Changes for page 10 Constraints

Last modified by Artur on 2025/09/10 11:19

From version 1.4
edited by Helena
on 2025/06/16 12:12
Change comment: There is no comment for this version
To version 1.8
edited by Helena
on 2025/06/16 12:17
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -216,14 +216,14 @@
216 216  
217 217  The following logic explains how the inheritance mechanism works. Note that this is conceptual logic and actual systems may differ in the way this is implemented.
218 218  
219 -1.
220 -11. Determine all possible keys that are valid at the higher level.
221 -11. These keys are deemed to be inherited by the lower-level constrained object, subject to the Constraints specified at the lower level.
222 -11. Determine all possible keys that are possible using the Constraints specified at the lower level.
223 -11. At the lower level inherit all keys that match with the higher-level Constraint.
224 -11. If there are keys in the lower-level Constraint that are not inherited then the key is invalid (i.e., it is less restrictive).
225 -111. Constraints Examples
219 +1. Determine all possible keys that are valid at the higher level.
220 +1. These keys are deemed to be inherited by the lower-level constrained object, subject to the Constraints specified at the lower level.
221 +1. Determine all possible keys that are possible using the Constraints specified at the lower level.
222 +1. At the lower level inherit all keys that match with the higher-level Constraint.
223 +1. If there are keys in the lower-level Constraint that are not inherited then the key is invalid (i.e., it is less restrictive).
226 226  
225 +=== 10.4.7 Constraints Examples ===
226 +
227 227  ==== 10.4.7.1 Data Constraint and Cascading ====
228 228  
229 229  The following scenario is used.
... ... @@ -237,9 +237,11 @@
237 237  
238 238  In the DSD, common code lists are used and the requirement is to restrict these at various levels to specify the actual code that are valid for the object to which the Constraint is attached.
239 239  
240 +[[image:1750065279010-260.png]]
240 240  
241 241  **Figure 20: Example Scenario for Constraints **Constraints are declared as follows:
242 242  
244 +[[image:1750065319060-899.png]]
243 243  
244 244  **Figure 21: Example Constraints**
245 245  
... ... @@ -280,10 +280,16 @@
280 280  
281 281  DSD Constraint
282 282  
285 +[[image:1750065367824-357.png]]
286 +
283 283  Dataflow Constraints
284 284  
289 +[[image:1750065392163-400.png]]
290 +
285 285  Provision Agreement Constraint
286 286  
293 +[[image:1750065461589-995.png]]
294 +
287 287  **10.4.7.2 Combination of Constraints**
288 288  
289 289  The possible combination of constraining terms are explained in this section, following a few examples.
1750065279010-260.png
Author
... ... @@ -1,0 +1,1 @@
1 +xwiki:XWiki.helena
Size
... ... @@ -1,0 +1,1 @@
1 +60.3 KB
Content
1750065319060-899.png
Author
... ... @@ -1,0 +1,1 @@
1 +xwiki:XWiki.helena
Size
... ... @@ -1,0 +1,1 @@
1 +91.0 KB
Content
1750065367824-357.png
Author
... ... @@ -1,0 +1,1 @@
1 +xwiki:XWiki.helena
Size
... ... @@ -1,0 +1,1 @@
1 +51.4 KB
Content
1750065392163-400.png
Author
... ... @@ -1,0 +1,1 @@
1 +xwiki:XWiki.helena
Size
... ... @@ -1,0 +1,1 @@
1 +104.8 KB
Content
1750065461589-995.png
Author
... ... @@ -1,0 +1,1 @@
1 +xwiki:XWiki.helena
Size
... ... @@ -1,0 +1,1 @@
1 +43.9 KB
Content