Distributed Enforcement of Integrity Constraints

被引:0
|
作者
Boris Dahav
Opher Etzion
机构
[1] Technion--Israel Institute of Technology,
[2] IBM--Haifa Research Lab,undefined
[3] Matam,undefined
来源
关键词
distributed databases; database exception handling; self-stabilization in databases; distributed rules systems;
D O I
暂无
中图分类号
学科分类号
摘要
This paper deals with distributed transactions that employ self-stabilization in the sense that the transaction is possibly extended by corrective actions (“stabilizers”) to repair violated integrity constraints. The implementation of such an extended distributed transaction is discussed in both macro (inter-transaction) and micro (intra-transaction) aspects. In the macro level we discuss the distributed stabilizers execution protocol, the relationship with the 2PC algorithm (“the reinfection problem”) and cooperative constraint evaluation and transaction termination. The Micro-level issues discussed relate to the interaction among different stabilizers. Three different alternative protocols are discussed: the basic S-Lock protocol, the extended S-Lock protocol, and the cluster graph based protocol. These protocols are compared and discussed. The paper concludes with discussion of some general properties such as:determinism and termination.
引用
收藏
页码:227 / 249
页数:22
相关论文
共 50 条
  • [41] Specification and enforcement of classification and inference constraints
    Dawson, S
    di Vimercati, SD
    Samarati, P
    [J]. PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 181 - 195
  • [42] Integrity for distributed queries
    di Vimercati, Sabrina De Capitani
    Foresti, Sara
    Jajodia, Sushil
    Livraga, Giovanni
    Paraboschi, Stefano
    Samarati, Pierangela
    [J]. 2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 364 - 372
  • [43] Principles of Data Flow Integrity: Specification and Enforcement
    Ramezanifarkhani, Toktam
    Razzazi, Mohammadreza
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (02) : 529 - 546
  • [44] Decentralized enforcement of document lifecycle constraints
    Halle, Sylvain
    Khoury, Raphael
    Betti, Quentin
    El-Hokayem, Antoine
    Falcone, Ylies
    [J]. INFORMATION SYSTEMS, 2018, 74 : 117 - 135
  • [45] Nested transactions with integrity constraints
    Doucet, A
    Gançarski, S
    León, C
    Rukoz, M
    [J]. TRANSACTIONS AND DATABASE DYNAMICS, 2000, 1773 : 130 - 149
  • [46] Preservation of Integrity Constraints by Workflow
    Liu, Xi
    Su, Jianwen
    Yang, Jian
    [J]. ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2011, PT I, 2011, 7044 : 64 - +
  • [47] Inference of XML Integrity Constraints
    Vitasek, Matej
    Mlynkova, Irena
    [J]. ADVANCES IN DATABASES AND INFORMATION SYSTEMS, 2013, 186 : 285 - 296
  • [48] Logic programming with integrity constraints
    Kowalski, R
    [J]. LOGICS IN ARTIFICIAL INTELLIGENCE, 1996, 1126 : 301 - 302
  • [49] INTEGRITY CONSTRAINTS OF MANUFACTURING DATABASES
    FAMILI, A
    VERNADAT, FB
    [J]. ENGINEERING WITH COMPUTERS, 1987, 2 (01) : 41 - 52
  • [50] On defining a class of integrity constraints
    Gates, AQ
    [J]. SEKE '96: THE 8TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, PROCEEDINGS, 1996, : 338 - 344