Specifying Integrity Constraints in a Network DBMS