[XML-DEV Mailing List Archive Home] [By Thread] [By Date] [Recent Entries] [Reply To This Message]

RE: Are people really using Identity constraints specif ied in

  • To: "Bullard, Claude L (Len)" <len.bullard@i...>,"Michael Kay" <michael.h.kay@n...>,"Roger L. Costello" <costello@m...>, <xml-dev@l...>
  • Subject: RE: Are people really using Identity constraints specif ied in XML schema?
  • From: "Hunsberger, Peter" <Peter.Hunsberger@S...>
  • Date: Tue, 24 Aug 2004 15:48:25 -0500
  • Thread-index: AcSJKqdEFGUYi5aJRXuK/TB1NfsxzQA7zsCw
  • Thread-topic: Are people really using Identity constraints specif ied in XML schema?

add identity
Bullard, Claude L (Len) <len.bullard@i...> writes:

> 
> With an ammendment: if one is using XML for process communication, 
> one can want to validate the XML against a schema if there is any 
> chance that another process can touch that file.   This takes some 
> wisdom and smarts about class and message design.  The example 
> that made me add this is the MS configuration file handler.  Note 
> we are inside a framework now, not in an very large open environment 
> but the concept of schema as a message contract is the same. 
> so now, irrespective of scale, we have to ask the same questions 
> about boundaries. A fundamental value is scaling across 
> the view dimensions, for you chaos/complexity theorists, and 
> I guess it is the concept of the schema-as-contract.  The good 
> news is that the schema-as-test is useful at different scales 
> but following that, not the same one, so the notion that we 
> should fit the schema to the scope is empirically right.
> 
> I wonder about that one given correct-by-construction 
> techniques using 
> components that have not been altered.  Agghh... version 
> control rears 
> its ugly head again.  Do I apply it to the component or to the 
> contract or both? Can I prove it or should I just run it and wait 
> for the exception to be thrown?  
> 
> This stuff must drive the framework.xml and application class 
> designers nuts.

If I'm following you here (and I'm not sure that I am), I think the
normal attack is recursive boot-strapping: start with open security/no
audit/no validation, inject the fundamental constraints. Now add the
base security, make the base constraints required, validate the base
against the base, point the audit data at the results of the validation,
etc. (Possibly at this point you add in database constraints that didn't
previously exist, turn certain fields non-null, etc.) Now you can inject
the next layer and go around again.  For our system, if we were starting
from scratch we'd have to fake the creation of 2, maybe 3 layers before
we'd have the complete bootstrap in place.  Is it provable?  Not in our
case, but I can't see why it couldn't be in theory...



PURCHASE STYLUS STUDIO ONLINE TODAY!

Purchasing Stylus Studio from our online shop is Easy, Secure and Value Priced!

Buy Stylus Studio Now

Download The World's Best XML IDE!

Accelerate XML development with our award-winning XML IDE - Download a free trial today!

Don't miss another message! Subscribe to this list today.
Email
First Name
Last Name
Company
Subscribe in XML format
RSS 2.0
Atom 0.3
 

Stylus Studio has published XML-DEV in RSS and ATOM formats, enabling users to easily subcribe to the list from their preferred news reader application.


Stylus Studio Sponsored Links are added links designed to provide related and additional information to the visitors of this website. they were not included by the author in the initial post. To view the content without the Sponsor Links please click here.

Site Map | Privacy Policy | Terms of Use | Trademarks
Free Stylus Studio XML Training:
W3C Member
Stylus Studio® and DataDirect XQuery ™are products from DataDirect Technologies, is a registered trademark of Progress Software Corporation, in the U.S. and other countries. © 2004-2013 All Rights Reserved.