Declarative Taxonomic Constraint Enforcement in Conceptual Schemas (Extended Version)
نویسندگان
چکیده
We propose to declaratively specify policies for the enforcement of taxonomic integrity constraints directly in the structural conceptual schema. These policies depend on the kind of constraint to be enforced (disjointness, covering or specialization) and on the particular event that may cause its violation. We provide a formal definition of these policies and of the repair actions that must be considered to ensure constraint enforcement. Those repairs may then be generated automatically by a repair process that is guaranteed to terminate. Our work eases conceptual modelling since defining taxonomic constraint enforcement declaratively allows omitting its specification from the external events in the behavioural conceptual schema.
منابع مشابه
Constraint Equations: Declarative Expression of Constraints With Automatic Enforcement
Constraint Equations provide a concise declarative language for expressing semantic constraints that require consistency among several relations. Each constraint is independently specified in application based terms and provides a natural extension to the limited semantics captured by typical schemata. Automatic constraint enforcement is accomplished by compilation of the Equations into executa...
متن کاملUnderstanding Constraint Expressions in Large Conceptual Schemas by Automatic Filtering
Human understanding of constraint expressions (also called schema rules) in large conceptual schemas is very difficult. This is due to the fact that the elements (entity types, attributes, relationship types) involved in an expression are defined in different places in the schema, which may be very distant from each other and embedded in an intricate web of irrelevant elements. The problem is i...
متن کاملSpecifying Reactive Integrity Control for Active Databases
Recent approaches to integrity enforcement in active databases suggest not only to check constraint violations by triggers but also to utilize triggers to perform inconsistency repair actions. However, for sophisticated reactions these approaches often require refinements of already derived integrity maintaining and inconsistency repairing triggers. We argue that analyzing and specifying reacti...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کامل