This site uses cookies to deliver our services and to ensure you get the best experience. By continuing to use this site, you consent to our use of cookies and acknowledge that you have read and understand our Privacy Policy, Cookie Policy, and Terms
We are interested in the problem of validating the consistency of integrity constraints when data is modi ed. In particular, we consider how constraints can be checked with only p...
Jennifer Widom, Ashish Gupta, Yehoshua Sagiv, Jeff...
A federated database is comprised of multiple interconnected database systems that primarily operate independently but cooperate to a certain extent. Global integrity constraints c...
—Constraints are an important part of role-based access control policies. The safety or security of a system is maintained by enforcing constraints that are specified in the pol...