CORC  > 北京大学  > 信息科学技术学院
Checking enforcement of integrity constraints in database applications based on code patterns
Zhang, Hongyu ; Tan, Hee Beng Kuan ; Zhang, Lu ; Lin, Xi ; Wang, Xiaoyin ; Zhang, Chun ; Mei, Hong
刊名journal of systems and software
2011
关键词Integrity constraint enforcement Code patterns PHP Static analysis Code quality VULNERABILITIES
DOI10.1016/j.jss.2011.06.044
英文摘要Integrity constraints (including key, referential and domain constraints) are unique features of database applications. Integrity constraints are crucial for ensuring accuracy and consistency of data in a database. It is important to perform integrity constraint enforcement (ICE) at the application level to reduce the risk of database corruption. We have conducted an empirical analysis of open-source PHP database applications and found that ICE does not receive enough attention in real-world programming practice. We propose an approach for automatic detection of ICE violations at the application level based on identification of code patterns. We define four patterns that characterize the structures of code implementing integrity constraint enforcement. Violations of these patterns indicate the missing of integrity constraint enforcement. Our work contributes to quality improvement of database applications. Our work also demonstrates that it is feasible to effectively identify bugs or problematic code by mining code patterns in a specific domain/application area. (C) 2011 Elsevier Inc. All rights reserved.; Computer Science, Software Engineering; Computer Science, Theory & Methods; SCI(E); 0; ARTICLE; 12; 2253-2264; 84
语种英语
内容类型期刊论文
源URL[http://ir.pku.edu.cn/handle/20.500.11897/237497]  
专题信息科学技术学院
推荐引用方式
GB/T 7714
Zhang, Hongyu,Tan, Hee Beng Kuan,Zhang, Lu,et al. Checking enforcement of integrity constraints in database applications based on code patterns[J]. journal of systems and software,2011.
APA Zhang, Hongyu.,Tan, Hee Beng Kuan.,Zhang, Lu.,Lin, Xi.,Wang, Xiaoyin.,...&Mei, Hong.(2011).Checking enforcement of integrity constraints in database applications based on code patterns.journal of systems and software.
MLA Zhang, Hongyu,et al."Checking enforcement of integrity constraints in database applications based on code patterns".journal of systems and software (2011).
个性服务
查看访问统计
相关权益政策
暂无数据
收藏/分享
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。


©版权所有 ©2017 CSpace - Powered by CSpace