Well-behaving rule systems for entity-relationship and object oriented models
Integrity Maintenance is considered one of the major application fields of rule triggering systems (RTSs). In the case of a given integrity constraint being violated by a database transaction these systems trigger repairing actions. However, it has been shown that for any set of constraints there exist unrepairable transactions, which depend on the closure of the constraint set. Even if unrepairable transactions are excluded, this does not restrain the RTS from producing undesired behaviour.
Analyzing the behaviour of RTSs leads to the definition of critical paths in associated rule hypergraphs and the requirement of such paths being absent. It is shown that this requirement can be satisfied if the underlying set of constraints is stratified and that this is always the case for the structural constraints in Entity-Relationship and object oriented models. Moreover, in both cases there is no ambiguity for the selection of rules.
KeywordsConstraint Violation Database State Relation Symbol Oriented Model Object Oriented Model
Unable to display preview. Download preview PDF.
- 1.M. A. Casanova, R. Fagin, C. H. Papadimitriou. Inclusion dependencies and their interaction with functional dependencies. Journal of Computer and System Sciences 28 (1), 29–59, 1984.Google Scholar
- 2.S. Ceri, J. Widom: Deriving Production Rules for Constraint Maintenance, Proc. 16th Conf. on VLDB, Brisbane (Australia), August 1990, 566–577Google Scholar
- 3.S. Ceri, P. Fraternali, S. Paraboschi, L. Tanca: Automatic Generation of Production Rules for Integrity Maintenance. ACM ToDS, vol. 19(3), 1994, 367–422.Google Scholar
- 4.S. Chakravarty, J. Widom (Eds.): Research Issues in Data Engineering — Active Databases, Proc., Houston, Februar 1994Google Scholar
- 5.A. K. Chandra, M. Y. Vardi. The implication problem for functional and inclusion dependencies is undecidable. SIAM Journal of Computing 14, 671–677, 1985.Google Scholar
- 6.S. S. Cosmadakis, P. Kanellakis, M. Y. Vardi. Polynomial-time implication problems for unary inclusion dependencies. Journal of the ACM 37, 15–46, 1990.Google Scholar
- 7.M. Gertz, U. W. Lipeck: Deriving Integrity Maintaining Triggers from transaction Graphs, in Proc. 9th ICDE, IEEE Computer Society Press, 1993, 22–29Google Scholar
- 8.H. Mannila, K.-J. Räihä: The Design of Relational Databases, Addison-Wesley 1992Google Scholar
- 9.J. Reinert. Ambiguity for referential integrity is undecidable. In G. Kuper, M. Wallace (Eds.). Constraint databases and applications, 132–147, Springer LNCS 1034, 1996.Google Scholar
- 10.K.-D. Schewe, B. Thalheim: Consistency Enforcement in Active Databases, in S. Chakravarty, J. Widom (Eds.): Research Issues in Data Engineering — Active Databases, Proc., Houston, Februar 1994Google Scholar
- 11.K.-D. Schewe and B. Thalheim. Fundamental concepts of object oriented databases. Acta Cybernetica, vol. 11(1/2), Szeged 1993, 49–84.Google Scholar
- 12.K.-D. Schewe, B. Thalheim: Active Consistency Enforcement for Repairable Database Transitions, in S.Conrad, H. J. Klein, K.-D. Schewe (Eds.): Integrity in Databases, Proc. 6th Int. Workskop on Foundations of Models and Languages for Data and Objects, Schloß Dagstuhl, 1996, 87–102, available via http://wwwiti.cs.uni-magdeburg.de/≈conrad/IDB96/Proceedings.htmlGoogle Scholar
- 13.B. Thalheim: Foundations of entity-relationship modeling, Annals of Mathematics and Artificial Intelligence, vol. 7, 1993, 197–256Google Scholar
- 14.S. D. Urban, L. Delcambre, Constraint Analysis: a Design Process for Specifying Operations on Objects, IEEE Trans. on Knowledge and Data Engineering, vol. 2 (4), December 1990Google Scholar
- 15.J. Widom, S. J. Finkelstein: Set-oriented Production Rules in Relational Database Systems, in Proc. SIGMOD 1990, 259–270Google Scholar