Enforcement of Integrity Constraints in Recursive Databases
نویسنده
چکیده
Integrity constraint(ic) enforcement forms an essential component in deductive database processing. Some interesting methods which enforce integrity constraints have been proposed by Topor, Lloyd, Decker, Kowalski, Sadri, Soper, Martens, Bruynooghe, Yum and Henschen. In this thesis we further analyze and develop efficient simplification algorithms and methods for the enforcement of integrity constraints in recursive deductive databases. We combine theorem-proving methods with compilation techniques in our approach. Theorem-proving methods are used to prune the size of the integrity constraint checking space and compilation techniques are also used to derive necessary implicit modifications and evaluate the simplified integrity constraint set against the actual database. Synchronous and asynchronous chain recursions are discussed. By exploiting the hierarchical structure of a deductive database, we can precompile or partially precompile integrity constraints and ic-relevant rules to simplify integrity constraint checking and validate some modifications by static qualitative analysis. By analyzing predicate connection and variable binding, and compiling recursive rules independently, we can simplify ic-relevant queries and generate efficient checking plans. Some asynchronous and synchronous chain recursive integrity checking relevant queries can be simplified to non-recursive or simpler queries. Efficient processing algorithms are developed for integrity checking and derivation of implicit modification. To perform integrity checking against the actual database we utilize the 'affected graph' of a modification. We achieve by focusing our attention only on the part of the database which is affected by the update and relevant to integrity constraints.
منابع مشابه
Expression and Enforcement of Dynamic Integrity Constraints
The interest in consistency enforcement in the field of database and in expert systems is nowadays widespread. Special attention has been given in the literature to the subtopic of static integrity constraints. This paper centers instead on the automatic enforcement of dynamic consistency constraints, i.e. those integrity constraints that cannot be checked by solely inspecting the most recent s...
متن کاملDynamic Integrity Constraints Definition and Enforcement in Databases: A Classification Framework
A dynamic constraint expresses conditions that involve facts of two or more states of the database. Since the database is expected to satisfy such conditions, a fundamental issue about integrity constraints is their enforcement. Many methods have been developed in this respect. The purpose of this paper is to present a brief survey of methods for dynamic constraint definition and enforcement. A...
متن کاملCompiling Integrity Checking into Update Procedures
Integrity checking has been investigated extensively in the field of deductive databases. Methods have been developed to optimise the checking of an update by specialising the constraints for the information that could have been affected by it. The optimisation has been applied to sets of updates resulting from the execution of unspecified update procedures. This paper investigates the compilat...
متن کاملAnwering Recursive Queries under Keys and Foreign Keys is Undecidable
Query answering in the presence of integrity constraints is a fundamental problem in several settings, such as information integration. Keys, foreign keys and inclusion dependencies are the most common forms of constraints used in databases. It has been established recently that, in the presence of such constraints, query answering is decidable for non-recursive queries. Obviously, in the absen...
متن کاملAn Adaptable Approach for Integrity Control in Federated Database Systems
In database federations the integrity problem arises from the degree of heterogeneity and autonomy of participating component database systems. This causes integrity control more complicate than that in traditional centralized database systems. Semantic integrity should be considered in two phases: constraint federation and constraint enforcement. Otherwise, the administrators of component data...
متن کامل