Concurrency control and recovery in database systems
Concurrency control and recovery in database systems
Extending a relational database with deferred referential integrity checking and intelligent joins
SIGMOD '89 Proceedings of the 1989 ACM SIGMOD international conference on Management of data
Conflict detection tradeoffs for replicated data
ACM Transactions on Database Systems (TODS)
A critique of ANSI SQL isolation levels
SIGMOD '95 Proceedings of the 1995 ACM SIGMOD international conference on Management of data
The dangers of replication and a solution
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
A new approach to developing and implementing eager database replication protocols
ACM Transactions on Database Systems (TODS)
Group communication specifications: a comprehensive study
ACM Computing Surveys (CSUR)
Using Versions in Update Transactions: Application to Integrity Checking
VLDB '97 Proceedings of the 23rd International Conference on Very Large Data Bases
Semantic Integrity Dependencies and Delayed Integrity Checking
VLDB '82 Proceedings of the 8th International Conference on Very Large Data Bases
Exploiting Atomic Broadcast in Replicated Databases (Extended Abstract)
Euro-Par '97 Proceedings of the Third International Euro-Par Conference on Parallel Processing
Exploiting Atomic Broadcast in Replicated Databases
Euro-Par '98 Proceedings of the 4th International Euro-Par Conference on Parallel Processing
The VLDB Journal — The International Journal on Very Large Data Bases
Improving the Scalability of Fault-Tolerant Database Clusters
ICDCS '02 Proceedings of the 22 nd International Conference on Distributed Computing Systems (ICDCS'02)
RepWeb: replicated Web with referential integrity
Proceedings of the 2003 ACM symposium on Applied computing
Atomic writes for data integrity and consistency in shared storage devices for clusters
Future Generation Computer Systems - Special issue: Advanced services for clusters and internet computing
Comparison of Database Replication Techniques Based on Total Order Broadcast
IEEE Transactions on Knowledge and Data Engineering
Middleware based data replication providing snapshot isolation
Proceedings of the 2005 ACM SIGMOD international conference on Management of data
Making snapshot isolation serializable
ACM Transactions on Database Systems (TODS)
Database Replication Using Generalized Snapshot Isolation
SRDS '05 Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems
MIDDLE-R: Consistent database replication at the middleware level
ACM Transactions on Computer Systems (TOCS)
Managing Transaction Conflicts in Middleware-based Database Replication Architectures
SRDS '06 Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
NCA '08 Proceedings of the 2008 Seventh IEEE International Symposium on Network Computing and Applications
Integrity Dangers in Certification-Based Replication Protocols
OTM '08 Proceedings of the OTM Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: 2008 Workshops: ADI, AWeSoMe, COMBEK, EI2N, IWSSA, MONET, OnToContent + QSI, ORM, PerSys, RDDS, SEMELS, and SWWS
MADIS: a slim middleware for database replication
Euro-Par'05 Proceedings of the 11th international Euro-Par conference on Parallel Processing
Hi-index | 0.00 |
Current middleware database replication protocols take care of read-write conflict evaluation. If there are no such conflicts, protocols sanction transactions to commit. Other conflicts may arise due to integrity violation. So, if, in addition to the consistency of transactions and replicas, also the consistency of integrity constraints is to be supported, some more care must be taken. Some classes of replication protocols are able to seamlessly deal with the integrity support of the underlying DBMS, but others are not. In this paper, we analyze the support for integrity that can be provided in various classes of replication protocols. Also, we propose extensions for those that cannot directly manage certain kinds of constraints that are usually supported in DBMSs.