Establishing referential integrity in legacy information systems - Reality bites!

Loup Meurice, Fco Javier Bermúdez Ruiz, Jens H. Weber, Anthony Cleve

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Abstract

Most modern relational DBMS have the ability to monitor and enforce referential integrity constraints (RICs). In contrast to new applications, however, heavily evolved legacy information systems may not make use of this important feature, if their design predates its availability. The detection of RICs in legacy systems has been a long-term research topic in the DB reengineering community and a variety of different methods have been proposed, analyzing schema, application code and data. However, empirical evidence on their application for reengineering large-scale industrial systems is scarce and all too often "problems" (case studies) are carefully selected to fit a particular "solution" (method), rather than the other way around. This paper takes a different approach. We analyze in detail the issues posed in reengineering a complex, mission-critical information system to support RICs. In our analysis, we find that many of the assumptions typically made in DB reengineering methods do not readily apply. Based on our findings, we design a process and tools for detecting RICs in context of our real-world problem and provide preliminary results on their effectiveness.

Original languageEnglish
Title of host publicationProceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages461-465
Number of pages5
ISBN (Print)9780769553030
DOIs
Publication statusPublished - 4 Dec 2014
Event30th International Conference on Software Maintenance and Evolution, ICSME 2014 - Victoria, Canada
Duration: 28 Sep 20143 Oct 2014

Conference

Conference30th International Conference on Software Maintenance and Evolution, ICSME 2014
CountryCanada
CityVictoria
Period28/09/143/10/14

Fingerprint

Reengineering
Information systems
Legacy systems
Availability

Cite this

Meurice, L., Ruiz, F. J. B., Weber, J. H., & Cleve, A. (2014). Establishing referential integrity in legacy information systems - Reality bites! In Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014 (pp. 461-465). [6976118] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ICSME.2014.74
Meurice, Loup ; Ruiz, Fco Javier Bermúdez ; Weber, Jens H. ; Cleve, Anthony. / Establishing referential integrity in legacy information systems - Reality bites!. Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 461-465
@inproceedings{bfb78104e2b14b2bad5f6c9675bbca93,
title = "Establishing referential integrity in legacy information systems - Reality bites!",
abstract = "Most modern relational DBMS have the ability to monitor and enforce referential integrity constraints (RICs). In contrast to new applications, however, heavily evolved legacy information systems may not make use of this important feature, if their design predates its availability. The detection of RICs in legacy systems has been a long-term research topic in the DB reengineering community and a variety of different methods have been proposed, analyzing schema, application code and data. However, empirical evidence on their application for reengineering large-scale industrial systems is scarce and all too often {"}problems{"} (case studies) are carefully selected to fit a particular {"}solution{"} (method), rather than the other way around. This paper takes a different approach. We analyze in detail the issues posed in reengineering a complex, mission-critical information system to support RICs. In our analysis, we find that many of the assumptions typically made in DB reengineering methods do not readily apply. Based on our findings, we design a process and tools for detecting RICs in context of our real-world problem and provide preliminary results on their effectiveness.",
author = "Loup Meurice and Ruiz, {Fco Javier Berm{\'u}dez} and Weber, {Jens H.} and Anthony Cleve",
year = "2014",
month = "12",
day = "4",
doi = "10.1109/ICSME.2014.74",
language = "English",
isbn = "9780769553030",
pages = "461--465",
booktitle = "Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

Meurice, L, Ruiz, FJB, Weber, JH & Cleve, A 2014, Establishing referential integrity in legacy information systems - Reality bites! in Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014., 6976118, Institute of Electrical and Electronics Engineers Inc., pp. 461-465, 30th International Conference on Software Maintenance and Evolution, ICSME 2014, Victoria, Canada, 28/09/14. https://doi.org/10.1109/ICSME.2014.74

Establishing referential integrity in legacy information systems - Reality bites! / Meurice, Loup; Ruiz, Fco Javier Bermúdez; Weber, Jens H.; Cleve, Anthony.

Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014. Institute of Electrical and Electronics Engineers Inc., 2014. p. 461-465 6976118.

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

TY - GEN

T1 - Establishing referential integrity in legacy information systems - Reality bites!

AU - Meurice, Loup

AU - Ruiz, Fco Javier Bermúdez

AU - Weber, Jens H.

AU - Cleve, Anthony

PY - 2014/12/4

Y1 - 2014/12/4

N2 - Most modern relational DBMS have the ability to monitor and enforce referential integrity constraints (RICs). In contrast to new applications, however, heavily evolved legacy information systems may not make use of this important feature, if their design predates its availability. The detection of RICs in legacy systems has been a long-term research topic in the DB reengineering community and a variety of different methods have been proposed, analyzing schema, application code and data. However, empirical evidence on their application for reengineering large-scale industrial systems is scarce and all too often "problems" (case studies) are carefully selected to fit a particular "solution" (method), rather than the other way around. This paper takes a different approach. We analyze in detail the issues posed in reengineering a complex, mission-critical information system to support RICs. In our analysis, we find that many of the assumptions typically made in DB reengineering methods do not readily apply. Based on our findings, we design a process and tools for detecting RICs in context of our real-world problem and provide preliminary results on their effectiveness.

AB - Most modern relational DBMS have the ability to monitor and enforce referential integrity constraints (RICs). In contrast to new applications, however, heavily evolved legacy information systems may not make use of this important feature, if their design predates its availability. The detection of RICs in legacy systems has been a long-term research topic in the DB reengineering community and a variety of different methods have been proposed, analyzing schema, application code and data. However, empirical evidence on their application for reengineering large-scale industrial systems is scarce and all too often "problems" (case studies) are carefully selected to fit a particular "solution" (method), rather than the other way around. This paper takes a different approach. We analyze in detail the issues posed in reengineering a complex, mission-critical information system to support RICs. In our analysis, we find that many of the assumptions typically made in DB reengineering methods do not readily apply. Based on our findings, we design a process and tools for detecting RICs in context of our real-world problem and provide preliminary results on their effectiveness.

UR - http://www.scopus.com/inward/record.url?scp=84931044393&partnerID=8YFLogxK

U2 - 10.1109/ICSME.2014.74

DO - 10.1109/ICSME.2014.74

M3 - Conference contribution

SN - 9780769553030

SP - 461

EP - 465

BT - Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Meurice L, Ruiz FJB, Weber JH, Cleve A. Establishing referential integrity in legacy information systems - Reality bites! In Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 461-465. 6976118 https://doi.org/10.1109/ICSME.2014.74