Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Reasoning about XML update constraints

Published: 01 September 2009 Publication History

Abstract

We introduce in this paper a class of constraints for describing how an XML document can evolve, namely XML update constraints. For these constraints, we study the implication problem, giving algorithms and complexity results for constraints of varying expressive power. Besides classical constraint implication, we also consider an instance-based approach in which we take into account data. More precisely, we study implication with respect to a current tree instance, resulting from a series of unknown updates. The main motivation of our work is reasoning about data integrity under update restrictions in contexts where owners may lose control over their data, such as in publishing or exchange.

References

[1]
Serge Abiteboul, Bogdan Cautis, Amos Fiat, Tova Milo, Digital signatures for modifiable collections, in: Proc. of the Intl. Conference on Availability, Reliability and Security (ARES), 2006, pp. 390--399
[2]
Abiteboul, Serge, Hull, Richard and Vianu, Victor, Foundations of Databases. 1995. Addison--Wesley.
[3]
Abiteboul, Serge, Segoufin, Luc and Vianu, Victor, Representing and querying XML with incomplete information. ACM Trans. Database Syst. v31 i1. 208-254.
[4]
Abiteboul, Serge and Vianu, Victor, Regular path queries with constraints. J. Comput. System Sci. v58 i3. 428-452.
[5]
Marcelo Arenas, Design principles for XML data, PhD thesis, 2005
[6]
Marcelo Arenas, Wenfei Fan, Leonid Libkin, Consistency of XML specifications, in: Inconsistency Tolerance, 2005, pp. 15--41
[7]
Arenas, Marcelo and Libkin, Leonid, XML data exchange: Consistency and query answering. J. ACM. v55 i2.
[8]
Mihir Bellare, Oded Goldreich, Shafi Goldwasser, Incremental cryptography: The case of hashing and signing, in: Proc. of the Intl. Cryptology Conference, 1994, pp. 216--233
[9]
Benedikt, Michael and Koch, Christoph, XPath leashed. ACM Comput. Surv. v41 i1.
[10]
Mikolaj Bojanczyk, Claire David, Anca Muscholl, Thomas Schwentick, Luc Segoufin, Two-variable logic on data trees and XML reasoning, in: Proc. of the ACM Symposium on Principles of Database Systems (PODS), 2006, pp. 10--19
[11]
Buneman, Peter, Davidson, Susan B., Fan, Wenfei, Hara, Carmem S. and Chiew Tan, Wang, Reasoning about keys for XML. Inf. Syst. v28 i8. 1037-1063.
[12]
Bogdan Cautis, Serge Abiteboul, Tova Milo, Reasoning about XML update constraints, in: Proc. of the ACM Symposium on Principles of Database Systems (PODS), 2007
[13]
Bogdan Cautis, Alin Deutsch, Nicola Onose, XPath rewriting using multiple views: Achieving completeness and efficiency, in: WebDB, 2008
[14]
Chee Yong Chan, Wenfei Fan, Pascal Felber, Minos N. Garofalakis, Rajeev Rastogi, Tree pattern aggregation for scalable XML data dissemination, in: Proc. of the Intl. Conference on Very Large Data Bases (VLDB), 2002, pp. 826--837
[15]
Deutsch, Alin and Tannen, Val, XML queries and constraints, containment and reformulation. Theoret. Comput. Sci. v336 i1. 57-87.
[16]
Fan, Wenfei and Libkin, Leonid, On XML integrity constraints in the presence of DTDs. J. ACM. v49 i3. 368-406.
[17]
Fan, Wenfei and Siméon, Jérôme, Integrity constraints for XML. J. Comput. System Sci. v66 i1. 254-291.
[18]
Gottlob, Georg, Koch, Christoph, Pichler, Reinhard and Segoufin, Luc, The complexity of XPath query evaluation and XML typing. J. ACM. v52 i2. 284-335.
[19]
Green, Todd J., Gupta, Ashish, Miklau, Gerome, Onizuka, Makoto and Suciu, Dan, Processing XML streams with deterministic automata and stream indexes. ACM Trans. Database Syst. v29 i4. 752-788.
[20]
Hopcroft, John E and Ullman, Jeffrey D., Introduction to Automata Theory, Languages, and Computation. 1979. Addison--Wesley, Reading, MA.
[21]
Robert Johnson, David Molnar, Dawn Xiaodong Song, David Wagner, Homomorphic signature schemes, in: Proc. of the Cryptographers' Track -- RSA Conference (CT-RSA), 2002, pp. 244--262
[22]
Silvio Micali, Ronald L. Rivest, Transitive signature schemes, in: Proc. of the Cryptographers' Track -- RSA Conference (CT-RSA), 2002, pp. 236--243
[23]
Miklau, Gerome and Suciu, Dan, Containment and equivalence for a fragment of XPath. J. ACM. v51 i1. 2-45.
[24]
Gerome Miklau, Dan Suciu, Modeling integrity in data exchange, in: Proc. of the Secure Data Management Workshop (SDM), 2004, pp. 41--54
[25]
Neven, Frank and Schwentick, Thomas, On the complexity of XPath containment in the presence of disjunction, DTDs, and variables. Log. Methods Comput. Sci. v2 i3.
[26]
Schwentick, Thomas, XPath query containment. SIGMOD Record. v33 i1. 101-109.
[27]
Igor Tatarinov, Zachary G. Ives, Alon Y. Halevy, Daniel S. Weld, Updating XML, in: Proc. of the ACM SIGMOD Conference, 2001, pp. 413--424
[28]
Victor Vianu, Dynamic constraints and database evolution, in: Proc. of the ACM Symposium on Principles of Database Systems (PODS), 1983, pp. 389--399
[29]
P. Wadler, A formal semantics of patterns in XSLT, 1999
[30]
http://www.w3.org/TR/REC-xml

Cited By

View all
  • (2022)Fixing the inconsistencies of continuous changing operations in fuzzy spatiotemporal RDF graphApplied Soft Computing10.1016/j.asoc.2022.109767131:COnline publication date: 1-Dec-2022
  • (2012)Consistency and repair for XML write-access control policiesThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-012-0273-y21:6(843-867)Online publication date: 1-Dec-2012
  • (2011)Querying XML data sources that export very large sets of viewsACM Transactions on Database Systems (TODS)10.1145/1929934.192993936:1(1-42)Online publication date: 18-Mar-2011

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Journal of Computer and System Sciences
Journal of Computer and System Sciences  Volume 75, Issue 6
September, 2009
50 pages

Publisher

Academic Press, Inc.

United States

Publication History

Published: 01 September 2009

Author Tags

  1. Data integrity
  2. Implication
  3. Semi-structured data
  4. Update constraints
  5. XML

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 26 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Fixing the inconsistencies of continuous changing operations in fuzzy spatiotemporal RDF graphApplied Soft Computing10.1016/j.asoc.2022.109767131:COnline publication date: 1-Dec-2022
  • (2012)Consistency and repair for XML write-access control policiesThe VLDB Journal — The International Journal on Very Large Data Bases10.1007/s00778-012-0273-y21:6(843-867)Online publication date: 1-Dec-2012
  • (2011)Querying XML data sources that export very large sets of viewsACM Transactions on Database Systems (TODS)10.1145/1929934.192993936:1(1-42)Online publication date: 18-Mar-2011

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media