Checking Violation Tolerance of Approaches to Database Integrity

نویسندگان

  • Hendrik Decker
  • Davide Martinenghi
چکیده

A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption has been exploited for improving the efficiency of determining whether integrity is satisfied or violated after the update. Based on a notion of violation tolerance, we present and discuss an abstract property which, for any given approach to integrity checking, is an easy, sufficient condition to check whether the consistency assumption can be abandoned without sacrificing usability and efficiency of the approach. We demonstrate the usefulness of our definitions by showing that the theorem-proving approach to database integrity by Sadri and Kowalski, as well as several other well-known methods, can indeed afford to abandon the consistency assumption without losing their efficiency, while their applicability is vastly increased.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Integrity Checking for Uncertain Data

The uncertainty associated to stored information can be put in direct correspondence to the extent to which these data violate conditions expressed as semantic integrity constraints. Thus, imposing and checking such constraints provides a better control over uncertain data. We present and discuss a condition which ensures the violation tolerance of methods for integrity checking. Usually, such ...

متن کامل

Aucs/tr9603 Coping with Constraint Violation: the Practical Face of Database Integrity

This report describes an approach to handling violations of integrity constraints in databases which focusses on the needs of the user rather than the implementation. Traditionally, researchers have concentrated on the problems of checking constraint satisfaction , and have given little attention to how systems should behave when constraints are found to have been violated. We focus on two aspe...

متن کامل

A Relaxed Approach to Integrity and Inconsistency in Databases

We demonstrate that many, though not all integrity checking methods are able to tolerate inconsistency, without having been aware of it. We show that it is possible to use them to beneficial effect and without further ado, not only for preserving integrity in consistent databases, but also in databases that violate their constraints. This apparently relaxed attitude toward integrity and inconsi...

متن کامل

A Framework for Localizing Integrity Constraints Checking in Distributed Database

The validity, accuracy, and semantic of data are significant requirements in modern database applications. Semantic data in database is normally represented under the form of integrity constraints. Integrity constraints are properties, typically depending on the nature of the application domain, which must always be satisfied for the data to be considered consistent. Maintaining obedience of da...

متن کامل

Maintaining the Integrity Constraints of Mobile Databases with Event-Condition-Action (ECA) Rules

An important problem for a database system is to guarantee database consistency. Difficulty arises in devising an efficient algorithm for checking database integrity against updates and for maintaining the consistency of the database, which indisputable desires great attention. However, it is intricate to accomplish particularly in a distributed and mobile environment due to the nature and char...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006