Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/602259.602262acmconferencesArticle/Chapter ViewAbstractPublication PagesmodConference Proceedingsconference-collections
Article
Free access

Design and implementation of an extendible integrity subsystem

Published: 01 June 1984 Publication History

Abstract

Tnls paper presents a powerful integrrty subsystem, which is implemented in the SABRE database system. The specification language is simple. Tne enforcement algorithm is general, in particular, it handles referential dependency and temporal assertions. Specialized strategies efficiently treat each class of assertions. The system automatically manages integrity checkpoints. Also, an efficient method is described for processing assertions involving aggregates. An analysis exhibits the value of the algorithms. It 1s shown that, in general, this method is better than the query modification method for domain assertions. Measures have also been done for giving the cost added for controlling integrity in comparison with the cost of the request itself.

References

[1]
{ASTB76} M M Astrahan et al "System R Relational approach to database management" PubL ACM-TODS Vol 1, June 1976
[2]
{BERN92} P Bernstein, B Blaustein "Fast methods for testing quantified relational calculus assertions" Proc ACM-SIGMOD Conf, Orlando Florida June 1982
[3]
{BLAU81} B Blaustein "Enforcing database assertions Techniques and applications" Ph D Harvard University, August 1981
[4]
{BROD78} M Brodis "Specification and verification of database semantic integrity" Ph D Toronto University, March 1978
[5]
{CREM83} A Cremers, G. Domann "AIM An integrity monitor for the database system INGRES" Proc. VLDB Conf., Florence Nov. 1983
[6]
{DATE81}C J Date "Referential integrity" Proc. 7th VLDB Conf, Cannes Sept 1983
[7]
{GARD79} G Gardarin, H melkanoff "Proving consistency of data base transactions" Proc 5th VLDB Conf, Tokyo Sept 1979
[8]
{GARD83} G Gardarin, P Bernadat, N Temmerman, P Valduriez, Y Viemont "Deergn of a Multiprocessor Relational Databaea System" IFIP* 9th World Computer Congress, Paris, September 1983
[9]
{GARD84} G Gardarin, P Valduriez, Y. Viemont "Predicate Trees" To appear in Proc of the Computer Engineering Conference, IEEE Ed, Los Angeles, April 1984
[10]
{HAMM75} H Hammer, D J McLeod "Semantic integrity in a relational database system" Proc 1st VLDB, Framingham 1975.
[11]
{HAMM78} M Hammer,S K Sarin "Efficient monitoring of data base assertions" Proc ACM-SIGMOD Conf, Austin June 1978.
[12]
{NICO82} J M Nicolas "Logic for improving Integrity checking in relational data bases" Acta Informatica, July 1982
[13]
{SIMO84} E Simon, P Valduriez "Design and implementation of an extendible integrity subsystem" Research Report No 271, INRIA-Rocquencourt, Feb 1984
[14]
{STON75} M Stonebraker "Implementation of integrity constraints and views by query modification" Proc ACM-SIGMOD Conf, San Jose, 1975
[15]
{VALD84} P Valduriez, G Gardarin "Join and Semi-Join Algorithms for Multiprocessor Database Machine" To appear in ACM-TODS, Vol 9, No 1, March 1984
[16]
{VIEM82} Y Viemont, G Gardarin "A Distributed Concurrency Control ALgorithm Based on Transaction Commit Ordering" 12th Int Conf on FTCS, Los Angeles, June 1982

Cited By

View all
  • (2016)Horizontal partitioning method for test verification in parallel database systemsInternational Journal of Advanced Intelligence Paradigms10.1504/IJAIP.2017.0811829:1(96-106)Online publication date: 1-Jan-2016
  • (2005)SICSDD: Techniques and implementationConstraint Databases and Applications10.1007/3-540-62501-1_32(187-207)Online publication date: 3-Jun-2005
  • (2005)Database schema evolution through the specification and maintenance of changes on entities and relationshipsEntity-Relationship Approach — ER '94 Business Modelling and Re-Engineering10.1007/3-540-58786-1_77(132-151)Online publication date: 8-Jun-2005
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
SIGMOD '84: Proceedings of the 1984 ACM SIGMOD international conference on Management of data
June 1984
339 pages
ISBN:0897911288
DOI:10.1145/602259
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 1984

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Acceptance Rates

Overall Acceptance Rate 785 of 4,003 submissions, 20%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)35
  • Downloads (Last 6 weeks)11
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2016)Horizontal partitioning method for test verification in parallel database systemsInternational Journal of Advanced Intelligence Paradigms10.1504/IJAIP.2017.0811829:1(96-106)Online publication date: 1-Jan-2016
  • (2005)SICSDD: Techniques and implementationConstraint Databases and Applications10.1007/3-540-62501-1_32(187-207)Online publication date: 3-Jun-2005
  • (2005)Database schema evolution through the specification and maintenance of changes on entities and relationshipsEntity-Relationship Approach — ER '94 Business Modelling and Re-Engineering10.1007/3-540-58786-1_77(132-151)Online publication date: 8-Jun-2005
  • (2004)Reducing Disruption in Time-Tabled Condition MonitoringIntegrity and Internal Control in Information Systems VI10.1007/1-4020-7901-X_11(159-176)Online publication date: 2004
  • (1995)Parallel execution of integrity constraint checksProceedings of the fourth international conference on Information and knowledge management10.1145/221270.221336(82-89)Online publication date: 2-Dec-1995
  • (1993)Combining Theory and Practice in Integrity ControlProceedings of the 19th International Conference on Very Large Data Bases10.5555/645919.758362(581-591)Online publication date: 24-Aug-1993
  • (1993)Deriving integrity maintaining triggers from transition graphsProceedings of IEEE 9th International Conference on Data Engineering10.1109/ICDE.1993.344081(22-29)Online publication date: 1993
  • (1992)PRISMA/DBIEEE Transactions on Knowledge and Data Engineering10.1109/69.1806054:6(541-554)Online publication date: 1-Dec-1992
  • (1991)Semantic Modeling of Object Oriented DatabasesProceedings of the 17th International Conference on Very Large Data Bases10.5555/645917.672308(3-14)Online publication date: 3-Sep-1991
  • (1991)Integrity Constraint Enforcement through Transaction ModificationDatabase and Expert Systems Applications10.1007/978-3-7091-7555-2_61(362-367)Online publication date: 1991
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media