Enforcing integrity constraints to preserve data accuracy in business applications

被引:0
|
作者
Lupsoiu, Constantin [1 ]
Boboila, Cristea [1 ]
机构
[1] Univ Craiova, Fac Math & Comp Sci, RO-200585 Craiova, Romania
关键词
relational databases; integrity constraints; functional dependency; multivalued dependency; join dependency;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Integrity constraints represent a method of ensuring that database updates do not result in data inconsistencies. For business applications in particular, the accuracy of the data is important. Therefore, we need strong guarantees that the information stored in the database system is not tempered with. This paper presents some algorithms for testing the integrity constraints given by the functional, join and multivalued dependencies. Since the update operations are costly, the algorithms described take into consideration efficiency requirements.
引用
收藏
页码:79 / 84
页数:6
相关论文
共 50 条
  • [1] Modeling and Enforcing Integrity Constraints on Graph Databases
    Reina, Fabio
    Huf, Alexis
    Presser, Daniel
    Siqueira, Frank
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, DEXA 2020, PT I, 2020, 12391 : 269 - 284
  • [2] Enforcing Request Integrity in Web Applications
    Jayaraman, Karthick
    Lewandowski, Grzegorz
    Talaga, Paul G.
    Chapin, Steve J.
    [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXIV, PROCEEDINGS, 2010, 6166 : 225 - 240
  • [3] Enforcing Constraints on Life Cycles of Business Artifacts
    Zhao, Xiangpeng
    Su, Jianwen
    Yang, Hongli
    Qiu, Zongyan
    [J]. THIRD INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING, PROCEEDINGS, 2009, : 111 - +
  • [4] LogicFence: A framework for enforcing global integrity constraints at runtimei
    Guha, Shibashis
    Srinivasa, Srinath
    Mukherjee, Saikat
    Malakar, Ranajoy
    [J]. 10TH INTERNATIONAL DATABASE ENGINEERING AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 2006, : 97 - 104
  • [5] SIF: Enforcing confidentiality and integrity in web applications
    Chong, Stephen
    Vikrarn, K.
    Myers, Andrew C.
    [J]. USENIX ASSOCIATION PROCEEDINGS OF THE 16TH USENIX SECURITY SYMPOSIUM, 2007, : 1 - 16
  • [6] Enforcing Usage Constraints on Credentials for Web Applications
    Hu, Jinwei
    Mantel, Heiko
    Ruhleder, Sebastian
    [J]. ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, 2015, 455 : 112 - 125
  • [7] Data integrity and integrity constraints in databases
    Valeanu, Madalina
    Moldovan, Grigor
    [J]. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2006, 1 : 470 - 473
  • [8] Enforcing compliance of hierarchical business process with visual security constraints
    Duan, Li
    Zhang, Yang
    Sun, Chang-ai
    Chen, Junliang
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2018, 9 (03) : 703 - 715
  • [9] AN EFFICIENT HASH ALGORITHM TO PRESERVE DATA INTEGRITY
    Sodhi, Gurpreet K.
    Gaba, Gurjot S.
    [J]. JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2018, 13 (03) : 778 - 789
  • [10] Securing software by enforcing data-flow integrity
    Castro, Miguel
    Costa, Manuel
    Harris, Tim
    [J]. Usenix Association 7th Usenix Symposium on Operating Systems Design and Implementation, 2006, : 147 - 160