Abstract
A declarative mediator language, based upon operations among logic theories is introduced. In particular we concentrate on the constraint operator. The denotational semantics of the language is introduced together with the definition of a bottom-up efficient implementation. The use of the constraint operator for security within a mediator architecture for database integration is suggested and presented by means of a simple example.
Chapter PDF
Similar content being viewed by others
References
Abitebul,S. Hull,R. and Vianu, V. (1995) Foundations of Databases,Addison Wesley.
Aquilino, D. Asirelli, P. Renso, C. and Turini, F. (1995) An Operator for Composing Deductive Databases with Theories of Constraints, in Proc. of Logic programming and Non-Monotonic Reasoning ‘85, Lecture Notes in Computer Science, 928, Springer-Verlag, Berlin.
Aquilino, D. Asirelli, P. Renso, C. and Turini, F. (1997) Applying Restriction Constraints to Deductive Databases, In Non-determinism in Deductive Databases, (ed. D. Pedreschi and V.S. Subrahmaniam), Annals of Mathematics and Artificial Intelligence, 19 (1,2), 3–25.
Aquilino, D. Asirelli, P. Formuso, A. Renso, C. and Turini, F. (1996), Using MedLan to Integrate Geographical Data, accepted for publication on JLP.
Asirelli, P. and Renso, C. (1997) The Constraint Operator in the
MedLan Language, Compulog Network area Constraint Programming and ERCIM Working Group on Constraints, Joint Workshop in conjunction with the CP97 Conference -Linz, Austria,http://repl.iei.pi.cnr.it/people/asirelli/Publications/EWGC - 297.html.
Asirelli, P. Renso, C. and Turini, F. (1996) Language Extensions for Semantic Integration of Deductive Databases, Proc. of the International Workshop on Logic In Databases (LID’96), Lecture Notes in Computer Science, 1154, Springer-Verlag, Berlin.
Bertino, E. Jajodia, S. and Samarati, P. (1995) Database security: Research and practice, Information Systems, 20 (7), 537–556.
Bonatti, P. A. Kraus, S. and Subrahmanian, V. S. (1995) Foundations of Secure Deductive Databases, IEEE Transaction on Knowledge and Data Engineering, 7 (3) 406–422.
Brogi, A. Mancarella, P. Pedreschi, D. and Turini, F. (1994) Modular Logic Programming, ACM Transactions on Programming Languages and Systems, 16 (4), 1361–1398.
Brogi, A. (1993) Program Construction in Computational Logic Ph.D. Thesis at University of Pisa.
Brogi,A. Renso, C. and Turini, F. (1997) Dynamic Composition of Parameterized Logic Programs, “Submitted for publication”
Bertino, E. Samarati, P. and Jajodia, S. (1997) An Extended Authorization Model for Relational Databases, IEEE Transaction on Knowledge and Data Engineering, 9 (1), 85–100.
Candan, K. S. Jajodia, S. and Subrahmanian, V. S. (1996) Secure Mediated Databases, International Conference on Data Engineering 1996, 28–37.
Jajodia, S. (1996a) Database security and privacy, ACM Computing Surveys, 50th anniversary commemorative issue, 28 (1).
Jajodia, S. (1996b) Managing Security and Privacy of Information, ACM Computing Surveys, 28 (4es), 129–131.
Jajodia, S. and Samarati, P., Subrahmanian, V.S. and Bertino, E. (1997) A Unified Framework for Enforcing Multiple Access Control Policies, ACM SIGMOD.
Hull R. (1997), Managing Semantic Heterogeneity in Databases: A Theoretical Perspective, Can be found in http://www-db.research.belllabs.com/user/hull/pods97-tutorial.html
Lu, J. J. Moerkotte, G. Schue, J. and Subrahmanian, V. S. (1995) Efficient Maintenance of Materialized Mediated Views, SIGMOD Conference 1995, 340–351.
Papakostantinou, Y., Garcia-Molina, H. and Ullman, J. (1996) MedMaker: A mediation System Based on Declarative Specifications, International Conference on Data Engineering.
Renso, C. (1998) Mechanisms for Semantic Integration of Deductive Databases, Ph.D. Thesis, University of Pisa, May 1998.
Subrahmanian, V. S. (1994) Amalgamating Knowledge Bases, Transaction On Database System, 19 (2), 291–331.
van Emden, M. H. and Kowalski,R. A. (1976) The semantics of predicate logic as a programming language, Journal of the ACM, 23 (4), 733–742.
Wiederhold G. (1992), Mediators in the Architecture of Future Information Systems, IEEE Computer, 25, 38–49.
Wiederhold, G., Bilello, M., Sarathy, V. and Qian XiaoLei (1996a) A Security Mediator for Health Care Information, AMIA, Proc. of the 1996 AMIA Conf., 120–124.
Wiederhold, G., Bilello, M., Sarathy, V. and Qian XiaoLei (1996b) Protecting Collaboration, Proc. of the NISSC’96.
Ullman, J. (1988) Principles of Database and Knowledge-Base Systems,Computer Science Press.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Asirelli, P., Renso, C., Turini, F. (1998). The Constraint Operator of MedLan: its efficient implementation and use. In: Jajodia, S., List, W., McGregor, G.W., Strous, L.A.M. (eds) Integrity and Internal Control in Information Systems. IICIS 1998. IFIP — The International Federation for Information Processing, vol 9. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35396-8_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-35396-8_3
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-5533-6
Online ISBN: 978-0-387-35396-8
eBook Packages: Springer Book Archive