Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,966,259 papers from all fields of science
Search
Sign In
Create Free Account
Data integrity
Known as:
Database integrity
, User-defined integrity
, Integrity (disambiguation)
Expand
Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
ANSI ASC X9.95 Standard
ATP Electronics
Authenticated encryption
Biba Model
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2011
Highly Cited
2011
Cloud computing security auditing
I.A. Gul
,
Atiq ur Rehman
,
M. H. Islam
The 2nd International Conference on Next…
2011
Corpus ID: 9137065
In the recent era, cloud computing has evolved as a net centric, service oriented computing model. Consumers purchase computing…
Expand
Highly Cited
2009
Highly Cited
2009
ECC-based lightweight authentication protocol with untraceability for low-cost RFID
Hung-Yu Chien
,
C. Laih
J. Parallel Distributed Comput.
2009
Corpus ID: 44427660
Highly Cited
2005
Highly Cited
2005
Fault tolerant solid state mass memory for space applications
G. Cardarilli
,
M. Ottavi
,
S. Pontarelli
,
M. Re
,
A. Salsano
IEEE Transactions on Aerospace and Electronic…
2005
Corpus ID: 10967208
In this paper, an innovative fault tolerant solid state mass memory (FTSSMM) architecture is described. Solid state mass memories…
Expand
2003
2003
Using Nanografting to Achieve Directed Assembly of de novo Designed Metalloproteins on Gold
M. Case
,
G. Mclendon
,
+71 authors
Rongchao Jin
2003
Corpus ID: 97819778
Parallel three-helix bundle metalloproteins incorporating C-terminal thiol groups have been designed to orient vertically on a…
Expand
2003
2003
An ultra high speed architecture for VLSI implementation of hash functions
N. Sklavos
,
G. Dimitroulakos
,
O. Koufopavlou
10th IEEE International Conference on Electronics…
2003
Corpus ID: 14607959
Today, security is a topic which attacks the great interest of researchers. Many encryption algorithms have been investigated…
Expand
Highly Cited
2000
Highly Cited
2000
Practical Applications of Triggers and Constraints: Success and Lingering Issues (10-Year Award)
S. Ceri
,
R. Cochrane
,
J. Widom
Very Large Data Bases Conference
2000
Corpus ID: 8688129
From about the mid-1980' s to the mid-1990' s there was a flurry of research activity in the area of database triggers and…
Expand
1995
1995
Revision Programming, Database Updates and Integrity Constraints
V. Marek
,
M. Truszczynski
International Conference on Database Theory
1995
Corpus ID: 28402687
We investigate revision programming, a logic-based mechanism for describing changes in databases and enforcing certain type of…
Expand
1992
1992
Reliability data collection and analysis
J. Flamm
,
T. Luisi
1992
Corpus ID: 107129442
Presentation of EuReDatA needs and use of data collections and analysis reliability, availability, maintainability definitions…
Expand
Review
1991
Review
1991
Automated data capture techniques: A prerequisite for effective integrated manufacturing systems
S. Udoka
1991
Corpus ID: 62611528
1985
1985
Integrity Constraints for Logic Databases
P. Asirelli
,
M. Santis
,
M. Martelli
The Journal of Logic Programming
1985
Corpus ID: 17593837
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE