{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T15:13:04Z","timestamp":1760800384399,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030590024"},{"type":"electronic","value":"9783030590031"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-59003-1_18","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T14:02:26Z","timestamp":1600005746000},"page":"269-284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modeling and Enforcing Integrity Constraints on Graph Databases"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7193-3639","authenticated-orcid":false,"given":"F\u00e1bio","family":"Reina","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2723-0546","authenticated-orcid":false,"given":"Alexis","family":"Huf","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2134-2048","authenticated-orcid":false,"given":"Daniel","family":"Presser","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8275-5751","authenticated-orcid":false,"given":"Frank","family":"Siqueira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"18_CR1","unstructured":"Amin, M.S., Yan, B., Sriram, S., Bhasin, A., Posse, C.: Leveraging a social graph to deliver relevant recommendations, August 2019. https:\/\/patents.google.com\/patent\/US10380629B2\/en"},{"key":"18_CR2","unstructured":"Angles, R.: The property graph database model. In: Proceedings of the 12th Alberto Mendelzon International Workshop on Foundations of Data Management, Cali, Colombia, 21\u201325 May 2018 (2018). http:\/\/ceur-ws.org\/Vol-2100\/paper26.pdf"},{"issue":"1","key":"18_CR3","doi-asserted-by":"publisher","first-page":"1:1","DOI":"10.1145\/1322432.1322433","volume":"40","author":"R Angles","year":"2008","unstructured":"Angles, R., Gutierrez, C.: Survey of graph database models. ACM Comput. Surv. 40(1), 1:1\u20131:39 (2008). https:\/\/doi.org\/10.1145\/1322432.1322433","journal-title":"ACM Comput. Surv."},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-3-319-49806-5_14","volume-title":"Information Systems Security","author":"MS Barik","year":"2016","unstructured":"Barik, M.S., Mazumdar, C., Gupta, A.: Network vulnerability analysis using a constrained graph data model. In: Ray, I., Gaur, M.S., Conti, M., Sanghi, D., Kamakoti, V. (eds.) ICISS 2016. LNCS, vol. 10063, pp. 263\u2013282. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49806-5_14"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.is.2016.07.009","volume":"63","author":"A Corbellini","year":"2017","unstructured":"Corbellini, A., Mateos, C., Zunino, A., Godoy, D., Schiaffino, S.: Persisting big-data: the NoSQL landscape. Inf. Syst. 63, 1\u201323 (2017). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0306437916303210","journal-title":"Inf. Syst."},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"464","DOI":"10.1007\/978-3-319-56538-5_47","volume-title":"Recent Advances in Information Systems and Technologies","author":"GCG van Erven","year":"2017","unstructured":"van Erven, G.C.G., Holanda, M., Carvalho, R.N.: Detecting evidence of fraud in the Brazilian government using graph databases. In: Rocha, \u00c1., Correia, A.M., Adeli, H., Reis, L.P., Costanzo, S. (eds.) Recent Advances in Information Systems and Technologies, pp. 464\u2013473. Springer, Cham (2017)"},{"key":"18_CR7","unstructured":"Ghrab, A., Romero, O., Skhiri, S., Vaisman, A., Zim\u00e1nyi, E.: Grad: on graph data-base modeling (2016). https:\/\/arxiv.org\/ftp\/arxiv\/papers\/1602\/1602.00503.pdf"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Ip, H., Tang, H.: Parallel evidence combination on a SB-tree architecture. In: 1996 Australian New Zealand Conference on Intelligent Information Systems. Proceedings. ANZIIS 96. IEEE (1996). https:\/\/doi.org\/10.1109\/anziis.1996.573882","DOI":"10.1109\/anziis.1996.573882"},{"key":"18_CR9","unstructured":"Navathe, S.B., Elmasri, R.: Fundamentals of Database Systems, 7th edn. Pearson (2016)"},{"key":"18_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-319-24369-6_5","volume-title":"Computer Information Systems and Industrial Management","author":"J Pokorn\u00fd","year":"2015","unstructured":"Pokorn\u00fd, J.: Graph databases: their power and limitations. In: Saeed, K., Homenda, W. (eds.) CISIM 2015. LNCS, vol. 9339, pp. 58\u201369. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24369-6_5"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Pokorn\u00fd, J.: Conceptual and database modelling of graph databases. In: Proceedings of the 20th International Database Engineering Applications Symposium, IDEAS 2016, pp. 370\u2013377. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2938503.2938547","DOI":"10.1145\/2938503.2938547"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Pokorn\u00fd, J., Valenta, M., Kova\u010di\u010d, J.: Integrity constraints in graph databases. Procedia Comput. Sci. 109, 975\u2013981 (2017). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1877050917311390, 8th International Conference on Ambient Systems, Networks and Technologies, ANT-2017 and the 7th International Conference on Sustainable Energy Information Technology, SEIT: 16\u201319 May 2017. Madeira, Portugal (2017)","DOI":"10.1016\/j.procs.2017.05.456"},{"issue":"6","key":"18_CR13","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MITP.2017.4241458","volume":"19","author":"N Roy-Hubara","year":"2017","unstructured":"Roy-Hubara, N., Rokach, L., Shapira, B., Shoval, P.: Modeling graph database schema. IT Professional 19(6), 34\u201343 (2017). https:\/\/doi.org\/10.1109\/MITP.2017.4241458","journal-title":"IT Professional"},{"key":"18_CR14","unstructured":"Sandhu, R.S.: On five definitions of data integrity. In: Proceedings of the IFIP WG11.3 Working Conference on Database Security VII. pp. 257\u2013267. North-Holland Publ., Amsterdam, The Netherlands (1994)"},{"key":"18_CR15","doi-asserted-by":"publisher","unstructured":"Shirasaki, Y., Kobayashi, Y., Aoyama, M.: A speech data-driven stakeholder analysis methodology based on the stakeholder graph models. In: 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 213\u2013220, July 2019. https:\/\/doi.org\/10.1109\/COMPSAC.2019.10209","DOI":"10.1109\/COMPSAC.2019.10209"},{"key":"18_CR16","unstructured":"de Souza, V.C.O., dos Santos, M.V.C.: Maturing, consolidation and performance of NOSQL databases: Comparative study. In: Proceedings of the Annual Conference on Brazilian Symposium on Information Systems: Information Systems: A Computer Socio-Technical Perspective, vol. 1, pp. 32:235\u201332:242. SBSI 2015, Brazilian Computer Society, Porto Alegre, Brazil, Brazil (2015), http:\/\/dl.acm.org\/citation.cfm?id=2814058.2814097"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1721654.1721659","volume":"53","author":"M Stokebraker","year":"2010","unstructured":"Stokebraker, M.: SQL databases v. NoSQL databasesd. Commun. ACM 53, 10\u201311 (2010)","journal-title":"Commun. ACM"},{"key":"18_CR18","doi-asserted-by":"publisher","unstructured":"Vaz, R.V., de Oliveira, J.D.Q., Ribeiro, L.A.: Duplicate management using graph database systems: a case study. In: Proceedings of the XV Brazilian Symposium on Information Systems, SBSI 2019, pp. 50:1\u201350:8. ACM, New York (2019). https:\/\/doi.org\/10.1145\/3330204.3330260","DOI":"10.1145\/3330204.3330260"},{"key":"18_CR19","doi-asserted-by":"publisher","unstructured":"Yamaguchi, F., Golde, N., Arp, D., Rieck, K.: Modeling and discovering vulnerabilities with code property graphs. In: 2014 IEEE Symposium on Security and Privacy, pp. 590\u2013604, May 2014. https:\/\/doi.org\/10.1109\/SP.2014.44","DOI":"10.1109\/SP.2014.44"}],"container-title":["Lecture Notes in Computer Science","Database and Expert Systems Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-59003-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T14:20:15Z","timestamp":1710339615000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-59003-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030590024","9783030590031"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-59003-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DEXA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database and Expert Systems Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dexa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/dexa2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"190","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4-6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online. DEXA Workshops volume: submissions sent - 15, full papers accepted - 6, short papers accepted - 4, reviewers per paper 3, papers per reviewer 1-2","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}