Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,220,008 papers from all fields of science
Search
Sign In
Create Free Account
Data integrity
Known as:
Database integrity
, User-defined integrity
, Integrity (disambiguation)
Expand
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ANSI ASC X9.95 Standard
ATP Electronics
Authenticated encryption
Biba Model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Security Issues in Cloud Computing
Dr.A. Askarunisa
,
N.Ganesh
,
Sr.Lecturer
,
A.Athiraja
2013
Corpus ID: 114972492
- Cloud Computing offers a computing model for the organizations to implement the functions related to Information technology…
Expand
Highly Cited
2011
Highly Cited
2011
Cloud computing security auditing
I.A. Gul
,
Atiq ur Rehman
,
M. H. Islam
The 2nd International Conference on Next…
2011
Corpus ID: 9137065
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing…
Expand
Highly Cited
2009
Highly Cited
2009
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Hung-Yu Chien
,
C. Laih
J. Parallel Distributed Comput.
2009
Corpus ID: 44427660
Highly Cited
2005
Highly Cited
2005
Fault tolerant solid state mass memory for space applications
G. Cardarilli
,
M. Ottavi
,
S. Pontarelli
,
M. Re
,
A. Salsano
IEEE Transactions on Aerospace and Electronic…
2005
Corpus ID: 10967208
In this paper, an innovative fault tolerant solid state mass memory (FTSSMM) architecture is described. Solid state mass memories…
Expand
2003
2003
Using Nanografting to Achieve Directed Assembly of de novo Designed Metalloproteins on Gold
M. Case
,
G. Mclendon
,
+71 authors
Rongchao Jin
2003
Corpus ID: 97819778
Parallel three-helix bundle metalloproteins incorporating C-terminal thiol groups have been designed to orient vertically on a…
Expand
2003
2003
An ultra high speed architecture for VLSI implementation of hash functions
N. Sklavos
,
G. Dimitroulakos
,
O. Koufopavlou
10th IEEE International Conference on Electronics…
2003
Corpus ID: 14607959
Today, security is a topic which attacks the great interest of researchers. Many encryption algorithms have been investigated…
Expand
Highly Cited
2000
Highly Cited
2000
Practical Applications of Triggers and Constraints: Success and Lingering Issues (10-Year Award)
S. Ceri
,
R. Cochrane
,
J. Widom
Very Large Data Bases Conference
2000
Corpus ID: 8688129
From about the mid-1980' s to the mid-1990' s there was a flurry of research activity in the area of database triggers and…
Expand
1992
1992
Reliability data collection and analysis
J. Flamm
,
T. Luisi
1992
Corpus ID: 107129442
Presentation of EuReDatA needs and use of data collections and analysis reliability, availability, maintainability definitions…
Expand
Review
1991
Review
1991
Automated data capture techniques: A prerequisite for effective integrated manufacturing systems
S. Udoka
1991
Corpus ID: 62611528
1982
1982
The inference problem for template dependencies
Y. Gurevich
,
H. R. Lewis
Information and Control
1982
Corpus ID: 7229619
A template dependency is a formalized integrity constraint on a relational database, stating that whenever tuples exist in the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE