Filters








54,111 Hits in 5.7 sec

Towards Semantic Integrity in Relational Databases [chapter]

Reinhardt A. Botha
2002 IFIP Advances in Information and Communication Technology  
This paper investigates activities involved to enforce semantic integrity in relational database environments, particularly those where access is controlled according to a role-based paradigm.  ...  The usefulness of data largely depends on its correctness, which is determined by the extent to which the data reflects the real-world and universe of discourse.  ...  BUILDING INTEGRITY CONSTRAINTS IN RELATIONAL DATABASES Commercial relational database technology provides a variety of mechanisms to enforce semantic integrity constraints.  ... 
doi:10.1007/978-0-387-35586-3_23 fatcat:xigjgydjtndx5fkbaixstdvmvi

Antidote SQL: Relaxed When Possible, Strict When Necessary [article]

Pedro Lopes, João Sousa, Valter Balegas, Carla Ferreira, Ségio Duarte, Annette Bieniusa, Rodrigo Rodrigues, Nuno Preguiça
2019 arXiv   pre-print
In this paper, we present Antidote SQL, a database system that allows application developers to relax SQL consistency when possible.  ...  Unlike NoSQL databases, our approach enforces primary key, foreign key and check SQL constraints even under relaxed consistency, which is sufficient for guaranteeing the correctness of many applications  ...  We extend PSI to enforce integrity constraints.  ... 
arXiv:1902.03576v1 fatcat:q3uv4gag6bfvpi6lhonmrw5wru

Confidentiality vs Integrity in Secure Databases [chapter]

Adrian Spalka, Armin B. Cremers
2002 IFIP International Federation for Information Processing  
The problem of enforcing confidentiality in the presence of integrity constraints in secure and, in particular, in multi level databases is still open.  ...  To enforce confidentiality the majority of previous works either advocates a violation of integrity or proposes pragmatically its preservation or restoration.  ...  Following her conviction that the loss of semantics can be as disastrous as the loss of confidentiality, Burns (1990a) undertakes an attempt to define a data model, the referential secrecy model, in  ... 
doi:10.1007/0-306-47008-x_18 fatcat:5qw2pckw6fckfd4wdaiq5iu7me

Page 29 of Journal of Research and Practice in Information Technology Vol. 12, Issue 1 [page]

1980 Journal of Research and Practice in Information Technology  
In addition, Zloof (1978) has had extensions defined to incorporate a limited set of semantic integrity constraints.  ...  set of integrity constraints and their expressions in a form suitable for use within Q.B.E.  ... 

Page 5372 of Mathematical Reviews Vol. , Issue 90I [page]

1990 Mathematical Reviews  
In particular, the prob- lem of when to enforce a set of integrity constraints during the execution of a transaction is addressed.  ...  The minimal integrity enforcement schedules are those integrity enforcement schedules in which every constraint is veri- fied ‘as soon as possible’.  ... 

Maintaining Database Integrity Using Data Macros In Microsoft Access

Ali Reza Bahreman, Mohammad Dadashzadeh
2013 Review of Business Information Systems (RBIS)  
Specifically, data macros remove the onerous coordination across data entry/update forms touching a base table in order to enforce semantic integrity constraints.  ...  The introduction of Data Macros in Microsoft Access 2010 addresses a major shortcoming of Access in enforcing business rules associated with a database application.  ...  The importance of the specification and enforcement of semantic integrity constraints has been recognized since the advent of the relational data model.  ... 
doi:10.19030/rbis.v17i3.7999 fatcat:rnbc6jajtjepnodp3m2al6ph5e

Maintaining integrity constraints in relational to OWL transformations

Ming Fang, Weiling Li, Rajshekhar Sunderraman
2010 2010 Fifth International Conference on Digital Information Management (ICDIM)  
In this paper, we present a para-consistent logic based method to maintain several important categories of relational integrity constraints while translating relational data into OWL.  ...  A large portion of the Semantic Web is expected to be generated from the hidden Web of relational databases.  ...  Integrity constraints are valuable in checking and enforcing data consistency, providing further semantics on data, and promoting semantic query optimization ( [15] ).  ... 
doi:10.1109/icdim.2010.5664214 dblp:conf/icdim/FangLS10 fatcat:wyz44uwf5rfx3mlt5uadjkmfv4

Semantic Integrity Constraints for Spatial Databases

Loreto Bravo, M. Andrea Rodríguez
2009 Alberto Mendelzon Workshop on Foundations of Data Management  
This paper introduces a formalization of a set of spatial semantic integrity constraints on an extended-relational database model.  ...  We study the consistency problem for this set of integrity constraints, which rises issues about topological consistency and realizability of spatial constraints.  ...  Spatial Semantic Integrity Constraints In this section we present a set of spatial semantic integrity constraints that generalizes classic integrity constraints and that are capable of dealing with spatial  ... 
dblp:conf/amw/BravoR09 fatcat:vfpopfgrzvdxjeksddd6uuwixy

Integrity control in relational database systems — an overview

Paul W.P.J. Grefen, Peter M.G. Apers
1993 Data & Knowledge Engineering  
Second, a number of projects is described that have resulted in the realization of database management systems supporting integrity constraints; the various projects are compared with respect to a number  ...  Apers, Integrity control in relational database systems -An overview, Data & Knowledge Engineering 10 (1993) 187-223.  ...  The referees of the DKE journal are thanked for their comments on the first submitted version of this paper.  ... 
doi:10.1016/0169-023x(93)90008-d fatcat:5jnsitez4fbfnhsgoqsfepc56y

Semantic integrity for persistent objects

PJ Barclay, JB Kennedy
1992 Information and Software Technology  
An implementation of this model in a persistent programming language is described, allowing exible automated dynamic integrity management for applications updating a persistent store this implementation  ...  Modelling constructs for specifying semantic integrity are reviewed, and their implicit execution semantics discussed. An integrity maintenance model based on these constructs is presented.  ...  Thus how a constraint is enforced is part of its meaning, and it is desirable for a data model to provide a variety of methods of constraint enforcement.  ... 
doi:10.1016/0950-5849(92)90147-h fatcat:qobomj64gndpjis4qo4p7avofe

Spatial data integrity constraints in object oriented geographic data modeling

Karla A. V. Borges, Alberto H. F. Laender, Clodoveu A. Davis
1999 Proceedings of the seventh ACM international symposium on Advances in geographic information systems - GIS '99  
However, it is clear that modeling geographic data requires models which are more specific and capable of capturing the semantics of geographic data.  ...  OMT model for geographic applications, at an early stage in the specification of integrity constraints in spatial databases.  ...  INTRODUCTION A number of integrity constraints must be observed when updating a database, in order to preserve the semantics and the quality of stored data [6] .  ... 
doi:10.1145/320134.320136 dblp:conf/gis/BorgesLD99 fatcat:onyfcs4wz5fsdh3ynbbztzt3ce

A Framework for Generating Query Language Code from OCL Invariants

Florian Heidenreich, Christian Wende, Birgit Demuth
2007 Electronic Communications of the EASST  
This framework allows for mapping UML models to arbitrary data schemas and for mapping OCL invariants to sentences in corresponding declarative query languages, enforcing semantical data integrity on implementation  ...  The semantical integrity of business data is of great importance for the implementation of business applications.  ...  The OCL [3] provides means to enrich models with detailed semantics in a formal way.  ... 
doi:10.14279/tuj.eceasst.9.108 dblp:journals/eceasst/HeidenreichWD08 fatcat:p3dxa5kwkncdxk3lpc2y7pt6oq

A model-integrated authoring environment for privacy policies

Andras Nadas, Tihamer Levendovszky, Ethan K. Jackson, Istvan Madari, Janos Sztipanovits
2014 Science of Computer Programming  
Models and Semantics Execution Domain 1.  Extend on previous efforts  Contextual Integrity  Stanford's Policy Formalization in Prolog  Provide a more generic toolkit  Versatile representation  ...  Goals Formal policy models are composed from the templates and ontologies. 4. Using the semantic anchors, the formal policy models can be translated for analysis or enforcement.  ... 
doi:10.1016/j.scico.2013.05.004 fatcat:j3rn45s2srb5vcxsmtr6iyfbim

Implementing Relationships and Constraints in an Object-Oriented Database Using a Monitor Construct [chapter]

Michael Doherty, Joan Peckham, Victor Fay Wolfe
1994 Workshops in Computing  
These active relationships express and enforce the constraints imposed on an object by the participation of the object in some group of related objects.  ...  By providing an automatic mapping from the semantic data model to the object-oriented database, the SORAC system provides a consistent semantic and structural view of the data.  ...  In semantic data models, integrity constraints describe the restrictions placed on an object as a result of the relationships in which that object participates.  ... 
doi:10.1007/978-1-4471-3225-7_21 dblp:conf/rules/DohertyPW93 fatcat:rnfeoxvpbzhz5o3q7lbczniiky

Data model for extensible support of explicit relationships in design databases

Joan Peckham, Bonnie MacKellar, Michael Doherty
1995 The VLDB journal  
A data model with a rich set of built-in relationship types is needed to model the complex and non-standard relationships of the ArchObjects system, because the standard semantic models are inadequate  ...  Also, much of the information that needs to be represented in a design database is procedural in nature. However, many semantic data models do not provide support for data encapsulation.  ...  The authors would like to acknowledge the help of Zhenghong Dong, Marsha Roberts, and Falguni Vora, who contributed much in the conception and implementation of the SORAC and ArchObjects prototypes.  ... 
doi:10.1007/bf01237919 fatcat:gcw25gcqgbgotfehl4jaxsgy4u
« Previous Showing results 1 — 15 out of 54,111 results