An Algorithm for Determining Related Constraints
Constraints are a class of business rules that many organisations implement in their information systems. However, it is common that many implemented constraints do not get documented. This has led researchers to consider how to recover constraints from implementations. In this paper, we consider the problem of how to analyse the set of constraints extracted from legacy systems. More specifically, we introduce an algorithm for determining which constraints are related according to some criteria. Since constraints are typically fragmented during their implementation, the ability to determine a set of related constraints is useful and important to the comprehension of extracted constraints.
KeywordsReverse Engineering Constraint Business Rule Constraint Analysis
Unable to display preview. Download preview PDF.
- 3.A. Borgida, R. J. Brachman, D. L. McGuinness, and L. A. Resnick. Classic: A Structural Data Model for Objects. In SIGMOD Conference, pages 58–67, 1989.Google Scholar
- 6.J. A. Chudziak, H. Rybinski, and J. Vorbach. Towards a Unifying Logic Formalism for Semantic Data Models. In Proceedings of 12th International Conference on the Entity-Relationship Approach, pages 492–507, 1993.Google Scholar
- 7.S. Embury and J. Shao. Assisting the Comprehension of Legacy Transactions. In Proceedings of Second International Workshop of Data Reverse Engineering, 2001.Google Scholar
- 8.G. Fu. Comprehension of Constraint Business Rule Extracted from Legacy Systems. Brulee project techniqual report, Department of Computer Science, Cardiff University, 2000.Google Scholar
- 9.G. Fu, J. Shao, S.M. Embury, and W.A. Gray. Representing Constraint Business Rules Extracted from Legacy Systems. Submitted for Publication, Department of Computer Science, Cardiff University, 2002.Google Scholar
- 11.R.M. Gregor. The Evolving Technology of Classification-Based Knowledge Representation Systems. In J. Sowa, editor, Principle of Semantic Networks. 1991.Google Scholar
- 12.D. Hay and K. Healy. Defining Business Rules-What are They Really. Guide Business Rule Project Report, 1996.Google Scholar
- 13.H. Huang, W. Tsai, and et al. Business Rule Extraction from Legacy Code. Technical Report TR 95-034, Department of Computer Science and Engineering, University of Minnesota, 1995.Google Scholar
- 14.P. McBrien, A.H. Seltveit, and B. Wangler. Rule Based Specification of Information Systems. In Proceedings of the International Conference on Information Systems and Management of Data, pages 212–228, 1994.Google Scholar
- 15.M. Morgenster. Constraint Equations: Declarative Expression of Constraints with Automatic Enforcement. In Proceedings of 10th International Conference on Very Large Data Bases, pages 291–300, 1984.Google Scholar
- 16.ORM. UML 2.0 OCL RFP. Available online http://www.omg.org/techprocess/meetings/schedule/uml_2.0_ocl_rfp.html, 2002.
- 17.P. Ruttan. Recovering Business Rules to Enable Legacy Transformation. Technical report, Netron Inc., 1999.Google Scholar
- 18.J. Shao, X. Liu, G. Fu, S. Embury, and W. Gray. Querying Data-Intensive Programs for Data Design. In proceeding of 13th International Conference for Advanced information System Engineering (CAiSE’01), 2001.Google Scholar
- 19.J. Shao and C. Pound. Reverse Engineering Business Rules from Legacy System. BT Journal, 17(4), 1999.Google Scholar
- 21.S. Urban. ALICE: An Assertion Language for Integrity Constraint Expression. In Proceedings of the 13th Annual Conference on Computer Software and Application, pages 292–299, 1989.Google Scholar