Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,530,402 papers from all fields of science
Search
Sign In
Create Free Account
Data integrity
Known as:
Database integrity
, User-defined integrity
, Integrity (disambiguation)
Expand
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ANSI ASC X9.95 Standard
ATP Electronics
Authenticated encryption
Biba Model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Cloud computing security auditing
I.A. Gul
,
Atiq ur Rehman
,
M. H. Islam
The 2nd International Conference on Next…
2011
Corpus ID: 9137065
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing…
Expand
Highly Cited
2009
Highly Cited
2009
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Hung-Yu Chien
,
C. Laih
J. Parallel Distributed Comput.
2009
Corpus ID: 44427660
Highly Cited
2007
Highly Cited
2007
Efficient schema-based XML-to-Relational data mapping
Mustafa Atay
,
Artem Chebotko
,
Dapeng Liu
,
Shiyong Lu
,
F. Fotouhi
Information Systems
2007
Corpus ID: 6732588
Highly Cited
2007
Highly Cited
2007
Dynamic workflow change in PDM systems
Zhiming Qiu
,
Y. Wong
Computers in industry (Print)
2007
Corpus ID: 507002
Highly Cited
2006
Highly Cited
2006
Safe Dynamic Reconfigurations of Fractal Architectures with FScript
Pierre-Charles David
,
T. Ledoux
2006
Corpus ID: 17909708
In this paper we present FScript, a Domain-Speci c Language used to program structural recon gurations of Fractal architectures…
Expand
Highly Cited
2004
Highly Cited
2004
Induction as Consequence Finding
Katsumi Inoue
Machine-mediated learning
2004
Corpus ID: 23601261
This paper presents a general procedure for inverse entailment which constructs inductive hypotheses in inductive logic…
Expand
Highly Cited
2003
Highly Cited
2003
WebGIS for Monitoring "Sudden Oak Death" in coastal California
N. M. Kelly
,
K. Tuxen
Computers, Environment and Urban Systems
2003
Corpus ID: 36795199
Highly Cited
2001
Highly Cited
2001
Concepts and architecture of a security-centric mobile agent server
Volker Roth
,
Mehrdad Jalali-Sohi
Proceedings 5th International Symposium on…
2001
Corpus ID: 10876199
Mobile software agents are software components that are able to move in a network. They are often considered as an attractive…
Expand
Highly Cited
2001
Highly Cited
2001
On the implication problem for cardinality constraints and functional dependencies
Sven Hartmann
Annals of Mathematics and Artificial Intelligence
2001
Corpus ID: 17834101
In database design, integrity constraints are used to express database semantics. They specify the way by that the elements of a…
Expand
Highly Cited
1985
Highly Cited
1985
Ensuring integrity by adding obligations to privileges
N. Minsky
,
A. Lockman
International Conference on Software Engineering
1985
Corpus ID: 16041084
Conventional authorization mechanisms provide actors with permissions to act, without the actor ever incurring any obligations as…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE