Semantic integrity constraints in knowledge-based database design systems

0
105

Authors: Heng-Li Yang, Robert C. Goldstein, Veda C. Storey

Tags: 1996, conceptual modeling

Semantic integrity constraints are used to help ensure that a database accurately reflects the real world in structure and content. Existing database design methodologies, however, do not often include a comprehensive procedure for identifying such constraints and incorporating them into a design. A number of knowledge-based systems for database design have been developed with varying degrees of emphasis on, and approaches to, this task. A representative sample of these systems is reviewed for their ability to identify, represent and validate integrity constraints. In order to examine how constraints are represented, a six-dimensional model of semantic integrity constraints based on that proposed by Fernandez et al. [32] is presented. Mechanisms used by the prototype systems to implement each of the dimensions are examined. This analysis is used to identify apparently successful approaches as well as areas where further research on incorporating and representing semantic integrity constraints in knowledge-based database design systems is needed.

Read the full paper here: https://pdf.sciencedirectassets.com/271546/1-s2.0-S0169023X00X00031/1-s2.0-0169023X9500035Q/main.pdf?X-Amz-Security-Token=IQoJb3JpZ2luX2VjEE0aCXVzLWVhc3QtMSJIMEYCIQDfFAI3hCknUfpFrJivpiPmyG3R2DBEyD4RNtIMxaAkTgIhAPcE3iBpCTMXCPLubb%2FHwJkLiRgdPb1rxbglDEE79%2FxbKrQDCGUQAxoMMDU5MDAzNTQ2ODY1IgxFl4MB%2B63rGxKGZFcqkQO%2Fp6Q2J5HDqMLeqwJ2IC3PkqAl4Dd8yPE%2FNAtFK7RB87Rk6Rfpfoh20VTLl23OAgbUqeGTh%2BOAYAzoDZYO67dEDVsYsBXf5Iy%2B%2FQSXswTjW0rhxFwvSD%2BheAAmC3Qqj2mWtVGmqcBYsHG4%2BfustdSN0WplOKYBTr1WfUwCsOiXEE8C5hurjeO%2BT0gv36MllD5Ls3KwHzA%2F6S7W2w5Gqk9NvRgLd9gKNQeVe0H0H34nDIk%2F2KV4f2lGTqHynrnsE755zAbIvfxvW4I%2F%2B0kJ4zqkUKpIk3MkGnUqO0uM9VnVDJ5DwlmJhHvrrfZDqqmNg6TgeiMnTqupH3c1se3Vx87XRY1M9gvrvTa0OSFtVyH2ASr1zS3kcboZUv1ATnP7wGY2GBiXYSpxYNTxuGNXnfBlslE6aevUxA2fm1xFJ7pkVoBdn93QZFCmN9UxG82zs4n%2BDkTk%2FhKIUHxUBGByJ961bHOhvGwAd3DE2JmH71tBn%2F24BbQb9wKAMl2K07otyAPkiX0GsmHLU5wT1lIIkXUt%2FDCM8J77BTrqAbaptFJ6U4sOdqNOYopiQnALPxLW0RuYW8q%2FnwkRjt7bHOOVXgf2XYFAAL7qlxFEM3rHU3tkQHACP5UQUnla9e4jf%2BrUBTqnmFJQsNszHh4yphSM%2Fb56kp44qw1%2BjBnUajEexnhYVLBb0SXVRsVfb%2F5teEGc8y%2BlOTO956X0RVbfKVRtZk7gwhncomQyae9KzHjr5fRhyVdhMXGHGswAdg9Vor0eBzlHlm1x6SUhmaHHhIAOzR1AXMjPMJjcgWESTUeo5OmwNG%2FjAenKS7Um64Fd6tJ9l44Fv6UjvqPKNsueQCKF8qgLjKnpbQ%3D%3D&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200920T214514Z&X-Amz-SignedHeaders=host&X-Amz-Expires=300&X-Amz-Credential=ASIAQ3PHCVTY2QN6BRGE%2F20200920%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=d4faec63d60a8a3282accb30a9c59a8dec68395e8a565b755c4edf8f89167707&hash=e127c46a1fd37c37e9be0e5840ee2c4c1eb0c405a2a166ab7d78e948445753e2&host=68042c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=0169023X9500035Q&tid=spdf-6bfc52c7-f4eb-4431-b392-25b9b5a3809d&sid=27939d14918fb14e6d7bc0d-c8b7bcc143a4gxrqa&type=client