Amanote Research
Register
Sign In
Analysis of Integrity Policies Using Soft Constraints
doi 10.1109/policy.2003.1206959
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
S. Bistarelli
S.N. Foley
Publisher
IEEE Comput. Soc
Related search
Reasoning About Secure Interoperation Using Soft Constraints
Autonomous Sub-National Integrity Policies
Incremental Grid-Like Layout Using Soft and Hard Constraints
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Integrity Constraints in Trust Management
A Dynamic View of Active Integrity Constraints
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Fixpoint Semantics for Active Integrity Constraints
Artificial Intelligence
Linguistics
Language
Artificial Intelligence
Simplification of Integrity Constraints for Data Integration
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
On the Feasibility of Checking Temporal Integrity Constraints
Journal of Computer and System Sciences
Computer Networks
Applied Mathematics
Communications
Computational Theory
Mathematics
Theoretical Computer Science
Integrity Analysis of Dented Pipelines Using Artificial Neural Networks
Pipeline Science and Technology