©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security Domain Constraints Referential Integrity Assertions Triggers.

Slides:



Advertisements
Similar presentations
Relational Database Design UNIT II 1. 2 Advantages of Using Database Systems Centralized control of a firm’s data Redundancy can be reduced (avoid keeping.
Advertisements

©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity (and Security) Domain Constraints Referential Integrity Assertions Triggers.
Chapter 4: Immediate SQL Complex Queries Complex Queries Views Views Modification of the Database Modification of the Database Joined Relations Joined.
E-R Diagram for a Banking Enterprise
Dr. Kalpakis CMSC 461, Database Management Systems URL: Integrity and Security.
1.1R. Meersman --Adapted from: Database System Concepts --Silberschatz, Korth, Sudarshan Chapter 6: Integrity and Security Domain Constraints Referential.
©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security Domain Constraints Referential Integrity Assertions Triggers.
©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security Domain Constraints Referential Integrity Assertions Triggers.
©Silberschatz, Korth and Sudarshan4.1Database System Concepts Ordering the Display of Tuples List in alphabetic order the names of all customers having.
©Silberschatz, Korth and Sudarshan3.1Database System Concepts Extended Relational-Algebra-Operations Generalized Projection Outer Join Aggregate Functions.
Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 3: SQL.
©Silberschatz, Korth and Sudarshan4.1Database System Concepts Chapter 4: SQL Basic Structure Set Operations Aggregate Functions Null Values Nested Subqueries.
©Silberschatz, Korth and Sudarshan4.1Database System Concepts Modification of the Database – Deletion Delete all account records at the Perryridge branch.
1 CMSC424, Spring 2005 CMSC424: Database Design Lecture 7.
Slides adapted from A. Silberschatz et al. Database System Concepts, 5th Ed. SQL - part 2 - Database Management Systems I Alex Coman, Winter 2006.
©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security Domain Constraints Referential Integrity Assertions Triggers.
©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security (完整性与安全性) Domain Constraints (域约束) Referential Integrity.
Chapter 6: Integrity Objective Key Constraints (Chapter 2) Cardinality Constraints (Chapter 2) Domain Constraints Referential Integrity Assertions Triggers.
Chapter 3: SQL Data Definition Language Data Definition Language Basic Structure of SQL Basic Structure of SQL Set Operations Set Operations Aggregate.
Database Systems Lecture # 8 11 th Feb,2011. The Relational Model of Data The term relation is basically just a mathematical term for a table. DBMS products.
Chapter 6: Integrity and Security Thomas Nikl 19 October, 2004 CS157B.
Chapter 4: Advanced SQL.
Department of Computer Science and Engineering, HKUST Slide 1 Comp 231 Database Management Systems Comp 231 Database Management Systems 6. Integrity Constraints.
Chapter 4 Intermediate SQL: Integrity Constraints.
©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security Domain Constraints Referential Integrity Assertions Triggers.
Chapter 4: Advanced SQL. 4.2Unite International CollegeDatabase Management Systems Chapter 4: Advanced SQL SQL Data Types and Schemas Integrity Constraints.
©Silberschatz, Korth and Sudarshan4.1Database System Concepts Chapter 4: SQL Basic Structure Set Operations Aggregate Functions Null Values Nested Subqueries.
©Silberschatz, Korth and Sudarshan4.1Database System Concepts Null Values It is possible for tuples to have a null value for some of their attributes The.
©Silberschatz, Korth and Sudarshan5.1Database System Concepts Chapter 5: Other Relational Languages Query-by-Example (QBE) Datalog.
3.1 Chapter 3: SQL Schema used in examples p (omit 3.8.2, , 3.11)
Structured Query Language 2 Presented by: Annisa, M.Kom. Source: Database System Concepts 5 th edition.
SCUHolliday - coen 1789–1 Schedule Today: u Constraints, assertions, triggers u Read Sections , 7.4. Next u Triggers, PL/SQL, embedded SQL, JDBC.
-- Introduction to database principles Maoying Wu March 25, 2013 Chapter 4: Advanced SQL (1)
Database System Concepts, 5 th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 2: Relational.
©Silberschatz, Korth and Sudarshan4.1Database System Concepts Modification of the Database – Deletion Delete all tuples from the loan relation. delete.
©Silberschatz, Korth and Sudarshan2.1Database System Concepts - 5 th Edition, Oct 5, 2006 Outer Join n An extension of the join operation that avoids loss.
Chapter 4: Advanced SQL. 4.2Unite International CollegeDatabase Management Systems Chapter 4: Advanced SQL SQL Data Types and Schemas Integrity Constraints.
International Computer Institute, Izmir, Turkey Integrity and Security Asst.Prof.Dr.İlker Kocabaş UBİ502 at
Computing & Information Sciences Kansas State University Monday, 04 Feb 2008CIS 560: Database System Concepts Lecture 6 of 42 Monday, 04 February 2008.
©Silberschatz, Korth and Sudarshan5.1Database System Concepts Chapter 5: Other Relational Languages Query-by-Example (QBE)
Chapter 4 Advanced SQL: Integrity Constraints. 2 n Ensure Data Consistency n Domain Constraints  enforce valid attribute values from domain sets  domain.
Triggers. Why Triggers ? Suppose a warehouse wishes to maintain a minimum inventory of each item. Number of items kept in items table Items(name, number,...)
©Silberschatz, Korth and Sudarshan5.1Database System Concepts Chapter 5: Other Relational Query Languages Tuple Relational Calculus Domain Relational Calculus.
©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security Domain Constraints Referential Integrity Assertions Triggers.
Integrity and Security Domain Constraints Referential Integrity Assertions Triggers Security Authorization Authorization in SQL.
Chapter 8: SQL. Data Definition Modification of the Database Basic Query Structure Aggregate Functions.
IS 230Lecture 6Slide 1 Lecture 7 Advanced SQL Introduction to Database Systems IS 230 This is the instructor’s notes and student has to read the textbook.
Advanced SQL: Triggers & Assertions
Computing & Information Sciences Kansas State University Wednesday, 05 Sep 2007CIS 560: Database System Concepts Lecture 6 of 42 Wednesday, 05 September.
Source: Database System Concepts, Silberschatz etc Edited: Wei-Pang Yang, IM.NDHU, Introduction to Database CHAPTER 5 Other Relational Languages.
Chapter 4: SQL Complex Queries Complex Queries Views Views Modification of the Database Modification of the Database Joined Relations Joined Relations.
2.1 Chapter 2: Relational Model. 2.2 Chapter 2: Relational Model Structure of Relational Databases Fundamental Relational-Algebra-Operations Additional.
©Silberschatz, Korth and Sudarshan3.1Database System Concepts Chapter 3: Relational Model Structure of Relational Databases Relational Algebra Extended.
©Silberschatz, Korth and Sudarshan3.1Database System Concepts Extended Relational-Algebra-Operations Generalized Projection Aggregate Functions Outer Join.
Computing & Information Sciences Kansas State University Friday, 08 Sep 2006CIS 560: Database System Concepts Lecture 07 of 42 Tuesday, 30 January 2007.
Computing & Information Sciences Kansas State University Wednesday, 03 Sep 2008CIS 560: Database System Concepts Lecture 3 of 42 Wednesday, 03 September.
Advanced SQL Lecture 4. 2 Advanced SQL Advanced SQL SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions.
Chapter 5 : Integrity And Security  Domain Constraints  Referential Integrity  Security  Triggers  Authorization  Authorization in SQL  Views 
ICOM 5016 – Introduction to Database Systems Lecture 6 Dr. Manuel Rodriguez Department of Electrical and Computer Engineering University of Puerto Rico,
©Silberschatz, Korth and Sudarshan1 Structured Query Language (SQL) Data Definition Language Domains Integrity Constraints.
Lecture 03 Constraints. Example Schema CONSTRAINTS.
Database System Concepts, 6 th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 4: Intermediate.
©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security Domain Constraints Referential Integrity Assertions Triggers.
SCUHolliday - coen 1789–1 Schedule Today: u Constraints, assertions, triggers u Read Sections , 7.4. Next u Embedded SQL, JDBC. u Read Sections.
Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See for conditions on re-usewww.db-book.com Chapter 4: Advanced SQL.
International Computer Institute, Izmir, Turkey Integrity and Security Asst.Prof.Dr.İlker Kocabaş UBİ502 at
©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity Constraints Domain Constraints Referential Integrity Assertions Triggers.
Database Constraints Ashima Wadhwa. Database Constraints Database constraints are restrictions on the contents of the database or on database operations.
Chapter 6: Integrity (and Security)
Integrity Constraints
Presentation transcript:

©Silberschatz, Korth and Sudarshan6.1Database System Concepts Chapter 6: Integrity and Security Domain Constraints Referential Integrity Assertions Triggers Security Authorization

©Silberschatz, Korth and Sudarshan6.2Database System Concepts Domain Constraints Integrity constraints guard against accidental damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency. Domain constraints are the most elementary form of integrity constraint. They test values inserted in the database, and test queries to ensure that the comparisons make sense. New domains can be created from existing data types  e.g. create domain Dollars numeric(12, 2) create domain Pounds numeric(12, 2) We cannot assign or compare a value of type Dollars to a value of type Pounds.  However, we can convert type as below (cast r.A as Pounds)

©Silberschatz, Korth and Sudarshan6.3Database System Concepts Domain Constraints (Cont.) The check clause in SQL-92 permits domains to be restricted:  Use check clause to ensure that an hourly-wage domain allows only values greater than a specified value. create domain hourly-wage numeric(5,2) constraint value-test check(value > = 4.00)  The domain has a constraint that ensures that the hourly-wage is greater than 4.00  The clause constraint value-test is optional Can have complex conditions in domain check  create domain AccountType char(10) constraint account-type-test check (value in (‘Checking’, ‘Saving’))  check (branch-name in (select branch-name from branch))

©Silberschatz, Korth and Sudarshan6.4Database System Concepts Referential Integrity Ensures that a value that appears in one relation for a given set of attributes also appears for a certain set of attributes in another relation.  Example: If “Perryridge” is a branch name appearing in one of the tuples in the account relation, then there exists a tuple in the branch relation for branch “Perryridge”. Formal Definition  Let r 1 (R 1 ) and r 2 (R 2 ) be relations with primary keys K 1 and K 2 respectively.  The subset  of R 2 is a foreign key referencing K 1 in relation r 1, if for every t 2 in r 2 there must be a tuple t 1 in r 1 such that t 1 [K 1 ] = t 2 [  ].  Referential integrity constraint  Also called subset dependency since it can be written as   (r 2 )   K1 (r 1 )

©Silberschatz, Korth and Sudarshan6.5Database System Concepts Referential Integrity in the E-R Model Consider relationship set R between entity sets E 1 and E 2.  The relational schema for R includes the primary keys K 1 of E 1 and K 2 of E 2.  Then K 1 and K 2 form foreign keys on the relational schemas for E 1 and E 2 respectively. Weak entity sets  The relation schema for a weak entity set must include the primary key of the entity set on which it depends.  Thus, weak entity set includes a foreign key that leads to a referential-integrity constraint. R E1E2

©Silberschatz, Korth and Sudarshan6.6Database System Concepts Checking Referential Integrity on Database Modification The following tests must be made in order to preserve the following referential integrity constraint:   (r 2 )   K (r 1 ) Insert. If a tuple t 2 is inserted into r 2, the system must ensure that there is a tuple t 1 in r 1 such that t 1 [K] = t 2 [  ]. That is t 2 [  ]   K (r 1 ) Delete. If a tuple, t 1 is deleted from r 1, the system must compute the set of tuples in r 2 that reference t 1 :   = t 1 [K] (r 2 ) If this set is not empty, either the delete command is rejected as an error, or the tuples that reference t 1 must themselves be deleted(  cascading deletions).

©Silberschatz, Korth and Sudarshan6.7Database System Concepts Database Modification (Cont.) Update. There are two cases:  If a tuple t 2 is updated in relation r 2 and the update modifies values for foreign key , then a test similar to the insert case is made. Let t 2 ’ denote the new value of tuple t 2. The system must ensure that t 2 ’[  ]   K (r 1 )  If a tuple t 1 is updated in r 1, and the update modifies values for the primary key (K), then a test similar to the delete case is made. The system must compute   = t 1 [K] (r 2 ) using the old value of t 1 (the value before the update is applied). If this set is not empty, the update may be rejected as an error, or the update may be cascaded to the tuples in the set, or the tuples in the set may be deleted.

©Silberschatz, Korth and Sudarshan6.8Database System Concepts Referential Integrity in SQL Primary, candidate, and foreign keys can be specified as part of the SQL create table statement:  The primary key clause  The unique key clause includes a list of the attributes that comprise a candidate key.  The foreign key clause includes both a list of the attributes that comprise the foreign key and the name of the relation referenced by the foreign key.

©Silberschatz, Korth and Sudarshan6.9Database System Concepts Referential Integrity in SQL – Example create table customer (customer-namechar(20), customer-streetchar(30), customer-citychar(30), primary key (customer-name)) create table branch (branch-namechar(15), branch-citychar(30), assetsinteger, primary key (branch-name)) create table account (account-numberchar(10), branch-namechar(15), balanceinteger, primary key (account-number), foreign key (branch-name) references branch) create table depositor (customer-namechar(20), account-numberchar(10), primary key (customer-name, account-number), foreign key (account-number) references account, foreign key (customer-name) references customer)

©Silberschatz, Korth and Sudarshan6.10Database System Concepts Cascading Actions in SQL create table account (... foreign key (branch-name) references branch on delete cascade on update cascade,... ) Due to the on delete cascade clauses, if a delete of a tuple in branch results in referential-integrity constraint violation, the delete cascades to the account relation. Cascading updates are similar.

©Silberschatz, Korth and Sudarshan6.11Database System Concepts Cascading Actions in SQL (Cont.) If there is a chain of foreign-key dependencies across multiple relations, with on delete cascade specified for each dependency  a deletion or update at one end of the chain can propagate across the entire chain. If a cascading update or delete causes a constraint violation that cannot be handled by a further cascading operation, the system aborts the transaction.  All the changes are undone. Referential integrity is only checked at the end of a transaction  Intermediate steps are allowed to violate referential integrity. Later steps remove the violation  e.g. insert two tuples whose foreign keys point to each other (relation marriedperson with primary key name, foreign key spouse)

©Silberschatz, Korth and Sudarshan6.12Database System Concepts Referential Integrity in SQL (Cont.) Alternative to cascading:  on delete set null  on delete set default Null values in foreign key attributes complicate SQL referential integrity semantics, and are best prevented using not null.

©Silberschatz, Korth and Sudarshan6.13Database System ConceptsAssertions An assertion is a predicate expressing a condition that we wish the database always to satisfy. An assertion in SQL takes the form create assertion check When an assertion is made, the system tests it for validity, and tests it again on every update that may violate the assertion  This testing may introduce a significant amount of overhead; hence assertions should be used with great care. Domain constraints and referential-integrity constraints are special forms of assertions.

©Silberschatz, Korth and Sudarshan6.14Database System Concepts Assertions (Cont.) There are many constraints that we cannot express by using only these special forms.  The sum of all loan amounts for each branch must be less than the sum of all account balances at the branch.  Every loan has at least one customer who maintains an account with a minimum balance of $1000. “for all X, P(X)”  SQL does not provide the construct.   “not exists X such that not P(X)”

©Silberschatz, Korth and Sudarshan6.15Database System Concepts Assertion Example The sum of all loan amounts for each branch must be less than the sum of all account balances at the branch. create assertion sum-constraint check (not exists (select * from branch where (select sum(amount) from loan where loan.branch-name = branch.branch-name) >= (select sum(amount) from account where account.branch-name = branch.branch-name)))

©Silberschatz, Korth and Sudarshan6.16Database System Concepts Assertion Example Every loan has at least one borrower who maintains an account with a minimum balance of $1000 create assertion balance-constraint check (not exists ( select * from loan where not exists ( select * from borrower, depositor, account where loan.loan-number = borrower.loan-number and borrower.customer-name = depositor.customer-name and depositor.account-number = account.account-number and account.balance >= 1000)))