A relational model of data for large shared data banks
Communications of the ACM
Implementation of integrity constraints and views by query modification
SIGMOD '75 Proceedings of the 1975 ACM SIGMOD international conference on Management of data
High level domain definition in a relational date base system
Proceedings of the 1976 conference on Data : Abstraction, definition and structure
SEQUEL: A structured English query language
SIGFIDET '74 Proceedings of the 1974 ACM SIGFIDET (now SIGMOD) workshop on Data description, access and control
Implementation of a compiler for a semantic data model: Experiences with taxis
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
VLDB '89 Proceedings of the 15th international conference on Very large data bases
Database description with SDM: a semantic database model
ACM Transactions on Database Systems (TODS)
Extended semantics for generalization hierarchies
SIGMOD '78 Proceedings of the 1978 ACM SIGMOD international conference on management of data
The semantic data model: a modelling mechanism for data base applications
SIGMOD '78 Proceedings of the 1978 ACM SIGMOD international conference on management of data
SIGMOD '84 Proceedings of the 1984 ACM SIGMOD international conference on Management of data
Set Restrictions for Semantic Groupings
IEEE Transactions on Knowledge and Data Engineering
Finite Satisfiability of Integrity Constraints in Object-Oriented Database Schemas
IEEE Transactions on Knowledge and Data Engineering
Knowledge-based Integrity Constraint Validation
VLDB '86 Proceedings of the 12th International Conference on Very Large Data Bases
SEDL—A language for specifying integrity constraints on office forms
Proceedings of the SIGOA conference on Office information systems
Proceedings of the 1980 workshop on Data abstraction, databases and conceptual modeling
Towards constructive axiomatic specifications
Proceedings of the 1980 workshop on Data abstraction, databases and conceptual modeling
Meta-database architecture for relational DBMS
ACM SIGMOD Record
Database semantic integrity for a network data manager
AFIPS '80 Proceedings of the May 19-22, 1980, national computer conference
Monitoring data structures using hardware transactional memory
RV'11 Proceedings of the Second international conference on Runtime verification
An overview of recent data base research
ACM SIGMIS Database
Hi-index | 0.00 |
A structured framework is provided for describing the semantic integrity requirements of a data base. The semantic integrity of a data base is said to be violated when the data base ceases to represent a legitimate configuration of the application domain it is intended to model. In the context of the relational data model, it is possible to identify multiple levels of semantic integrity information. Relation constraints comprise one such level; they express the semantic information not contained in the structure of the relations nor in the identity of their underlying domains. The three components of a relation constraint are considered: (1) the assertion (a predicate on the state of the data base or on transitions between data base states), (2) the validity requirement (the occasion(s) at which the assertion must hold), and (3) the violation-action (the action that is to occur if the assertion does not hold at a time when it should). A framework for relation constraints is presented. Details of a structured classification scheme are outlined. This scheme is intended to form a basis for a high level, well-directed, and disciplined methodology for the design of relational data bases. Emphasis is placed on the assertion component of relation constraints. Assertions are viewed as more than expressions of some relationship among different values in a data base; assertions single out the data that is constrained, and state the properties that this data must possess. A classification is provided of the various predicate types used to identify constrained data and to state the properties which they are to possess. Approaches to the relation constraint assertion specification process are discussed.