42,310 Hits in 6.0 sec

Implementing Relationships and Constraints in an Object-Oriented Database Using a Monitor Construct [chapter]

Michael Doherty, Joan Peckham, Victor Fay Wolfe
1994 Workshops in Computing  
These active relationships express and enforce the constraints imposed on an object by the participation of the object in some group of related objects.  ...  Semantic models have s h o wn the utility of arbitrary user-de ned relationships for de ning the semantics of database information, while objectoriented models have d e v eloped a strong paradigm for the  ...  The structure of the enforcement rules for maintaining constraints is given in 16] .  ... 
doi:10.1007/978-1-4471-3225-7_21 dblp:conf/rules/DohertyPW93 fatcat:rnfeoxvpbzhz5o3q7lbczniiky

Dynamic integrity constraints definition and enforcement in databases: a classification framework [chapter]

M. A. Pacheco Silva
1997 Integrity and Internal Control in Information Systems  
Since the database is expected to satisfy such conditions, a fundamental issue about integrity constraints is their enforcement. Many methods have been developed in this respect.  ...  The purpose of this paper is to present a brief survey of methods for dynamic constraint defmitionand enforcement. Also we classify and compare these methods with respect to several relevant features.  ...  Acknowledgements The author is very grateful to Maria Ribera Sancho, Antoni Olive, Joan Antoni Pastor, Emic Mayol and the anonymous reviewers for their useful comments and suggestions.  ... 
doi:10.1007/978-0-387-35317-3_4 fatcat:gyyz3ehp2bfghfmlodgdf6eebq

Semantic integrity for persistent objects

PJ Barclay, JB Kennedy
1992 Information and Software Technology  
is based on an event-driven architecture. persistent programming, conceptual modelling, semantic integrity, active object-oriented databases, code generation  ...  An implementation of this model in a persistent programming language is described, allowing exible automated dynamic integrity management for applications updating a persistent store this implementation  ...  for enforcing constraints in conventional database systems.  ... 
doi:10.1016/0950-5849(92)90147-h fatcat:qobomj64gndpjis4qo4p7avofe

Deriving Production Rules for Constraint Maintainance

Stefano Ceri, Jennifer Widom
1990 Very Large Data Bases Conference  
For each constraint, a production rule is used to detect constraint violation and to initiate database operations that restore consistency.  ...  We describe an SQL-based language for defining integrity constraints and a framewcrk for translating these constraints into constraint-maintaining production rules.  ...  Theorem 7.4, to She1 Finkelstein, for pointing out the correct interpretation of logical table T, and to Raymond Lorie, for suggesting the idea of constraints-to-rules translation some time ago.  ... 
dblp:conf/vldb/CeriW90 fatcat:325uaef6iff4pf63cyvgu4ibre

A Framework for Modeling, Building and Maintaining Enterprise Information Systems Software

Alexandre Cláudio de Almeida, Glauber Boff, Juliano Lopes de Oliveira
2009 2009 XXIII Brazilian Symposium on Software Engineering  
The main ideas are to focus on the conceptual modeling of the three aspects of the EIS software -application functions, business rules, and database schema -and to automatically generate code for each  ...  Rules are second class citizens, embedded on the specification of either data (as database integrity constraints) or on the EIS functions (as a part of the application software).  ...  Get rule elements: the AST previously built contains all tokens in the OCL rule. Thus, we can use this activity to visit any node in the AST and to make it available for further activities.  ... 
doi:10.1109/sbes.2009.24 dblp:conf/sbes/AlmeidaBO09 fatcat:s7euxcuo3vdt3hsamrmoz6zd7y

Data model for extensible support of explicit relationships in design databases

Joan Peckham, Bonnie MacKellar, Michael Doherty
1995 The VLDB journal  
SORAC then automatically generates C+ + code to maintain the specified enforcement rules, producing a schema that is compatible with Ontos.  ...  SORAC's set of built-in semantic relationships permits the schema designer to specify enforcement rules that maintain constraints on the object and relationship types.  ...  The authors would like to acknowledge the help of Zhenghong Dong, Marsha Roberts, and Falguni Vora, who contributed much in the conception and implementation of the SORAC and ArchObjects prototypes.  ... 
doi:10.1007/bf01237919 fatcat:gcw25gcqgbgotfehl4jaxsgy4u

On rules and integrity constraints in database systems

T.W. Ling, P.K. Teo
1992 Information and Software Technology  
These rules capture additional semantics (knowledge) for the database.  ...  Introduction Recently, several researchers have proposed incorporating rules in object-oriented database systems (OODBMSs) [6, 25, 9] .  ...  The main advantage of integrity constraints is that they define explicitly the business rules and their enforcement ensures the consistency of data in the database.  ... 
doi:10.1016/0950-5849(92)90026-l fatcat:tpqdq552pzfzbeyt3rngjo3lq4

Constraint Enforcement Through Production Rules: Putting Active Databases at Work

Stefano Ceri, Piero Fraternali, Stefano Paraboschi, Letizia Tanca
1992 IEEE Data Engineering Bulletin  
Active databases is not only an area of current research interest, but commercial vendors of database systems are providing "active" functionality to their users, e.g., via triggers and constraints.  ...  In particular, the Bulletin needed to be financed using the revenues generated from the TCDE sponsored activities. The then TCDE Chair also resigned in June.  ...  References Acknowledgment We thank Jennifer Widom for giving us the opportunity of testing our ideas in the context of the Starburst Production Rule System.  ... 
dblp:journals/debu/CeriFPT92 fatcat:l25qkyc7rbawjpgj4z3r366l4y

OCL2Trigger: Deriving active mechanisms for relational databases using Model-Driven Architecture

Harith T. Al-Jumaily, Dolores Cuadra, Paloma Martínez
2008 Journal of Systems and Software  
Transforming integrity constraints into active rules or triggers for verifying database consistency pro duces a serious and complex problem related to real time behaviour that must be considered for any  ...  Our main contribution to this work is to provide a complete approach for deriving the active mechanisms for Relational Databases from the specification of the integrity constraints by using OCL.  ...  In some works, such as Ceri and Widom (1990) , a general framework is described for transforming constraints into active rules for constraint maintenance.  ... 
doi:10.1016/j.jss.2008.04.027 fatcat:2ivgve2lubd6pdyo4efbdaxezq

Practical Applications of Triggers and Constraints: Success and Lingering Issues (10-Year Award)

Stefano Ceri, Roberta Cochrane, Jennifer Widom
2000 Very Large Data Bases Conference  
Stefano and Jennifer are grateful to IBM Almaden for providing a stimulating environment for their joint work in active databases, and to Bruce Lindsay, Hamid Pirahesh, and especially Bobbie Cochrane for  ...  all their great work in making constraints and triggers a reality in practice (and in helping us assemble this paper).  ...  Some headway has been made in this direction for business rules [Ros97] , but primarily applying to business rules that effectively enforce integrity constraints.  ... 
dblp:conf/vldb/CeriCW00 fatcat:q4lakzt2bfge5lv2fyfshensey

Domain Centered Design Support [chapter]

Fatma Mili, Krish Narayanan
1998 Globalization of Manufacturing in the Digital Communications Era of the 21st Century  
In this paper we discuss mechanisms for integrating domain knowledge within design databases in ways that make it most effective for the designer, and most accessible for review and update.  ...  Explicit representation of the aggregation relationship enables a whole range of inferences and constraint enforcement by the system. 300 propagation of changes to designs while preserving compliance with  ...  Not all object constraints can be automatically enforced.  ... 
doi:10.1007/978-0-387-35351-7_24 fatcat:lckgdmjhlnhezpb2fg7aerudjy

Automatic Generation of Update Rules to Enforce Consistency Constraints in Design Databases [chapter]

James Brawner, Bonnie MacKellar, Joan Peckham, James Vorbach
1998 Data Mining and Reverse Engineering  
Typically, update rules are specified to maintain integrity constraints. In this paper, we concentrate on the automatic generation of update rules from integrity constraints.  ...  Enforcing such constraints in the face of user-initiated changes to the database is necessary to ensure that the database is consistent and the corresponding design is valid.  ...  For each class in the schema, the methods are automatically augmented to enforce the schema constraints.  ... 
doi:10.1007/978-0-387-35300-5_16 fatcat:slzpt2g2nfa2jdxjj3lsr5zs2a

Rules and Patterns for Security in Workflow Systems [chapter]

Silvana Castano, Maria Grazia Fugini
1999 Database Security XII  
A basie set of rules is provided in the abstraeted form of authorization patterns which are generic rule skeletons to be properly instantiated to enforce authorization constraints in a given WF application  ...  Seeurity rules (or triggers) specify which actions (e.g., seeurity warnings, logs, audit actions) should be taken when a security violation (event) oecurs, following the EeA paradigm of active databases  ...  Fabio Casati who collaborated in revising security rules and Dr. Angelica Tescaro who collaborated to part of this work during her degree thesis.  ... 
doi:10.1007/978-0-387-35564-1_4 fatcat:x4thzscfhrf3xc455dpovimr3m

CDOL: A comprehensive declarative object language

Susan D. Urban, Anton P. Karadimce, Suzanne W. Dietrich, Taoufik Ben Abdellatif, Hon Wai Rene Chan
1997 Data & Knowledge Engineering  
CDOL provides sublanguages for the expression of derived data, constraints, updates and active rules.  ...  In particular, active rules can be used to supplement declarative updates to maintain database consistency with respect to the set of integrity constraints.  ...  Acknowledgments We would like to thank Amy Sundermier, Michael Tschudi, Lorena Gomez and Michael Tjahjadi of the A-DOOD (Active, Deductive, Object-Oriented Databases) research group for their careful review  ... 
doi:10.1016/s0169-023x(96)00041-9 fatcat:5dy526xixvdgtkast5kumymt2e


Xu Chen, Yun Mao, Z. Morley Mao, Jacobus Van der Merwe
2009 Proceedings of the 2nd ACM SIGCOMM workshop on Programmable routers for extensible services of tomorrow - PRESTO '09  
DECOR models router configuration and any generic network status as relational data in a conceptually centralized database.  ...  The rulebased language in DECOR provides the flexible programmability to specify and enforce network-wide management constraints, and achieve high-level task scheduling.  ...  Such enforcement mechanisms are automatically generated from the policies by DECOR.  ... 
doi:10.1145/1592631.1592647 dblp:conf/sigcomm/ChenMMM09 fatcat:ix72vyqvpvejrgdpm64tvimmke
« Previous Showing results 1 — 15 out of 42,310 results