Advertisement

Integrating Database and Programming Language Constraints

  • Oded Shmueli
  • Mukund Raghavachari
  • Vivek Sarkar
  • Rajesh Bordawekar
  • Michael G. Burke
Conference paper
  • 304 Downloads
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2921)

Abstract

We examine the maintenance of data consistency in the presence of application-database interactions. Currently, a programmer must insert explicit checks to ensure that data are consistent with respect to the application’s and the database’s requirements. This explicit hand-coding of integrity constraint checks is error-prone and results in less maintainable code when the integrity constraints on the application or the database change. We describe an architecture for automatically generating application-level checks from application and database integrity constraint specifications. We focus on EJB-database interactions as a concrete context for our work, but our results are applicable to other programming language-database interactions.

Keywords

Object Constraint Language Integrity Constraint Employee Relation Disjunctive Normal Form Domain Constraint 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Banerjee, U.: Dependence analysis for supercomputing. Kluwer Academic, Boston (1988)Google Scholar
  2. 2.
    Bernstein, P.A., Blaustein, B.T.: Fast methods for testing quantified relational calculus assertions. In: Proceedings of SIGMOD, June 1982, pp. 39–50 (1982)Google Scholar
  3. 3.
    Bernstein, P.A., Blaustein, B.T., Clarke, E.M.: Fast maintenance of semantic integrity assertions using redundant aggregate data. In: Proceedings of VLDB, October 1980, pp. 126–136 (1980)Google Scholar
  4. 4.
    Bernstein, P.A., Hadzilacos, V., Goodman, N.: Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading (1987)Google Scholar
  5. 5.
    Bodik, R., Gupta, R., Sarkar, V.: ABCD: eliminating array bounds checks on demand. In: Proceedings of PLDI, pp. 321–333 (2000)Google Scholar
  6. 6.
    Brucker, A., Wolff, B.: Checking OCL constraints in distributed component based systems. Technical Report 157, Institut fur Informatik, Universitat Freiburg (2001)Google Scholar
  7. 7.
    Gray, J., Reuter, A.: Transaction Processing: Concepts and Techniques. Morgan Kaufmann, San Francisco (1993)zbMATHGoogle Scholar
  8. 8.
    Grefen, P., Widom, J.: Integrity constraint checking in federated databases. In: Proceedings of the Intl. Conf. on Cooperative Information Systems (1996)Google Scholar
  9. 9.
    Gupta, A., Sagiv, Y., Ullman, J.D., Widom, J.: Constraint checking with partial information. In: Proceedings of PODS, pp. 45–55 (1994)Google Scholar
  10. 10.
    Gupta, A., Widom, J.: Local verification of global integrity constraints. In: Proceedings of SIGMOD, June 1993, pp. 49–58 (1993)Google Scholar
  11. 11.
    Hopcroft, J., Ullman, J.: Introduction to Automata Theory, Languages and Computation. Addison-Wesley, Reading (1979)zbMATHGoogle Scholar
  12. 12.
    A. N. S. Institute. Information technology—database languages—SQL. ANSI X3.135-1992 (1992) Google Scholar
  13. 13.
    Jagadish, H.V., Qian, X.: Integrity maintenance in an object-oriented database. In: Proceedings of VLDB, pp. 469–480 (1982)Google Scholar
  14. 14.
    Kline, K.E., Kline, D.L.: SQL in a Nutshell. O’Reilly and Associates, Inc., Sebastopol (2001)zbMATHGoogle Scholar
  15. 15.
    Maier, D.: The Theory of Relational Databases. Computer Science Press, Rockville (1983)zbMATHGoogle Scholar
  16. 16.
    Muchnick, S.: Advanced Compiler Design and Implementation. Morgan Kaufmann, San Francisco (1997)Google Scholar
  17. 17.
    Roos, R.M.: Java Data Objects. Addison-Wesley, Reading (2002)Google Scholar
  18. 18.
    Sceppa, D.: The Microsoft ADO.NET (Core Reference). Microsoft Press, Redmond (2002)Google Scholar
  19. 19.
    Sun Microsystems, Inc. Enterprise Java Beans Technology, http://www.javasoft.com/j2ee
  20. 20.
    Warmer, J., Kleppe, A.: The Object Constraint Language, Precise Modeling with UML. Addison-Wesley, Reading (1999)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Oded Shmueli
    • 1
  • Mukund Raghavachari
    • 1
  • Vivek Sarkar
    • 1
  • Rajesh Bordawekar
    • 1
  • Michael G. Burke
    • 1
  1. 1.IBM T.J. Watson Research CenterYorktown HeightsUSA

Personalised recommendations