Checking Violation Tolerance of Approaches to Database Integrity
نویسندگان
چکیده
A hitherto unquestioned assumption made by all methods for integrity checking has been that the database satisfies its constraints before each update. This consistency assumption has been exploited for improving the efficiency of determining whether integrity is satisfied or violated after the update. Based on a notion of violation tolerance, we present and discuss an abstract property which, for any given approach to integrity checking, is an easy, sufficient condition to check whether the consistency assumption can be abandoned without sacrificing usability and efficiency of the approach. We demonstrate the usefulness of our definitions by showing that the theorem-proving approach to database integrity by Sadri and Kowalski, as well as several other well-known methods, can indeed afford to abandon the consistency assumption without losing their efficiency, while their applicability is vastly increased.
منابع مشابه
Integrity Checking for Uncertain Data
The uncertainty associated to stored information can be put in direct correspondence to the extent to which these data violate conditions expressed as semantic integrity constraints. Thus, imposing and checking such constraints provides a better control over uncertain data. We present and discuss a condition which ensures the violation tolerance of methods for integrity checking. Usually, such ...
متن کاملAucs/tr9603 Coping with Constraint Violation: the Practical Face of Database Integrity
This report describes an approach to handling violations of integrity constraints in databases which focusses on the needs of the user rather than the implementation. Traditionally, researchers have concentrated on the problems of checking constraint satisfaction , and have given little attention to how systems should behave when constraints are found to have been violated. We focus on two aspe...
متن کاملA Relaxed Approach to Integrity and Inconsistency in Databases
We demonstrate that many, though not all integrity checking methods are able to tolerate inconsistency, without having been aware of it. We show that it is possible to use them to beneficial effect and without further ado, not only for preserving integrity in consistent databases, but also in databases that violate their constraints. This apparently relaxed attitude toward integrity and inconsi...
متن کاملA Framework for Localizing Integrity Constraints Checking in Distributed Database
The validity, accuracy, and semantic of data are significant requirements in modern database applications. Semantic data in database is normally represented under the form of integrity constraints. Integrity constraints are properties, typically depending on the nature of the application domain, which must always be satisfied for the data to be considered consistent. Maintaining obedience of da...
متن کاملMaintaining the Integrity Constraints of Mobile Databases with Event-Condition-Action (ECA) Rules
An important problem for a database system is to guarantee database consistency. Difficulty arises in devising an efficient algorithm for checking database integrity against updates and for maintaining the consistency of the database, which indisputable desires great attention. However, it is intricate to accomplish particularly in a distributed and mobile environment due to the nature and char...
متن کامل