z-logo
open-access-imgOpen Access
Deriving Triggers from Integrity Constraint Specifications in the Database Management Systems
Author(s) -
Mohammed Badawy,
Karel Richta
Publication year - 2001
Publication title -
acta polytechnica
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.207
H-Index - 15
eISSN - 1805-2363
pISSN - 1210-2709
DOI - 10.14311/286
Subject(s) - data integrity , constraint (computer aided design) , computer science , database , set (abstract data type) , theory of constraints , database design , deductive database , database schema , database testing , functional dependency , data mining , relational database , engineering , programming language , mechanical engineering , operations management
Supporting integrity constraints is essential for database systems. Integrity constraints are used to ensure that the data in a database complies with rules that have been set to establish accurate and acceptable information for a database. Triggers provide a very powerful and flexible means to realize effective constraint enforcing mechanisms. Implementing triggers based on constraint specifications follows some simple rules that are basically independent of a particular commercial database system. This paper gives these rules, which can be used to derive triggers from constraint specifications. A comparison of advantages of constraints and triggers is also given in this paper.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here