Establishing referential integrity in legacy information systems - Reality bites!

Loup Meurice, Fco Javier Bermúdez Ruiz, Jens H. Weber, Anthony Cleve

Research output: Contribution in Book/Catalog/Report/Conference proceedingConference contribution

Abstract

Most modern relational DBMS have the ability to monitor and enforce referential integrity constraints (RICs). In contrast to new applications, however, heavily evolved legacy information systems may not make use of this important feature, if their design predates its availability. The detection of RICs in legacy systems has been a long-term research topic in the DB reengineering community and a variety of different methods have been proposed, analyzing schema, application code and data. However, empirical evidence on their application for reengineering large-scale industrial systems is scarce and all too often "problems" (case studies) are carefully selected to fit a particular "solution" (method), rather than the other way around. This paper takes a different approach. We analyze in detail the issues posed in reengineering a complex, mission-critical information system to support RICs. In our analysis, we find that many of the assumptions typically made in DB reengineering methods do not readily apply. Based on our findings, we design a process and tools for detecting RICs in context of our real-world problem and provide preliminary results on their effectiveness.

Original languageEnglish
Title of host publicationProceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages461-465
Number of pages5
ISBN (Print)9780769553030
DOIs
Publication statusPublished - 4 Dec 2014
Event30th International Conference on Software Maintenance and Evolution, ICSME 2014 - Victoria, Canada
Duration: 28 Sept 20143 Oct 2014

Conference

Conference30th International Conference on Software Maintenance and Evolution, ICSME 2014
Country/TerritoryCanada
CityVictoria
Period28/09/143/10/14

Fingerprint

Dive into the research topics of 'Establishing referential integrity in legacy information systems - Reality bites!'. Together they form a unique fingerprint.

Cite this