An overview of integrity constraints enforcement for a distributed database

被引:0
|
作者
Ibrahim, H [1 ]
机构
[1] Univ Putra Malaysia, Fac Comp Sci & Informat Technol, Serdang 43400, Malaysia
关键词
integrity constraints; integrity constraints enforcement; distributed database;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
An important aim of a database system is to guarantee database consistency, which means that tile data contained in a database is both accurate and valid. There are man, ways which inaccurate data may occur in a database. In this paper, we highlighted the issues related to Maintaining integrity in a distributed environment and presented the possible solutions to these issues.
引用
收藏
页码:822 / 828
页数:3
相关论文
共 50 条
  • [31] Overview of Replication Techniques on Distributed Database in Cloud Environment
    Ubaidillah, Sharifah Hafizah Sy Ahmad
    Noraziah, A.
    [J]. ADVANCED SCIENCE LETTERS, 2017, 23 (11) : 11105 - 11108
  • [32] Enforcement of entailment constraints in distributed service-based business processes
    Hummer, Waldemar
    Gaubatz, Patrick
    Strembeck, Mark
    Zdun, Uwe
    Dustdar, Schahram
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (11) : 1884 - 1903
  • [33] Simplified approach for generating integrity tests in distributed database systems
    Hanandeh, Feras
    Abdallah, Emad E.
    Abdallah, Alaa E.
    Al-Daoud, Essam
    [J]. INTERNATIONAL JOURNAL OF INNOVATION AND LEARNING, 2013, 13 (04) : 375 - 387
  • [34] Algorithms for Efficient Biometric Systems to Mitigate the Integrity of a Distributed Database
    Toapanta Toapanta, Segundo Moises
    Coca Cruz, Alvaro Andres
    Mafla Gallegos, Luis Enrique
    Orizaga Trejo, Jose Antonio
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2018), 2018, : 238 - 242
  • [35] An integrity lock architecture for supporting distributed authorizations in database federations
    Li, Wei
    Wang, Lingyu
    Zhu, Bo
    Zhang, Lei
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 189 - +
  • [36] ENFORCEMENT OVERVIEW
    JOHNSON, RM
    [J]. FOOD AND DRUG LAW JOURNAL, 1993, 48 (04): : 703 - 707
  • [37] Survivability and applicability in database constraints: Temporal boundary to data integrity scenarios
    Camolesi, L
    [J]. ITCC 2004: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 1, PROCEEDINGS, 2004, : 518 - 522
  • [38] FUNCTIONAL-DEPENDENCIES TO ENFORCE INTEGRITY CONSTRAINTS IN DATABASE MACHINE ENVIRONMENTS
    HURSON, AR
    MILLER, LL
    PAKZAD, SH
    FAN, C
    [J]. COMPUTING SYSTEMS, 1991, 6 (02): : 91 - 101
  • [39] Implementing integrity constraints of EXPRESS in an active object-oriented database
    Do, NC
    Choi, IJ
    [J]. INTERNATIONAL JOURNAL OF COMPUTER INTEGRATED MANUFACTURING, 1996, 9 (04) : 311 - 326
  • [40] Finite satisfiability of integrity constraints in object-oriented database schemas
    Formica, A
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2002, 14 (01) : 123 - 139