Search-Based Testing of Relational Schema Integrity Constraints Across Multiple Database Management Systems

Author(s):  
Gregory M. Kapfhammer ◽  
Phil McMinn ◽  
Chris J. Wright
2013 ◽  
Vol 10 (1) ◽  
pp. 283-320 ◽  
Author(s):  
Slavica Aleksic ◽  
Sonja Ristic ◽  
Ivan Lukovic ◽  
Milan Celikovic

The inverse referential integrity constraints (IRICs) are specialization of non-key-based inclusion dependencies (INDs). Keybased INDs (referential integrity constraints) may be fully enforced by most current relational database management systems (RDBMSs). On the contrary, non-key-based INDs are completely disregarded by actual RDBMSs, obliging the users to manage them via custom procedures and/or triggers. In this paper we present an approach to the automated implementation of IRICs integrated in the SQL Generator tool that we developed as a part of the IIS


10.14311/286 ◽  
2001 ◽  
Vol 41 (6) ◽  
Author(s):  
M. Badawy ◽  
K. Richta

Supporting integrity constraints is essential for database systems. Integrity constraints are used to ensure that the data in a database complies with rules that have been set to establish accurate and acceptable information for a database. Triggers provide a very powerful and flexible means to realize effective constraint enforcing mechanisms. Implementing triggers based on constraint specifications follows some simple rules that are basically independent of a particular commercial database system. This paper gives these rules, which can be used to derive triggers from constraint specifications. A comparison of advantages of constraints and triggers is also given in this paper.


Sign in / Sign up

Export Citation Format

Share Document