Ensuring Data Integrity
Data Integrity Through Integrities, Rules, and Events
The following mechanisms can be used to enforce data integrity:
• Integrities
• Rules
• Database events
You can use these mechanisms to enforce a variety of relationships—such as referential integrity and general integrity constraints—or for more general purposes, such as tracking all changes to particular tables or extending the Actian X permission system.
Data integrity in the form of constraints was introduced in the chapter “Managing Tables and Views.”
Last modified date: 04/03/2024