Deductive verification has gained paramount attention from both academia and industry. Although intensive research in this direction covers almost all mainstream languages, the research community has paid little attention to the verification of database applications. This paper proposes a comprehensive set of Verification Conditions (VCs) generation techniques from database programs, adapting Symbolic Execution, Conditional Normal Form, and Weakest Precondition. The validity checking of the generated VCs for a database program determines its correctness w.r.t. the annotated database properties. The developed prototype DBverify based on our theoretical foundation allows us to instantiate VC generation from PL/SQL codes, yielding to detailed ...
Testing of database applications is crucial for ensuring high software quality as undetected faults ...
A deductive database scheme consists of a set of base predicate schemes and a set of possibly non H...
A relational database may not satisfy certain integrity constraints (ICs) for several reasons. Howev...
The notion of a deductive database has emerged during the 1970s in order to describe database system...
In a world where many human lives depend on the correct behavior of software systems, program verifi...
This article is a presentation of the objectives and techniques of deductive databases. The deducti...
An update of a consistent database can influence the integrity of the database. The available integr...
The performance bottlenecks in modern data-intensive applications have induced database implementors...
A large number of web applications is based on a relational database together with a program, typica...
We present proof procedure for checking the integrity of a deductive database. We follow the proposa...
Uncertainty reasoning has been identified as an important and challenging issue in the database rese...
AbstractThis paper provides a theoritical basis for deductive database systems. A deductive database...
Schema validation is becoming one of the most important problems in database engineering. By vali...
In this paper, we propose a new approach to the validation of formal specifications of integrity con...
AbstractThis paper is the third in a series providing a theoretical basis for deductive database sys...
Testing of database applications is crucial for ensuring high software quality as undetected faults ...
A deductive database scheme consists of a set of base predicate schemes and a set of possibly non H...
A relational database may not satisfy certain integrity constraints (ICs) for several reasons. Howev...
The notion of a deductive database has emerged during the 1970s in order to describe database system...
In a world where many human lives depend on the correct behavior of software systems, program verifi...
This article is a presentation of the objectives and techniques of deductive databases. The deducti...
An update of a consistent database can influence the integrity of the database. The available integr...
The performance bottlenecks in modern data-intensive applications have induced database implementors...
A large number of web applications is based on a relational database together with a program, typica...
We present proof procedure for checking the integrity of a deductive database. We follow the proposa...
Uncertainty reasoning has been identified as an important and challenging issue in the database rese...
AbstractThis paper provides a theoritical basis for deductive database systems. A deductive database...
Schema validation is becoming one of the most important problems in database engineering. By vali...
In this paper, we propose a new approach to the validation of formal specifications of integrity con...
AbstractThis paper is the third in a series providing a theoretical basis for deductive database sys...
Testing of database applications is crucial for ensuring high software quality as undetected faults ...
A deductive database scheme consists of a set of base predicate schemes and a set of possibly non H...
A relational database may not satisfy certain integrity constraints (ICs) for several reasons. Howev...