Amanote Research

Amanote Research

    RegisterSign In

Analysis of Integrity Policies Using Soft Constraints

doi 10.1109/policy.2003.1206959
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
S. BistarelliS.N. Foley
Publisher

IEEE Comput. Soc


Related search

Reasoning About Secure Interoperation Using Soft Constraints

English

Autonomous Sub-National Integrity Policies

2017English

Incremental Grid-Like Layout Using Soft and Hard Constraints

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Integrity Constraints in Trust Management

2005English

A Dynamic View of Active Integrity Constraints

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Fixpoint Semantics for Active Integrity Constraints

Artificial Intelligence
LinguisticsLanguageArtificial Intelligence
2018English

Simplification of Integrity Constraints for Data Integration

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2004English

On the Feasibility of Checking Temporal Integrity Constraints

Journal of Computer and System Sciences
Computer NetworksApplied MathematicsCommunicationsComputational TheoryMathematicsTheoretical Computer Science
1995English

Integrity Analysis of Dented Pipelines Using Artificial Neural Networks

Pipeline Science and Technology
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy