Translating Advanced Integrity Checking Technology to SQL

H. Decker
{"title":"Translating Advanced Integrity Checking Technology to SQL","authors":"H. Decker","doi":"10.4018/978-1-930708-38-9.CH007","DOIUrl":null,"url":null,"abstract":"INTRODUCTION The main goal of this chapter is to arrive at a coherent technology for deriving efficient SQL triggers from declarative specifications of arbitrary integrity constraints. The user may specify integrity constraints declaratively as closed queries in predicate calculus syntax (i.e., sentences in the language of first-order logic, abbr. FOL), as datalog denials, as query conditions in SQL WHERE clauses, or in some other, possibly more user-friendly manner (e.g., via a dialog-driven graphical or natural language interface which internally translates to equivalent WHERE clause conditions). As we are going to see, the triggers derived from such specifications behave such that whenever some update event would vi late any of the integrity constraints, one or several of the triggers derived from that constraint are activated in order to enforce the constraint. That is, the violation is either prevented by rolling back the update or repaired instantly by subsequent further updates. In this chapter, we describe how to implement advanced datalog technology for integrity checking in the framework of SQL. That is, we show how to represent and evaluate arbitrarily complex constraints in SQL without incurring major disadvantages usually associated to integrity checking in knowledge-rich applications. Error-prone procedural specification and laborious maintenance of integrity constraints is avoided by the declarativity of datalog. The cost of evaluation is considerably reduced by an automated","PeriodicalId":405229,"journal":{"name":"Database Integrity","volume":"113 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Database Integrity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-930708-38-9.CH007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 20

Abstract

INTRODUCTION The main goal of this chapter is to arrive at a coherent technology for deriving efficient SQL triggers from declarative specifications of arbitrary integrity constraints. The user may specify integrity constraints declaratively as closed queries in predicate calculus syntax (i.e., sentences in the language of first-order logic, abbr. FOL), as datalog denials, as query conditions in SQL WHERE clauses, or in some other, possibly more user-friendly manner (e.g., via a dialog-driven graphical or natural language interface which internally translates to equivalent WHERE clause conditions). As we are going to see, the triggers derived from such specifications behave such that whenever some update event would vi late any of the integrity constraints, one or several of the triggers derived from that constraint are activated in order to enforce the constraint. That is, the violation is either prevented by rolling back the update or repaired instantly by subsequent further updates. In this chapter, we describe how to implement advanced datalog technology for integrity checking in the framework of SQL. That is, we show how to represent and evaluate arbitrarily complex constraints in SQL without incurring major disadvantages usually associated to integrity checking in knowledge-rich applications. Error-prone procedural specification and laborious maintenance of integrity constraints is avoided by the declarativity of datalog. The cost of evaluation is considerably reduced by an automated
将高级完整性检查技术转换为SQL
本章的主要目标是从任意完整性约束的声明性规范中获得高效SQL触发器的一致技术。用户可以声明性地将完整性约束指定为谓词微积分语法中的关闭查询(即,一阶逻辑语言中的句子,缩写为FOL),作为数据拒绝,作为SQL WHERE子句中的查询条件,或者以其他一些可能更友好的方式(例如,通过对话驱动的图形或自然语言界面,其内部翻译为等效的WHERE子句条件)。正如我们将要看到的,从这些规范派生的触发器的行为是这样的:每当某个更新事件会延迟任何完整性约束时,就会激活从该约束派生的一个或几个触发器,以强制执行该约束。也就是说,可以通过回滚更新来防止违规,或者通过后续的进一步更新立即修复违规。在本章中,我们描述了如何在SQL框架中实现高级数据技术来进行完整性检查。也就是说,我们展示了如何在SQL中表示和评估任意复杂的约束,而不会产生通常与知识丰富的应用程序中的完整性检查相关的主要缺点。数据的声明性避免了容易出错的过程规范和费力的完整性约束维护。评估的成本通过一个自动化的
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信