63
Chapter 4: Advanced SQL

Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Embed Size (px)

Citation preview

Page 1: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Chapter 4: Advanced SQL

Page 2: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Chapter 4: Advanced SQL SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural

Constructs** Recursive Queries** Advanced SQL Features**

Page 3: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Build-in Data Types in SQL (Cont.)

Can extract values of individual fields from date/time/timestamp

Example: extract (year from r.starttime)

Can cast string types to date/time/timestamp Example: cast <string-valued-expression>

as date Example: cast <string-valued-expression>

as time

Page 4: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

User-Defined Types create type construct in SQL creates user-defined

type

create type Dollars as numeric (12,2) final

create domain construct in SQL-92 creates user-defined domain types

create domain person_name char(20) not null

Types and domains are similar. Domains can have constraints, such as not null, specified on them.

Page 5: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Integrity Constraints Integrity constraints guard against accidental

damage to the database, by ensuring that authorized changes to the database do not result in a loss of data consistency.

A checking account must have a balance greater than $10,000.00

A salary of a bank employee must be at least $4.00 an hour

A customer must have a (non-null) phone number

Page 6: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Integrity Constraints It is a mechanism used to prevent

invalid data entry into the table. Used for enforcing rules that the

columns in a table have to confirm with

Types of integrity constraints Domain integrity constraints Entity integrity constraints Referential integrity constraints

Page 7: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Domain Integrity constraints

Constraints set a range, and any violations that take place will prevent the user from performing the manipulation. Not Null constraint Check constraint

Page 8: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Not Null constraint By default the table can contain null values. The enforcement of Not Null in a table

ensures that the table contains values. Not Null can be defined using alter table

command even when the table contains rows.

The table can be altered only if the column being modified contains not null values.

Note:- Zero and Null are not equivalent.

Page 9: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Check constraints Specify conditions that each row must

satisfy Rules are governed by logical

expressions or Boolean expressions Cannot contain subqueries.

Create table abc(a number(2) constraint aa check(a>10), b varchar2(15),c date);---during table creation

Alter table abc add constraint aa check (a>10);---after table creation

Page 10: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Table Level constraint

IC defined at table level can impose rules on any columns in the table.

Not null can be given only at the column level

Page 11: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Entity Integrity constraints

Each row in a table can be uniquely identified using the entity constraint Unique constraints Primary key constraints

Page 12: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Unique constraints Used to prevent the duplication of

values within the rows of specified column or a set of columns in a table.

This constraint can also allow Null values.

If unique key is defined in more than one column then it is said to be composite unique key.

Can be applied only at table level.

Page 13: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Alter table abc add constraint dd unique(c);

Create table abc(a number(2) not null,b varchar2(15) unique, c date);

Page 14: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Primary Key constraints Avoids duplication of rows and does not allow

null values, when enforced in a column or set of columns.

Used for identification of a row. A table can have only one primary key Can be created during table creation or using

alter table Note:- cannot be defined in an alter table

command when the table contains rows having Null values.

Create table abc(a number(2), b varchar2(15), c date, constraint a_prime primary key(a));

Page 15: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Referential Integrity constraints To establish a ‘parent-child’ or a

‘master-detail’ relationship between two tables having a common column, a referential integrity constraint is used.

This can be implemented the column in the parent table as a primary key and the same column in the child table as a foreign key referring to the corresponding parent entry.

Page 16: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Basic concepts related to referential integrity Foreign key:- Column(s) included in the ref.

integrity refer to a referenced key Referenced key:- It is a unique or a primary

key defined on the column belonging to the parent table.

Child table:- depends upon the values present in the referenced key of the parent table.

Parent table:- Determines whether insertion or updation of data can be done in child table

Page 17: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

At the time of table creation

Create table dept(deptno number(2) primary key, dname varchar2(15) unique, loc varchar2(15) not null);Create table emp(empno number(2) primary key, ename varchar2(15) not null, salary number(7,2) not null, deptno number(2) constraint fk_Dept references dept(Deptno));

Page 18: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

On delete cascade

Create table account(…..Foreign key (branch_name)

references branch on delete cascade

on update cascade, …..)

Page 19: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Deferrable and immediate constraints When a constraint is made deferrable,

the checking is postponed till the transaction is committed.

The three conditions which can be set are Deferrable initially immediate- this checks for

constraint violation at the time of insert. Deferrable initially deferred- checks at the

time of commit. Non deferrable initially immediate- default

condition

Page 20: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Assertions An assertion is a predicate expressing a condition that

we wish the database always to satisfy. The sum of all loan amounts for each branch must be less

than the sum of all account balances at the branch. Every loan has at least one customer who maintains an

account with a minimum balance of $1000.00 An assertion in SQL takes the form

create assertion <assertion-name> check <predicate>

When an assertion is made, the system tests it for validity, and tests it again on every update that may violate the assertion

This testing may introduce a significant amount of overhead; hence assertions should be used with great care.

Asserting for all X, P(X) is achieved in a round-about fashion using not exists X such that not P(X)

Page 21: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Assertion Example The sum of all loan amounts for each branch must be

less than the sum of all account balances at the branch.

create assertion sum_constraint check (not exists (select * from branch

where (select sum(amount ) from loan

where loan.branch_name = branch.branch_name )

>= (select sum (amount ) from account

where loan.branch_name = branch.branch_name )))

Page 22: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Assertion Example Every loan has at least one borrower who maintains an

account with a minimum balance or $1000.00 create assertion balance_constraint check

(not exists ( select *

from loan where not exists (

select * from borrower, depositor, account where loan.loan_number = borrower.loan_number

and borrower.customer_name = depositor.customer_name

and depositor.account_number = account.account_number

and account.balance >= 1000)))

Page 23: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Why Security? The data stored in the database need

protection from unauthorized access and malicious destruction or alternation.

Protection against accidental introduction of inconsistency that integrity constraints provide.

There are 2 types of DB security Discretionary security mechanism Mandatory access control

Page 24: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

SecurityTwo types of DB security mechanisms.– Discretionary security mechanisms

Used to grant privileges to users Include capabilities to access specific data files, or

records, etc. in a specified mode –read, insert, etc.-

– Mandatory security mechanisms Used to enforce multilevel security. Classifying the data and users into various security

classes –levels. A typical security policy of an organization is to allow

certain classification level to see only the data items classified at the user’s own (or lower) classification level.

Page 25: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Mandatory Access control Typical security classes:– Top Secret (TS).– Secret (S).– Confidential (C).– Unclassified (U).– TS is the highest level and U the lowest

level• TS > S > C > U.

Page 26: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Mandatory Access Control (cont’d)

One of the commonly used model for multilevel security is known as Bell-LaPadula model. It Classifies each subject (user, account, program) and object (relation, tuple, column, view, operation) into one of the securityclassifications TS, S, C, or U. Refer to the clearance (classification) of a subject S as class(S) and to the classification of an object O as class(O).Two restrictions are enforced on the Subject/Object classifications:1. A subject S is not allowed read access to an object O unless class(S)=>class(O).Known as simple security property2. A subject S is not allowed to write an object O unless class(S)<=class(O).Known as the *-property (star rule).

Page 27: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Security Violations Forms of malicious access are

Unauthorized reading of data Unauthorized modification of data Unauthorized destruction of data.

Database Security refers to protection from malicious access.

Security measures at the database system level.

Security measures at the OS level

Security measures at the Network level

Security measures at the Physical level

Security measures at the Human level

Page 28: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Authorization Several forms of authorization can be

assigned to a user. Read authorization Insert authorization Update authorization Delete authorization

Authorization for the modification of database schema Index authorization Resource authorization Alteration authorization Drop authorization

Database admin has the ultimate authority to authorize new users/restructure the database

Page 29: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Granting of privileges

Authorization can be granted using grant command.

The passing of authorization from one user to another is represented by authorization graph.

In order to maintain security it is required that all edges in an authorization graph be part of some path originating with the database administrator.

Page 30: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Authorization grant graph

DBA

U1

U2

U3

U4

U5

Page 31: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Attempt to defeat authorization revocation

DBA

U1 U2 U3

Page 32: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Authorization Specification in SQL

The grant statement is used to confer authorizationgrant <privilege list>on <relation name or view name> to <user

list> <user list> is:

a user-id public, which allows all valid users the privilege

granted A role

Granting a privilege on a view does not imply granting any privileges on the underlying relations.

The grantor of the privilege must already hold the privilege on the specified item (or be the database administrator).

Page 33: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Privileges in SQL select: allows read access to relation,or the ability to

query using the view Example: grant users U1, U2, and U3 select

authorization on the branch relation:grant select on branch to U1, U2, U3

insert: the ability to insert tuples update: the ability to update using the SQL update

statement delete: the ability to delete tuples. all privileges: used as a short form for all the

allowable privileges

Page 34: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Revoking Authorization in SQL

The revoke statement is used to revoke authorization.revoke <privilege list>on <relation name or view name> from <user list>

Example:revoke select on branch from U1, U2, U3

<privilege-list> may be all to revoke all privileges the revokee may hold.

If <revokee-list> includes public, all users lose the privilege except those granted it explicitly.

If the same privilege was granted twice to the same user by different grantees, the user may retain the privilege after the revocation.

All privileges that depend on the privilege being revoked are also revoked.

Page 35: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Limitations of SQL Authorizations Authorization cannot be given at the

level of individual tuples When authorizations are implemented

at the application programs level then Code for checking authorizations becomes

intermixed with the rest of the application code

Difficulties in implementing authorization through application code leads to loop holes.

Page 36: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Audit trail

It is a log of all changes (inserts/deletes/updates) to the database, along with information such as which user performed the change and when the change was performed.

Can be created by triggers

Page 37: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Application Security

Protection of data while they are being transmitted

Protection against intruders who are able to bypass OS security

Privacy restrictions

Page 38: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Mechanisms used in Application Security

1. Encryption techniques2. Authentication

1. Challenge-response systems2. Digital signatures3. Digital certificates4. Central authentication

3. Securing applications4. Privacy

Page 39: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Encryption support in databases

Disk blocks containing database data should be encrypted.

If the data has to be protected on account of privileges given to other users then encryption must be done before the data reach the database

Page 40: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Authentication

Verifying the identity of a person/software connection to a database.

common- password protection Challenge-response system Digital signatures Digital certificates

Page 41: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Challenge-response systems Dbase systems sends a challenge to the

user. User encrypts the challenge string using

a secret password and returns the result The dbase can verify the authenticity of

the user by decrypting the string with the same secret password and checking with the original string.

Page 42: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Digital signatures

Electronic role of physical signatures on documents

Private key is used to sign data and the signed data is made public

Only persons with private key will be able to generate the signed data

Page 43: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Digital certificates

Authentication of digital signatures are done by means of a certification agency.

The certificate issued by those authorities can be verified, that these are authenticated signatures

Page 44: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Central authentication

A single-sign on system allows the user to be authenticated once and multiple applications can then verify the user’s identity through the central authentication service

Page 45: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Embedded SQL The SQL standard defines embeddings of SQL in a

variety of programming languages such as C, Java, and Cobol.

A language to which SQL queries are embedded is referred to as a host language, and the SQL structures permitted in the host language comprise embedded SQL.

The basic form of these languages follows that of the System R embedding of SQL into PL/I.

EXEC SQL statement is used to identify embedded SQL request to the preprocessor

EXEC SQL <embedded SQL statement > END_EXECNote: this varies by language (for example, the Java embedding uses

# SQL { …. }; )

Page 46: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Dynamic SQL Allows programs to construct and submit SQL queries at

run time. It is a very flexible and powerful tool Used to accomplish tasks such as adding where clauses

to a search based on what fields are filled out on a form or to create tables with varying names.

Page 47: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Examples of dynamic SQLdim sqlsql = "Select ArticleTitle, ArticleBody FROM

Articles WHERE ArticleID = “sql = sql & request.querystring("ArticleID")set results = objConn.execute(sql)

dim sqlsql = "Select * from " & request.querystring("TableName")set results = objConn.execute(sql)

Page 48: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

ODBC and JDBC API (application-program interface) for a program to

interact with a database server Application makes calls to

Connect with the database server Send SQL commands to the database server Fetch tuples of result one-by-one into program

variables ODBC (Open Database Connectivity) works with C, C++,

C#, and Visual Basic JDBC (Java Database Connectivity) works with Java

Page 49: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Functions and Procedures SQL:1999 supports functions and procedures

Functions/procedures can be written in SQL itself, or in an external programming language

Functions are particularly useful with specialized data types such as images and geometric objects

Example: functions to check if polygons overlap, or to compare images for similarity

Some database systems support table-valued functions, which can return a relation as a result

SQL:1999 also supports a rich set of imperative constructs, including

Loops, if-then-else, assignment Many databases have proprietary procedural extensions to SQL

that differ from SQL:1999

Page 50: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

SQL Functions Define a function that, given the name of a customer, returns the

count of the number of accounts owned by the customer. create function account_count (customer_name varchar(20))

returns integer begin declare a_count integer; select count (* ) into a_count from depositor where depositor.customer_name = customer_name return a_count; end

Find the name and address of each customer that has more than one account.

select customer_name, customer_street, customer_cityfrom customerwhere account_count (customer_name ) > 1

Page 51: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

SQL Procedures

The author_count function could instead be written as procedure:create procedure account_count_proc (in title varchar(20), out a_count integer)begin select count(author) into a_count from depositor where depositor.customer_name = account_count_proc.customer_name

end Procedures can be invoked either from an SQL procedure or from

embedded SQL, using the call statement.declare a_count integer;call account_count_proc( ‘Smith’, a_count);

Procedures and functions can be invoked also from dynamic SQL SQL:1999 allows more than one function/procedure of the same name

(called name overloading), as long as the number of arguments differ, or at least the types of the arguments differ

Page 52: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Procedural Constructs Compound statement: begin … end,

May contain multiple SQL statements between begin and end. Local variables can be declared within a compound statements

While and repeat statements:declare n integer default 0;while n < 10 do

set n = n + 1end while

repeat set n = n – 1

until n = 0end repeat

Page 53: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Procedural Constructs (Cont.)

For loop Permits iteration over all results of a query Example: find total of all balances at the Perryridge

branch

declare n integer default 0; for r as select balance from account where branch_name = ‘Perryridge’ do

set n = n + r.balance end for

Page 54: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Procedural Constructs (cont.)

Conditional statements (if-then-else)E.g. To find sum of balances for each of three categories of accounts (with balance <1000, >=1000 and <5000, >= 5000)

if r.balance < 1000 then set l = l + r.balanceelseif r.balance < 5000 then set m = m + r.balanceelse set h = h + r.balanceend if

SQL:1999 also supports a case statement similar to C case statement Signaling of exception conditions, and declaring handlers for exceptions

declare out_of_stock conditiondeclare exit handler for out_of_stockbegin…

.. signal out-of-stockend

The handler here is exit -- causes enclosing begin..end to be exited Other actions possible on exception

Page 55: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

External Language Functions/Procedures

SQL:1999 permits the use of functions and procedures written in other languages such as C or C++

Declaring external language procedures and functions

create procedure account_count_proc(in customer_name varchar(20), out count integer)language Cexternal name ’ /usr/avi/bin/account_count_proc’

create function account_count(customer_name varchar(20))returns integerlanguage Cexternal name ‘/usr/avi/bin/author_count’

Page 56: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

External Language Routines (Cont.)

Benefits of external language functions/procedures: more efficient for many operations, and more expressive

power Drawbacks

Code to implement function may need to be loaded into database system and executed in the database system’s address space

risk of accidental corruption of database structures security risk, allowing users access to unauthorized data

There are alternatives, which give good security at the cost of potentially worse performance

Direct execution in the database system’s space is used when efficiency is more important than security

Page 57: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Security with External Language Routines

To deal with security problems Use sandbox techniques

that is use a safe language like Java, which cannot be used to access/damage other parts of the database code

Or, run external language functions/procedures in a separate process, with no access to the database process’ memory

Parameters and results communicated via inter-process communication

Both have performance overheads Many database systems support both above approaches as

well as direct executing in database system address space

Page 58: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Recursion in SQL SQL:1999 permits recursive view definition Example: find all employee-manager pairs, where the employee

reports to the manager directly or indirectly (that is manager’s manager, manager’s manager’s manager, etc.)

with recursive empl (employee_name, manager_name ) as ( select employee_name, manager_name from manager union select manager.employee_name, empl.manager_name from manager, empl where manager.manager_name = empl.employe_name) select * from emplThis example view, empl, is called the transitive closure of the manager relation

Page 59: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

The Power of Recursion Recursive views make it possible to write queries, such as transitive

closure queries, that cannot be written without recursion or iteration. Intuition: Without recursion, a non-recursive non-iterative program

can perform only a fixed number of joins of manager with itself This can give only a fixed number of levels of managers Given a program we can construct a database with a greater

number of levels of managers on which the program will not work

Computing transitive closure The next slide shows a manager relation Each step of the iterative process constructs an extended version

of empl from its recursive definition. The final result is called the fixed point of the recursive view

definition. Recursive views are required to be monotonic. That is, if we add tuples

to manger the view contains all of the tuples it contained before, plus possibly more

Page 60: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Example of Fixed-Point Computation

Page 61: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Advanced SQL Features** Create a table with the same schema as an existing table:

create table temp_account like account SQL:2003 allows subqueries to occur anywhere a value is required

provided the subquery returns only one value. This applies to updates as well

SQL:2003 allows subqueries in the from clause to access attributes of other relations in the from clause using the lateral construct:

select C.customer_name, num_accountsfrom customer C, lateral (select count(*) from account A

where A.customer_name = C.customer_name )as this_customer (num_accounts )

Page 62: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

Advanced SQL Features (cont’d) Merge construct allows batch processing of updates. Example: relation funds_received (account_number,

amount ) has batch of deposits to be added to the proper account in the account relationmerge into account as A

using (select * from funds_received as F ) on (A.account_number = F.account_number ) when matched then update set balance = balance + F.amount

Page 63: Chapter 4: Advanced SQL. SQL Data Types and Schemas Integrity Constraints Authorization Embedded SQL Dynamic SQL Functions and Procedural Constructs**

End of Chapter