1989
DOI: 10.1145/68012.68014
|View full text |Cite
|
Sign up to set email alerts
|

Automatic verification of database transaction safety

Abstract: Maintainingthe integrity of databases is one of the promises of database management systems. This includes assuring that integrity constraints are invariants of database transactions. This is very difficult to accomplish efficiently in the presence of complex constraints and large amounts of data. One way to minimize the amount of processing required to maintain database integrity over transaction processing is to prove at compile-time that transactions cannot, if run atomically, disobey integrity constraints.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
35
0

Year Published

1995
1995
2003
2003

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 93 publications
(35 citation statements)
references
References 16 publications
0
35
0
Order By: Relevance
“…Since semantic integrity control usually involves queries on large amounts of data, two kinds of optimization techniques have been proposed: first, to prove at compile-time that update transactions cannot violate certain given integrity constraints [4,15,30], and second to reduce the complexity of the remaining queries at run-time [17,31,32,33]. While the strategies for run-time integrity control optimization focus on query simplification for integrity checks, our protocol focuses on the concurrent execution of integrity checks.…”
Section: Relation To Other Work and Our Focusmentioning
confidence: 99%
“…Since semantic integrity control usually involves queries on large amounts of data, two kinds of optimization techniques have been proposed: first, to prove at compile-time that update transactions cannot violate certain given integrity constraints [4,15,30], and second to reduce the complexity of the remaining queries at run-time [17,31,32,33]. While the strategies for run-time integrity control optimization focus on query simplification for integrity checks, our protocol focuses on the concurrent execution of integrity checks.…”
Section: Relation To Other Work and Our Focusmentioning
confidence: 99%
“…Our verification framework is inspired by the pioneering work of Sheard and Stemple [27], which applies automated theorem proving techniques to the verification of transaction safety in the context of relational databases. Our work address a number of issues that do not arise in relational databases, such as object sharing, object creation, inheritance and heterogeneity.…”
Section: Related Work and Extensionsmentioning
confidence: 99%
“…A large number of different issues has been covered, for instance semantic integrity constraints design [23], transaction correctness w.r.t. integrity constraint [24][25][26] and repair of constraint violation [27,28]. For active databases, compiling constraints into ECA rules has been investigated [29][30][31].…”
Section: Related Workmentioning
confidence: 99%