Affiliation:
1. Instituto Tecnologico de Informatica, Spain
Abstract
The main goal of this chapter is to arrive at a coherent technology for deriving efficient SQL triggers from declarative specifications of arbitrary integrity constraints. The user may specify integrity constraints declaratively as closed queries in predicate calculus syntax (i.e., sentences in the language of first-order logic, abbr. FOL), as datalog denials, as query conditions in SQL WHERE clauses, or in some other, possibly more user-friendly manner (e.g., via a dialog-driven graphical or natural language interface which internally translates to equivalent WHERE clause conditions). As we are going to see, the triggers derived from such specifications behave such that whenever some update event would violate any of the integrity constraints, one or several of the triggers derived from that constraint are activated in order to enforce the constraint. That is, the violation is either prevented by rolling back the update or repaired instantly by subsequent further updates.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Data Consistency: Toward a Terminological Clarification;Computational Science and Its Applications -- ICCSA 2015;2015
2. Database Integrity Checking;Encyclopedia of Information Science and Technology, Second Edition;2009
3. A Relaxed Approach to Integrity and Inconsistency in Databases;Logic for Programming, Artificial Intelligence, and Reasoning;2006
4. Incremental Integrity Checking: Limitations and Possibilities;Logic for Programming, Artificial Intelligence, and Reasoning;2005
5. Efficient Integrity Checking for Databases with Recursive Views;Advances in Databases and Information Systems;2005