Integrity dangers in certification-based replication protocols

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Database replication protocols check read-write and/or writewrite conflicts. If there are none, protocols propagate transactions to the database, assuming theywill eventually commit.But commitmentmay fail due to integrity constraints violations. Also, the read actions of integrity checking may give raise to new conflicts. Thus, some more care must be taken if, in addition to the consistency of transactions and replicas, also the consistency of integrity constraints is to be maintained. In this paper, we investigate howcertification-based replication protocols can be adapted to correctly and transparently deal with the built-in integrity support provided by the underlying DBMS. Also, we experimentally demonstrate the negative effects that an incorrect management of integrity constraints causes in a database replication distributed system.

Cite

CITATION STYLE

APA

Ruiz-Fuertes, M. I., Muñoz-Escoí, F. D., Decker, H., Armendáriz-Iñigo, J. E., & González De Mendívil, J. R. (2008). Integrity dangers in certification-based replication protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5333, pp. 924–933). Springer Verlag. https://doi.org/10.1007/978-3-540-88875-8_118

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free