2011
DOI: 10.1007/978-3-642-22630-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Database Semantics Recovery through Analysis of Dynamic SQL Statements

Abstract: Abstract. The documentation of a database includes its conceptual schema, that formalizes the semantics of the data, and its logical schema that translates the former according to an operational database model. Important engineering processes such as database and program evolution rely on a complete and accurate database documentation. In many cases, however, these schemas are missing, or, at best, incomplete and outdated. Their reconstruction, a process called database reverse engineering, requires DDL code a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
4
1

Relationship

5
4

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 44 publications
(54 reference statements)
0
6
0
Order By: Relevance
“…Extending previous work on implicit foreign key detection [2,4,5], we defined an algorithm to extract output/input and input/input dependencies between two successive SQL queries.…”
Section: Level 2: Inter-query Analysismentioning
confidence: 99%
“…Extending previous work on implicit foreign key detection [2,4,5], we defined an algorithm to extract output/input and input/input dependencies between two successive SQL queries.…”
Section: Level 2: Inter-query Analysismentioning
confidence: 99%
“…These approaches have shown their weaknesses and limitations [12], especially in the presence of applications where the data access logic is mostly dynamic. To capture dynamic aspects of a systems different approaches use dynamic techniques for database reverse engineering, for example to support the automatic detection of undeclared constraints (e.g., foreign keys) [3], [4], [5].…”
Section: Related Workmentioning
confidence: 99%
“…Our method for identifying data access points and extracting nested SQL queries has many other applications such as test generation [16], test coverage measurement [17], test selection [18], database semantic recovery [19], optimization [20] and impact analysis [21].…”
Section: Threats To Validitymentioning
confidence: 99%