On rules and integrity constraints in database systems

Abstract Recently, several researchers have proposed incorporating rules into database systems. These rules typically embody several diverse concepts, e.g., deductive rules, production rules, and authorization rules. However, most systems treat these diverse concepts homogeneously. Their roles are often misunderstood because of this lack of distinction. The paper clarifies the concepts of deductive rules, production rules, authorization rules, and integrity constraints and points out the essential differences between them. A framework for comparison is established. Several problems with current implementations of the rule mechanisms are highlighted. The advantages and disadvantages of each of these concepts and the domains for which they are suitable are also described.

[1]  Liz Sonenberg,et al.  Integrity Constraint Checking in Stratified Databases , 1987, J. Log. Program..

[2]  Randall Davis,et al.  An overview of production systems , 1975 .

[3]  Larry Kerschberg,et al.  Expert Database Systems , 1987 .

[4]  C. J. Date An introduction to database systems: vol. I (4th ed.) , 1986 .

[5]  Ming-Chien Shan,et al.  Iris: An Object-Oriented Database Management System , 1989, ACM Trans. Inf. Syst..

[6]  Nils J. Nilsson,et al.  Artificial Intelligence , 1974, IFIP Congress.

[7]  William F. Clocksin,et al.  Programming in Prolog , 1987, Springer Berlin Heidelberg.

[8]  Michael Stonebraker,et al.  Third-Generation Database System Manifesto - The Committee for Advanced DBMS Function. , 1990 .

[9]  Michael Stonebraker,et al.  The Implementation of Postgres , 1990, IEEE Trans. Knowl. Data Eng..

[10]  Maurizio Martelli,et al.  Integrity Constraints for Logic Databases , 1985, J. Log. Program..

[11]  Lawrence J. Henschen,et al.  Compiling Constraint-Checking Programs from First-Order Formulas , 1982, Advances in Data Base Theory.

[12]  Jeffrey D. Uuman Principles of database and knowledge- base systems , 1989 .

[13]  Jennifer Widom,et al.  A syntax and semantics for set-oriented production rules in relational database systems , 1989, SGMD.

[14]  Bhavani M. Thuraisingham,et al.  Mandatory security in object-oriented database systems , 1989, OOPSLA '89.

[15]  Carlo Zaniolo,et al.  LDL: A Logic-Based Data Language , 1986, VLDB.

[16]  Keith L. Clark,et al.  Negation as Failure , 1987, Logic and Data Bases.

[17]  Ehud Gudes,et al.  A security model for object-oriented databases , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.

[18]  Timos K. Sellis,et al.  Conflict resolution of rules assigning values to virtual attributes , 1989, SIGMOD '89.

[19]  Virginia E. Barker,et al.  Expert systems for configuration at Digital: XCON and beyond , 1989, Commun. ACM.

[20]  Jennifer Widom,et al.  A Syntax and Semantics for Set-Oriented Production Rules in Relational Database Systems (Extended Abstract). , 1989, ACM SIGMOD Conference.

[21]  Michael Stonebraker,et al.  Third-generation database system manifesto , 1990, SGMD.

[22]  Narain H. Gehani,et al.  ODE (Object Database and Environment): the language and the data model , 1989, SIGMOD '89.

[23]  O. Deux,et al.  The Story of O2 , 1990, IEEE Trans. Knowl. Data Eng..

[24]  Umeshwar Dayal,et al.  The architecture of an active database management system , 1989, SIGMOD '89.

[25]  John Grant,et al.  Semantic Query Optimization: Additional Constraints and Control Strategies , 1986, Expert Database Conf..

[26]  E. Shortliffe Computer-based medical consultations: mycin (elsevier north holland , 1976 .

[27]  Eric Simon,et al.  Making deductive databases a practical technology: a step forward , 1990, SIGMOD '90.

[28]  Isamu Kobayashi,et al.  Validating database updates , 1984, Inf. Syst..

[29]  Klaus R. Dittrich,et al.  Discretionary Access Control in Structurally Object-Oriented Database Systems , 1988, DBSec.

[30]  Sharma Chakravarthy Rule management and evaluation: an active DBMS perspective , 1989, SGMD.

[31]  J. Lloyd Foundations of Logic Programming , 1984, Symbolic Computation.

[32]  Edward H. Shortliffe,et al.  Computer-based medical consultations, MYCIN , 1976 .

[33]  Letizia Tanca,et al.  What you Always Wanted to Know About Datalog (And Never Dared to Ask) , 1989, IEEE Trans. Knowl. Data Eng..

[34]  Tok Wang Ling Integrity Constraint Checking in Deductive Databases Using the Prolog Not-Predicate , 1987, Data Knowl. Eng..

[35]  Raymond Reiter On Closed World Data Bases , 1977, Logic and Data Bases.

[36]  Carlo Zaniolo,et al.  Deductive databases: achievements and future directions , 1990, SGMD.

[37]  Michael Stonebraker,et al.  Implementation of integrity constraints and views by query modification , 1975, SIGMOD '75.

[38]  Jay Banerjee,et al.  Data model issues for object-oriented applications , 1987, TOIS.