
Deriving Triggers from Integrity Constraint Specifications in the Database Management Systems
Author(s) -
Mohammed Badawy,
Karel Richta
Publication year - 2001
Publication title -
acta polytechnica
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.207
H-Index - 15
eISSN - 1805-2363
pISSN - 1210-2709
DOI - 10.14311/286
Subject(s) - data integrity , constraint (computer aided design) , computer science , database , set (abstract data type) , theory of constraints , database design , deductive database , database schema , database testing , functional dependency , data mining , relational database , engineering , programming language , mechanical engineering , operations management
Supporting integrity constraints is essential for database systems. Integrity constraints are used to ensure that the data in a database complies with rules that have been set to establish accurate and acceptable information for a database. Triggers provide a very powerful and flexible means to realize effective constraint enforcing mechanisms. Implementing triggers based on constraint specifications follows some simple rules that are basically independent of a particular commercial database system. This paper gives these rules, which can be used to derive triggers from constraint specifications. A comparison of advantages of constraints and triggers is also given in this paper.