
Appendix D ◾ 417
e update processor and the query processor use the constraints and schema pro-
duced by the database design tool. Generating the initial set of constraints remains
a challenge. We need to examine the use of conceptual structures and semantic
data models to see if we can specify the application and subsequently generate the
security constraints. Algorithm A checks for the consistency and completeness of
the security constraints.
Algorithm A: Consistency and Completeness Checker
Input: Set of security constraints
Output: Set of consistent and complete security constraints
Step 1: For each relation and attribute compute the securit ...