Title
Checking enforcement of integrity constraints in database applications based on code patterns
Abstract
Integrity constraints (including key, referential and domain constraints) are unique features of database applications. Integrity constraints are crucial for ensuring accuracy and consistency of data in a database. It is important to perform integrity constraint enforcement (ICE) at the application level to reduce the risk of database corruption. We have conducted an empirical analysis of open-source PHP database applications and found that ICE does not receive enough attention in real-world programming practice. We propose an approach for automatic detection of ICE violations at the application level based on identification of code patterns. We define four patterns that characterize the structures of code implementing integrity constraint enforcement. Violations of these patterns indicate the missing of integrity constraint enforcement. Our work contributes to quality improvement of database applications. Our work also demonstrates that it is feasible to effectively identify bugs or problematic code by mining code patterns in a specific domain/application area.
Year
DOI
Venue
2011
10.1016/j.jss.2011.06.044
Journal of Systems and Software
Keywords
Field
DocType
ice violation,integrity constraint enforcement,mining code pattern,checking enforcement,database corruption,database application,integrity constraint,problematic code,code pattern,application level,open-source php database application,quality improvement,static analysis,integrity constraints,code quality
Computer science,Static analysis,Data integrity,Enforcement,Software quality,Quality management,Corruption,Database
Journal
Volume
Issue
ISSN
84
12
0164-1212
Citations 
PageRank 
References 
7
0.48
21
Authors
7
Name
Order
Citations
PageRank
Hongyu Zhang190137.18
Hee Beng Kuan Tan248945.05
Lingming Zhang32726154.39
Xi Lin470.48
Xiaoyin Wang574929.19
Chun Zhang670.82
Hong Mei73535219.36