Skip to main content

Integrity Constraint Enforcement by Means of Trigger Templates

  • Conference paper
  • First Online:
Advances in Information Systems (ADVIS 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2457))

Included in the following conference series:

Abstract

The specification of data integrity controls in DBMS, and particularly support for triggers, is one of the most important features for database developers and administrators. However, it is recognized that the specification of a correct set of triggers is a difficult and errorprone task. Our proposal aims to facilitate such a task by suggesting a different method for determining constraints and triggers that check constraints when database updates take place. Specifically, the method proposes to define trigger templates in order to enforce constraints imposed in a schema pattern and to store them in a database. When the analyst specifies a particular conceptual schema (which matches the schema pattern) the associated triggers are automatically generated from the information stored in the trigger template database.

This work has been partially supported by DGES, projects TIC2000-1368-C03-01 and PB-96-0098-C04-01, and by University of Zaragoza, project UZ-00-TEC-04.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Van Baelen, J. Lewi, E. Steegmans, B. Swennen, Constraints in Object-Oriented Analysis, in S. Nishio, A. Yonezama (Eds.), Object Technologies for Advanced Software, LNCS 742, Springer-Verlag, 1993, 393–407.

    Google Scholar 

  2. S. Ceri, R. J. Cochrane, J. Widom, Practical Applications of Triggers and Constraints: Successes and Lingering Issues, Proceedings of the 26th International Conference on VLDB, 2000, 254–262.

    Google Scholar 

  3. S. Ceri, P. Fraternali, S. Paraboshi, L. Tanca, Automatic Generation of Production Rules for Integrity Maintenance, ACM TODS, 19, 3, 1994, 367–422.

    Article  Google Scholar 

  4. S. Ceri, J. Widom, Deriving Production Rules for Constraint Maintenance, Proceedings of the 16th International Conference on VLDB, 1990, 566–577.

    Google Scholar 

  5. I. A. Chen, R. Hull, D. McLeod, An execution model for limited ambiguity rules and its application to derived data update, ACM TODS, 20, 4, 1995, 365–413.

    Article  Google Scholar 

  6. D. Dey, V. C. Storey, T. M. Barron, Improving Database Design through the Analysis of Relationships, ACM TODS, 24, 4, 1999, 453–486.

    Article  Google Scholar 

  7. C. Fahrner, G. Vossen, A Survey of Database Design Transformations Based on the Entity-Relationship Model, Data & Knowledge Engineering, 15, 1995, 213–250.

    Article  MATH  Google Scholar 

  8. M. Gogolla, An Extended Entity-Relationship Model, LNCS 767, Springer-Verlag.

    MATH  Google Scholar 

  9. M. Gertz, Specifying Reactive Integrity Control for Active Databases, Proceedings of RIDE’94, 62–70

    Google Scholar 

  10. D. Lee, W. Mao, W. W. Chu, TBE: Trigger-By-Example, Conceptual Modeling—ER 2000, LNCS 1920, Springer, 2000, 112–125.

    Chapter  Google Scholar 

  11. S. Maabout, Maintaining and Restoring Database Consistency with Update Rules, Workshop Dynamics’98 (postconference of the workshop JICLSP98), 1998.

    Google Scholar 

  12. E. Mayol, E. Teniente, A Survey of Current Methods for Integrity Constraint Maintenance and View Updating, in P. P. Chen, D. W. Embley, J. Kouloumdjian, S. W. Liddle, J. F. Roddick (Eds.) ER’ 99-Workshop on Evolution and Change in Data Management, LNCS 1727, Springer, 1999, 62–73.

    Google Scholar 

  13. M. Richters, M. Gogolla. On formalizing the UML Object Constraint Language OCL, in T. W. Ling, S. Ram, M. L. Lee (Eds.) Conceptual Modeling-ER’98, Springer, 1998, 449–464

    Google Scholar 

  14. K. D. Schewe, Consistency Enforcement in Entity-Relationship and Object-Oriented Models, Data & Knowledge Engineering, 28, 1, 1998, 121–140.

    Article  MATH  Google Scholar 

  15. C. Turker, M. Gertz, Semantic Integrity Support in SQL-99 and Commercial (Object-) Relational Database Management Systems, U. C. Davis Computer Science Technical Report CSE-2000-11, 2001.

    Google Scholar 

  16. S. Urman, Oracle8 PL/SQL Programming, Oracle Press, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Domínguez, E., Lloret, J., Zapata, M.A. (2002). Integrity Constraint Enforcement by Means of Trigger Templates. In: Yakhno, T. (eds) Advances in Information Systems. ADVIS 2002. Lecture Notes in Computer Science, vol 2457. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36077-8_6

Download citation

  • DOI: https://doi.org/10.1007/3-540-36077-8_6

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00009-9

  • Online ISBN: 978-3-540-36077-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics