Translating Advanced Integrity Checking Technology to SQL

Translating Advanced Integrity Checking Technology to SQL

Hendrik Decker (Instituto Tecnologico de Informatica, Spain)
Copyright: © 2002 |Pages: 47
DOI: 10.4018/978-1-930708-38-9.ch007
OnDemand PDF Download:


The main goal of this chapter is to arrive at a coherent technology for deriving efficient SQL triggers from declarative specifications of arbitrary integrity constraints. The user may specify integrity constraints declaratively as closed queries in predicate calculus syntax (i.e., sentences in the language of first-order logic, abbr. FOL), as datalog denials, as query conditions in SQL WHERE clauses, or in some other, possibly more user-friendly manner (e.g., via a dialog-driven graphical or natural language interface which internally translates to equivalent WHERE clause conditions). As we are going to see, the triggers derived from such specifications behave such that whenever some update event would violate any of the integrity constraints, one or several of the triggers derived from that constraint are activated in order to enforce the constraint. That is, the violation is either prevented by rolling back the update or repaired instantly by subsequent further updates.

Complete Chapter List

Search this Book:
Table of Contents
Chapter 1
Jorge H. Doorn, Laura C. Rivero, Viviana E. Ferraggine
Data properties should be seen from the point of view of being as independent as possible from the representation model. In this way, data... Sample PDF
Introduction to Database Integrity: Challenges and Solutions
Chapter 2
Laura C. Rivero, Jorge H. Doorn, Viviana E. Ferraggine
In Part I, this chapter surveys the state of the art of the semantic integrity constraints in some relational and object relational available... Sample PDF
Database Integrity: Fundamentals and Current implementations
Chapter 3
Dolores Cuadra, Carlos Nieto, Paloma Martinez, Elena Castro, Manuel Velasco
This chapter is devoted to the study of the transformation of conceptual into logical schemata in a methodological framework focusing on a special... Sample PDF
Preserving Relationship Cardinality Constraints in Relational Schemata
Chapter 4
Juan M. Ale, Mauricio Minuto Espil
This chapter surveys the interaction between active rules and integrity constraints. First, we analyze the static case following the SQL-1999... Sample PDF
Integrity Constraints in an Active Database Environment
Chapter 5
Karla A.V. Borges, Clodoveu A. Davis Jr., Alberto H.F. Laender
This chapter addresses the relationship that exists between the nature of spatial information, spatial relationships, and spatial integrity... Sample PDF
Integrity Constraints in Spatial Databases
Chapter 6
Sergio Greco, Ester Zumpano
Integrity constraints represent an important source of information about the real world. They are usually used to define constraints on data... Sample PDF
Consistent Queries Over Databases with Integrity Constraints
Chapter 7
Hendrik Decker
The main goal of this chapter is to arrive at a coherent technology for deriving efficient SQL triggers from declarative specifications of arbitrary... Sample PDF
Translating Advanced Integrity Checking Technology to SQL
Chapter 8
Jochens Rasch, Hans-Joachim Klein
The Entity-Relationship (ER) model (Chen, 1976) is frequently used for the specification of conceptual database schemas. Entity types and... Sample PDF
Functional Dependencies For Value Based Identification In Object-Oriented Databases
Chapter 9
Jose F. Aladana Montes, Mariemma I. Yague del Valle, Antonio C. Gomez Lora
Issues related to integrity in databases and distributed databases have been introduced in previous chapters. Therefore, the integrity problem in... Sample PDF
Integrity Issues in the Web: Beyond Distributed Databases
Chapter 10
Ulrich Schiel
The use of databases for advanced applications is a rapidly growing and changing field, due to the continuous incorporation of new technologies and... Sample PDF
Integrity Maintenance In Extensible Databases
About the Authors