ABSTRACT

In this chapter, we look at what happens when we use integrity constraints to propagate updates rather than restrict them. We first consider a general approach which has not yet found a fully practicable formulation, then a very restricted but effectively implementable approach.