition of the formal semantics of TQL, according to a denotational approach, and the notion of correctness of schemas, with particular emphasis on the legality of ISA hierarchies. The proposed language is the basis of the prototype MOSAICO, an environment for the design and rapid prototyping of OODB applications developed at IASI.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    S.Abiteboul, C.Beeri; “On the power of Languages for Manipulating Complex Objects”; International Workshop on Theory and Applications of Nested Relations and Complex Objects; Darmstadt, 1987.Google Scholar
  2. 2.
    R.Agrawal, N.H.Gehani; “ODE (Object Database and Environment): The Language and the Data Model”; Proc. of ACM SIGMOD 89 Conference; 1989.Google Scholar
  3. 3.
    P. Asirelli, P. Inverardi, A. Mustaro; “Improving Integrity Constraint Checking in Deductive Databases”; Lecture Notes in Computer Science 326, 72–86, ICDT'88; 1988.Google Scholar
  4. 4.
    S.Abiteboul, P.C.Kanellakis; “Object Identity as a Query Language Primitive”; SIGMOD '89; 1989.Google Scholar
  5. 5.
    P.Atzeni, L.Tanca; “The LOGIDATA+ model and language”; Next Generation Information Systems Technology, LCNS 504, Springer Verlag, 1991.Google Scholar
  6. 6.
    M.Atkinson, F.Bancilhon, D.DeWitt, K.Dittrich, D.Maier, S.Zdonik; “The Object-Oriented Database System Manifesto”; Technical Report, Altair 30–89, 1989.Google Scholar
  7. 7.
    J.Banerjee, H.Chou, J.F.Garza, W.Kim, D.Woelk, N.Ballou; “Data Model Issues for Object-Oriented Applications“; Readings in Database Systems, M.Stonebraker (Ed.), Morgan Kaufmann Pub., 1988.Google Scholar
  8. 8.
    F.Bancilhon; “Object-Oriented Database Systems”; 7th ACM SIGACT-SIGMOD-SIGART Symp. on Principles of database Systems; 1988.Google Scholar
  9. 9.
    C.Beeri; “A formal approach to object-oriented databases”; Data & Knowledge Engineering 5; 353–382; North-Holland, 1990.Google Scholar
  10. 10.
    R.J.Brachman, H.J.Levesque; “The tractability of Subsumption in Frame-Based Description Languages”; Proc. of National Conference on Artificial Intelligence — AAAI 84, 34–37; Austin, 1984.Google Scholar
  11. 11.
    E. Bertino, D. Musto; “Correctness of Semantic Integrity Checking in Database Management Systems”; Acta Informatica 26, 25–57; 1988.Google Scholar
  12. 12.
    L.Cardelli; “A Semantics of Multiple Inheritance”; Lecture Notes in Comp. Science, No. 173, Springer Verlag; 1984.Google Scholar
  13. 13.
    J.Cohen; “Constraint Logic Programming”; Communications of the ACM; Vol.33, No.7; July 1990.Google Scholar
  14. 14.
    S.Ceri, J.Widom; “Deriving Production Rules for Constraint Maintenance”; Proc. of the 16th VLDB Conference; Brisbane, Australia 1990.Google Scholar
  15. 15.
    D. Fishman et al.; “Iris: an object-oriented database management system”; ACM TOIS 5(1), 46–69, 1987.Google Scholar
  16. 16.
    A.Formica, M.Missikoff; “Materialization of recursive objects in Object-Oriented Databases”; Proc. of the Ninth International Symposium Applied Informatics; Innsbruck, 1991.Google Scholar
  17. 17.
    A.Formica, M.Missikoff; “Adding Integrity Constraints to Object-Oriented Database”; ISMM First International Conference on Information and Knowledge Management (CIKM-92), Baltimore, November 1992.Google Scholar
  18. 18.
    A.Formica, M.Missikoff, S.Vazzana; “An Object-Oriented Data Model for Artificial Intelligence Applications”; Next Generation Information Systems Technology, LNCS 504, Springer Verlag, 1991.Google Scholar
  19. 19.
    H.Gallaire et al.; “Logic and Databases: A Deductive Approach”; Computing Surveys; vol.16, n.2; June 1984.Google Scholar
  20. 20.
    R.Gernert, N.Greif; “Modelling of Complex Objects and Semantic Integrity Constraints in Product Databases”; Informatik Informationem — Report No.2/1990; Berlin 1990.Google Scholar
  21. 21.
    N.Gehani, H.V.Jagadish, “Ode as an Active Database: Constraints and Triggers”, Proc. of the 17th VLDB Conference, Barcelona, Sept. 1991.Google Scholar
  22. 22.
    R. Kowalski, F.Sadri, P.Soper; “Integrity Checking In Deductive Databases”; Proc. of the 13th VLDB Conference; 61–69, Brighton; 1987.Google Scholar
  23. 23.
    G.M.Kuper, M.Y.Vardi; “A New Approach to Database Logic”; Proc. of ACM Symposium on Principles on Database Systems, 1984.Google Scholar
  24. 24.
    C. Lassez; “Constraint Logic Programming”; BYTE, 171–176, August 1987.Google Scholar
  25. 25.
    H.Lam, M.Missikoff; “Mosaico: A Specification and Rapid Prototyping Environment for Object-Oriented Database Applications”; Technical Note December 1992.Google Scholar
  26. 26.
    C.Lecluse, P.Richard; “The O2 database programming language”; Proc. of VLDB '89 Conference; Amsterdam, 1989.Google Scholar
  27. 27.
    C.Lecluse, P.Richard; “Modeling Complex Structures in Object-Oriented Databases”; Proc. of ACM PODS Conference; 1989.Google Scholar
  28. 28.
    C.Lecluse, P.Richard, F.Velez; “O2: an Object-Oriented Data Model”; Proc. of ACM SIGMOD Conference: Chicago, 1988.Google Scholar
  29. 29.
    G.Moerkotte, S.Karl; “Efficient Consistency Control in Deductive Databases”; Lecture Notes in Computer Science 326, 118–128, ICDT'88; 1988.Google Scholar
  30. 30.
    D.Maier, A.Otis, A.Purdy; “Development of an object-oriented dbms”; Quart. Bull. IEEE Database Engineering 8, 1985.Google Scholar
  31. 31.
    A. Motro; “Integrity = Validity + Completeness”; ACM Transactions on Database Systems, Vol.14, No.4, 480–502; December 1989.Google Scholar
  32. 32.
    M.Missikoff, S.Vazzana; “OOL: an Object Oriented Language for Knowledge Representation”; Proc. of IV International Symposium on Knowledge Engineering, Barcelona, May 1990.Google Scholar
  33. 33.
    T.Sheard, D.Stemple; “Automatic Verification of Database Transaction Safety”; Proc. of ACM TODS, Vol.14, No.3; September 1989.Google Scholar
  34. 34.
    S.D. Urban, L.M.L. Delcambre; “Constraint Analysis: a Design Process for Specifying Operations”; Transactions on Knowledge and Data Engineering; March 1991.Google Scholar
  35. 35.
    J.D.Ullman; “Principles of Database and Knowledge-base Systems”; vol.I; Computer Science Press; 1988.Google Scholar
  36. 36.
    S.D. Urban; “ALICE: An Assertion Language for Integrity Constraint Expression”; COMPSAC Proceedings; Orlando, September 1989.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1993

Authors and Affiliations

  • Anna Formica
    • 1
  • Michele Missikoff
    • 1
  1. 1.IASI CNRRomeItaly

Personalised recommendations