A Generalisation of Entity and Referential Integrity in RelationalDatabasesShort title : Entity and Referential Integrity in Relational
نویسنده
چکیده
Entity and referential integrity are the most fundamental constraints that any relational database should satisfy. We re-examine these fundamental constraints in the context of incomplete relations, which may have null values of the types \value exists but is unknown" and \value does not exist". We argue that in practice the restrictions that these constraints impose on the occurrences of null values in relations are too strict. We justify a generalisation of the said constraints wherein we use key families, which are collections of attribute sets of a relation schema, rather than keys, and foreign key families which are collections of pairs of attribute sets of two relation schemas, rather than foreign keys. Intuitively, a key family is satis ed in an incomplete relation if each one of its tuples is uniquely identi able on the union of the attribute sets of the key family, in all possible worlds of the incomplete relation, and, in addition, is distinguishable from all the other tuples in the incomplete relation by its nonnull values on some element in the key family. Our proposal can be viewed as an extension of Thalheim's key set, which only deals with null values of type \value exists but is unknown". The intuition behind the satisfaction of a foreign key family in an incomplete database is that each pair (Fi; Ki) of attribute sets in the foreign key family takes the foreign key attribute values over Fi of a tuple in one incomplete relation referencing the key attribute values over Ki of a tuple in another incomplete relation. Such referencing is de ned only in the case when the foreign key attribute values do not have any null values of the type \value does not exist"; we insist that the referencing be de ned for at least one such pair. We also investigate some combinatorial properties of key families, and show that they are comparable to the standard combinatorial properties of keys.
منابع مشابه
A Teaching Note on Demonstrating the Ambiguity of ERDs with Respect to Referential Integrity
A limitation of entity relationship diagram (ERD) notation in representing referential integrity (RI) is discussed. Several examples are used to illustrate both the limitations of the ERD and the variety of RI issues in SQL. This paper suggests that confusion is created by conflating the ERD model with the relational model. A modest suggestion for clarification is proposed for inclusion in a da...
متن کاملPath Support for Referential Integrity in SQL
The relational model of data incorporates fundamental assertions for entity integrity and referential integrity. Recently, these so-called relational invariants were more precisely specified by the new SQL2 standard. Accordingly, they have to be guaranteed by a relational DBMS to its users and, therefore, all issues of semantics and implementation became very important. The specification of ref...
متن کاملThe semantics of an extended referential integrity for a multilevel secure relational data model
To prevent information leakage in multilevel secure data models, the concept of polyinstantiation was inevitably introduced. Unfortunately, when it comes to references through foreign key in multilevel relational data models, the polyinstantiation causes referential ambiguities. To resolve this problem, this paper proposes an extended referential integrity semantics for a multilevel relational ...
متن کاملIntegrity Theory for Resource Space Model and Its Application
The Resource Space Model (RSM) is a semantic data model based on orthogonal classification semantics for effectively managing various resources in interconnection environment. In parallel with the integrity theories of relational and XML-based data models, this keynote presents the integrity theory for the RSM, including the entity integrity constraints based on the key system of the RSM, the m...
متن کاملThe SeaView Security
A multilevel database is intended to provide the security needed for database systems that contain data at a variety of classifications and serve a set of users having different clearances. This paper describes a formal security model for a such a system. The model is formulated in two layers, one corresponding to a reference monitor that enforces mandatory security, and the second an extension...
متن کامل