Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,859 papers from all fields of science
Search
Sign In
Create Free Account
Data integrity
Known as:
Database integrity
, User-defined integrity
, Integrity (disambiguation)
Expand
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ANSI ASC X9.95 Standard
ATP Electronics
Authenticated encryption
Biba Model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
Extending OWL with Integrity Constraints
Jiao Tao
,
E. Sirin
,
J. Bao
,
Deborah L. McGuinness
Description Logics
2010
Corpus ID: 9621977
Since m1 and m2 are not explicitly defined to be different from each other, they will be inferred to be same due to the…
Expand
Highly Cited
2005
Highly Cited
2005
Fault tolerant solid state mass memory for space applications
G. Cardarilli
,
M. Ottavi
,
S. Pontarelli
,
M. Re
,
A. Salsano
IEEE Transactions on Aerospace and Electronic…
2005
Corpus ID: 10967208
In this paper, an innovative fault tolerant solid state mass memory (FTSSMM) architecture is described. Solid state mass memories…
Expand
2003
2003
Using Nanografting to Achieve Directed Assembly of de novo Designed Metalloproteins on Gold
M. Case
,
G. Mclendon
,
+71 authors
Rongchao Jin
2003
Corpus ID: 97819778
Parallel three-helix bundle metalloproteins incorporating C-terminal thiol groups have been designed to orient vertically on a…
Expand
2003
2003
An ultra high speed architecture for VLSI implementation of hash functions
N. Sklavos
,
G. Dimitroulakos
,
O. Koufopavlou
10th IEEE International Conference on Electronics…
2003
Corpus ID: 14607959
Today, security is a topic which attacks the great interest of researchers. Many encryption algorithms have been investigated…
Expand
2000
2000
A capability representation with embedded address and nearly-exact object bounds
J. Brown
,
Andrew Huang
,
T. Knight
2000
Corpus ID: 369450
We present a capability format which improves upon prior capability formats by simultaneously providing four key features. First…
Expand
1992
1992
Reliability data collection and analysis
J. Flamm
,
T. Luisi
1992
Corpus ID: 107129442
Presentation of EuReDatA needs and use of data collections and analysis reliability, availability, maintainability definitions…
Expand
1988
1988
A practical software maintenance environment
J. Collofello
,
M. Orn
Proceedings. Conference on Software Maintenance…
1988
Corpus ID: 61983353
A research project is described, the objective of which is the development of a practical software maintenance environment. The…
Expand
1988
1988
COOPERATIVE RESPONSES IN DEDUCTIVE DATABASES
A. Gal
1988
Corpus ID: 22350854
This thesis addresses the problem of full utilization of the semantics already present in a database, and particularly, integrity…
Expand
1986
1986
Experiments in software reliability: Life-critical applications
J. Dunham
IEEE Transactions on Software Engineering
1986
Corpus ID: 2870228
Digital computers are being used more frequently for process control applications in which the cost of system failure is high…
Expand
1985
1985
Emergency Control Practices
L. Fink
,
D. Badley
,
J. Koehler
,
D. McInnis
,
O. H. Redmond
IEEE Transactions on Power Apparatus and Systems
1985
Corpus ID: 1607777
The Emergency Control Task Force was formed in February 1982. In order to clarify and focus its efforts, the Task Force, as its…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE