Analysing the process of enforcing integrity constraints

View/Open
Document typeExternal research report
Defense date1996-06
Rights accessOpen Access
Abstract
Two different approaches have been traditionally considered for
dealing with the process of integrity constraints enforcement:
integrity constraints checking and integrity constraints
maintenance. However, while previous research in the first approach
has mainly addressed efficiency issues, research in the second
approach has been mainly concentrated in being able to generate all
possible repairs that falsify an integrity constraint
violation. Moreover, the methods proposed up to date are only
concerned with handling one of the approaches in an isolated manner,
without taking into account the strong relationship between the
problems to be solved in both cases. In this paper we address
efficiency issues during the process of integrity constraints
maintenance. In this sense, we propose a technique which improves
efficiency of existing methods by defining the order in which
maintenance of integrity constraints should be performed. Moreover, we
use also this technique for being able to handle in an integrated way
the integrity constraints enforcement approaches mentioned above.
CitationMayol, E., Teniente, E. "Analysing the process of enforcing integrity constraints". 1996.
Files | Description | Size | Format | View |
---|---|---|---|---|
10.1.1.47.9512.pdf | 171,7Kb | View/Open |
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder