A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is
IFIP Advances in Information and Communication Technology
This paper investigates activities involved to enforce semantic integrity in relational database environments, particularly those where access is controlled according to a role-based paradigm. ... The usefulness of data largely depends on its correctness, which is determined by the extent to which the data reflects the real-world and universe of discourse. ... BUILDING INTEGRITY CONSTRAINTS IN RELATIONAL DATABASES Commercial relational database technology provides a variety of mechanisms to enforce semantic integrity constraints. ...doi:10.1007/978-0-387-35586-3_23 fatcat:xigjgydjtndx5fkbaixstdvmvi
In this paper, we present Antidote SQL, a database system that allows application developers to relax SQL consistency when possible. ... Unlike NoSQL databases, our approach enforces primary key, foreign key and check SQL constraints even under relaxed consistency, which is sufficient for guaranteeing the correctness of many applications ... We extend PSI to enforce integrity constraints. ...arXiv:1902.03576v1 fatcat:q3uv4gag6bfvpi6lhonmrw5wru
IFIP International Federation for Information Processing
The problem of enforcing confidentiality in the presence of integrity constraints in secure and, in particular, in multi level databases is still open. ... To enforce confidentiality the majority of previous works either advocates a violation of integrity or proposes pragmatically its preservation or restoration. ... Following her conviction that the loss of semantics can be as disastrous as the loss of confidentiality, Burns (1990a) undertakes an attempt to define a data model, the referential secrecy model, in ...doi:10.1007/0-306-47008-x_18 fatcat:5qw2pckw6fckfd4wdaiq5iu7me
In addition, Zloof (1978) has had extensions defined to incorporate a limited set of semantic integrity constraints. ... set of integrity constraints and their expressions in a form suitable for use within Q.B.E. ...
In particular, the prob- lem of when to enforce a set of integrity constraints during the execution of a transaction is addressed. ... The minimal integrity enforcement schedules are those integrity enforcement schedules in which every constraint is veri- fied ‘as soon as possible’. ...
Specifically, data macros remove the onerous coordination across data entry/update forms touching a base table in order to enforce semantic integrity constraints. ... The introduction of Data Macros in Microsoft Access 2010 addresses a major shortcoming of Access in enforcing business rules associated with a database application. ... The importance of the specification and enforcement of semantic integrity constraints has been recognized since the advent of the relational data model. ...doi:10.19030/rbis.v17i3.7999 fatcat:rnbc6jajtjepnodp3m2al6ph5e
In this paper, we present a para-consistent logic based method to maintain several important categories of relational integrity constraints while translating relational data into OWL. ... A large portion of the Semantic Web is expected to be generated from the hidden Web of relational databases. ... Integrity constraints are valuable in checking and enforcing data consistency, providing further semantics on data, and promoting semantic query optimization (  ). ...doi:10.1109/icdim.2010.5664214 dblp:conf/icdim/FangLS10 fatcat:wyz44uwf5rfx3mlt5uadjkmfv4
This paper introduces a formalization of a set of spatial semantic integrity constraints on an extended-relational database model. ... We study the consistency problem for this set of integrity constraints, which rises issues about topological consistency and realizability of spatial constraints. ... Spatial Semantic Integrity Constraints In this section we present a set of spatial semantic integrity constraints that generalizes classic integrity constraints and that are capable of dealing with spatial ...dblp:conf/amw/BravoR09 fatcat:vfpopfgrzvdxjeksddd6uuwixy
Second, a number of projects is described that have resulted in the realization of database management systems supporting integrity constraints; the various projects are compared with respect to a number ... Apers, Integrity control in relational database systems -An overview, Data & Knowledge Engineering 10 (1993) 187-223. ... The referees of the DKE journal are thanked for their comments on the first submitted version of this paper. ...doi:10.1016/0169-023x(93)90008-d fatcat:5jnsitez4fbfnhsgoqsfepc56y
An implementation of this model in a persistent programming language is described, allowing exible automated dynamic integrity management for applications updating a persistent store this implementation ... Modelling constructs for specifying semantic integrity are reviewed, and their implicit execution semantics discussed. An integrity maintenance model based on these constructs is presented. ... Thus how a constraint is enforced is part of its meaning, and it is desirable for a data model to provide a variety of methods of constraint enforcement. ...doi:10.1016/0950-5849(92)90147-h fatcat:qobomj64gndpjis4qo4p7avofe
However, it is clear that modeling geographic data requires models which are more specific and capable of capturing the semantics of geographic data. ... OMT model for geographic applications, at an early stage in the specification of integrity constraints in spatial databases. ... INTRODUCTION A number of integrity constraints must be observed when updating a database, in order to preserve the semantics and the quality of stored data  . ...doi:10.1145/320134.320136 dblp:conf/gis/BorgesLD99 fatcat:onyfcs4wz5fsdh3ynbbztzt3ce
This framework allows for mapping UML models to arbitrary data schemas and for mapping OCL invariants to sentences in corresponding declarative query languages, enforcing semantical data integrity on implementation ... The semantical integrity of business data is of great importance for the implementation of business applications. ... The OCL  provides means to enrich models with detailed semantics in a formal way. ...doi:10.14279/tuj.eceasst.9.108 dblp:journals/eceasst/HeidenreichWD08 fatcat:p3dxa5kwkncdxk3lpc2y7pt6oq
Models and Semantics Execution Domain 1. Extend on previous efforts Contextual Integrity Stanford's Policy Formalization in Prolog Provide a more generic toolkit Versatile representation ... Goals Formal policy models are composed from the templates and ontologies. 4. Using the semantic anchors, the formal policy models can be translated for analysis or enforcement. ...doi:10.1016/j.scico.2013.05.004 fatcat:j3rn45s2srb5vcxsmtr6iyfbim
Workshops in Computing
These active relationships express and enforce the constraints imposed on an object by the participation of the object in some group of related objects. ... By providing an automatic mapping from the semantic data model to the object-oriented database, the SORAC system provides a consistent semantic and structural view of the data. ... In semantic data models, integrity constraints describe the restrictions placed on an object as a result of the relationships in which that object participates. ...doi:10.1007/978-1-4471-3225-7_21 dblp:conf/rules/DohertyPW93 fatcat:rnfeoxvpbzhz5o3q7lbczniiky
The VLDB journal
A data model with a rich set of built-in relationship types is needed to model the complex and non-standard relationships of the ArchObjects system, because the standard semantic models are inadequate ... Also, much of the information that needs to be represented in a design database is procedural in nature. However, many semantic data models do not provide support for data encapsulation. ... The authors would like to acknowledge the help of Zhenghong Dong, Marsha Roberts, and Falguni Vora, who contributed much in the conception and implementation of the SORAC and ArchObjects prototypes. ...doi:10.1007/bf01237919 fatcat:gcw25gcqgbgotfehl4jaxsgy4u
« Previous Showing results 1 — 15 out of 54,111 results