Identifying data constraints in applications and databases
摘要:
In some examples, a database may be scanned to identify a first data constraint, and code of an application may be scanned to identify a second data constraint. The database and the application may be external to a processor that is to execute the scan. Input data representing a manipulation of a data value in the database may be received. Whether the data value complies with each of the first data constraint and the second data constraint may be determined.
信息查询
0/0