On guard: Producing run-time checks from integrity constraints

被引:0
|
作者
Benedikt, M
Bruns, G
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Software applications are inevitably concerned with data integrity, whether the data is stored in a database, files, or program memory. An integrity guard is code executed before a data update is performed. The guard returns "true" just if the update will preserve data integrity. The problem considered here is how integrity guards can be produced automatically from data integrity constraints. We seek a solution that can be applied in general programming contexts, and that leads to efficient integrity guards. In this paper we present a new integrity constraint language and guard generation algorithms that are based on a rich object data model.
引用
收藏
页码:27 / 41
页数:15
相关论文
共 50 条
  • [1] On the effectiveness of run-time checks
    van der Meulen, MJP
    Strigini, L
    Revilla, MA
    [J]. COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 151 - 164
  • [2] Static Performance Guarantees for Programs with Run-time Checks
    Klemen, Maximiliano
    Stulova, Nataliia
    Lopez-Garcia, Pedro
    Morales, Jose
    Hermenegildo, Manuel V.
    [J]. PPDP'18: PROCEEDINGS OF THE 20TH INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING, 2018,
  • [3] An Integrity Assurance Mechanism for Run-Time Programs
    Xu, Ziyao
    He, Yeping
    Deng, Lingli
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 389 - 405
  • [4] Efficient run-time monitoring of timing constraints
    Mok, AK
    Liu, GT
    [J]. THIRD IEEE REAL-TIME TECHNOLOGY AND APPLICATIONS SYMPOSIUM, PROCEEDINGS, 1997, : 252 - 262
  • [5] Efficient run-time monitoring of timing constraints
    Mok, Aloysius K.
    Liu, Guangtian
    [J]. Real-Time Technology and Applications - Proceedings, 1997, : 252 - 262
  • [6] Reducing the Overhead of Assertion Run-time Checks via Static Analysis
    Stulova, Nataliia
    Morales, Jose F.
    Hermenegildo, Manuel V.
    [J]. PROCEEDINGS OF THE 18TH INTERNATIONAL SYMPOSIUM ON PRINCIPLES AND PRACTICE OF DECLARATIVE PROGRAMMING (PPDP 2016), 2016, : 90 - 103
  • [7] Exposing uninitialized variables: Strengthening and extending run-time checks in Ada
    Dewar, R
    Hainque, O
    Craeynest, D
    Waroquiers, P
    [J]. RELIABLE SOFTWARE TECHNOLOGIES - ADA-EUROPE 2002, 2002, 2361 : 193 - 204
  • [8] Detect Compiler Inserted Run-time Security Checks in Binary Software
    Pramanick, Koyel
    Kulkarni, Prasad A.
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2022, 2022, 13620 : 268 - 286
  • [9] Toward Translating Design Constraints to Run-Time Assertions
    Baresi, Luciano
    Young, Michal
    [J]. ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2005, 116 : 73 - 84
  • [10] A flexible strategy for embedding and configuring run-time contract checks in .net components
    Edwards, Stephen H.
    Haggard, Westley
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2007, 17 (03) : 315 - 338