{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T23:18:35Z","timestamp":1648595915582},"reference-count":38,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1992,3,1]],"date-time":"1992-03-01T00:00:00Z","timestamp":699408000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[1992,3]]},"DOI":"10.1016\/0950-5849(92)90026-l","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T01:31:39Z","timestamp":1060306299000},"page":"147-158","source":"Crossref","is-referenced-by-count":1,"title":["On rules and integrity constraints in database systems"],"prefix":"10.1016","volume":"34","author":[{"given":"T.W.","family":"Ling","sequence":"first","affiliation":[]},{"given":"P.K.","family":"Teo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"No 3","key":"10.1016\/0950-5849(92)90026-L_BIB1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/71031.71034","article-title":"Rule management and evaluation: an active DBMS perspective","volume":"Vol 18","author":"Chakravarthy","year":"1989","journal-title":"SIGMOD Record"},{"key":"10.1016\/0950-5849(92)90026-L_BIB2","article-title":"A rule manager for relational database systems","author":"Stonebraker","year":"1987"},{"issue":"No 3","key":"10.1016\/0950-5849(92)90026-L_BIB3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/71031.71036","article-title":"A syntax and semantics for set-oriented production rules in relational database systems","volume":"Vol 18","author":"Widom","year":"1989","journal-title":"ACM SIGMOD Record"},{"key":"10.1016\/0950-5849(92)90026-L_BIB4","doi-asserted-by":"crossref","DOI":"10.1145\/101077.390001","article-title":"Third-generation database system manifesto","author":"Committee for Advanced DBMS Function","year":"1990"},{"key":"10.1016\/0950-5849(92)90026-L_BIB5","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-3384-5_3","article-title":"On closed world data bases","author":"Reiter","year":"1978"},{"key":"10.1016\/0950-5849(92)90026-L_BIB6","series-title":"Computer-based medical consultations: Mycin","author":"Shortliffe","year":"1976"},{"issue":"No 3","key":"10.1016\/0950-5849(92)90026-L_BIB7","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1145\/62065.62067","article-title":"Expert systems for configuration at Digital: XCON and beyond","volume":"Vol 32","author":"Barker","year":"1989","journal-title":"Commun. ACM"},{"key":"10.1016\/0950-5849(92)90026-L_BIB8","series-title":"Proc. 1989 ACM SIGMOD Int. Conf. Management of Data","first-page":"36","article-title":"ODE (Object Database and Environment): the language and the data model","author":"Agrawal","year":"1989"},{"key":"10.1016\/0950-5849(92)90026-L_BIB9","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1016\/0169-023X(87)90019-X","article-title":"Integrity constraint checking in deductive data-bases using the prolog not-predicate","volume":"Vol 2","author":"Ling","year":"1987","journal-title":"Data Knowl. Eng."},{"key":"10.1016\/0950-5849(92)90026-L_BIB10","first-page":"145","article-title":"Compiling constraint checking programs from first order formulas","volume":"Vol 2","author":"Henschen","year":"1984"},{"issue":"No 1","key":"10.1016\/0950-5849(92)90026-L_BIB11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0306-4379(84)90012-7","article-title":"Validating database updates","volume":"Vol 9","author":"Kobayashi","year":"1984","journal-title":"Inf. Syst."},{"key":"10.1016\/0950-5849(92)90026-L_BIB12","article-title":"Integrity constraint checking in stratified databases","author":"Lloyd","year":"1986"},{"key":"10.1016\/0950-5849(92)90026-L_BIB13","series-title":"Proc. OOPSLA '89","article-title":"Mandatory security in object-oriented database systems","author":"Thuraisingham","year":"1989"},{"key":"10.1016\/0950-5849(92)90026-L_BIB14","series-title":"Foundations of logic programming","author":"Lloyd","year":"1984"},{"key":"10.1016\/0950-5849(92)90026-L_BIB15","series-title":"Programming in Prolog","author":"Clocksin","year":"1984"},{"issue":"No 1","key":"10.1016\/0950-5849(92)90026-L_BIB16","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1109\/69.43410","article-title":"What you always wanted to know about Datalog (and never dared to ask)","volume":"Vol 1","author":"Ceri","year":"1989","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/0950-5849(92)90026-L_BIB17","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/0743-1066(85)90020-2","article-title":"Integrity constraints in logic databases","volume":"Vol 3","author":"Asirelli","year":"1985","journal-title":"J. Logic Prog."},{"key":"10.1016\/0950-5849(92)90026-L_BIB18","series-title":"Proc. 1st Int. Conf. Expert Database Systems","article-title":"Semantic query optimization: additional constraints and control strategies","author":"Chakravarthy","year":"1986"},{"key":"10.1016\/0950-5849(92)90026-L_BIB19","series-title":"Machine intelligence 8","first-page":"300","article-title":"An overview of production systems","author":"Davis","year":"1977"},{"key":"10.1016\/0950-5849(92)90026-L_BIB20","series-title":"Proc. ACM SIGMOD","article-title":"The architecture of an active data base management system","author":"McCarthy","year":"1989"},{"issue":"No 1","key":"10.1016\/0950-5849(92)90026-L_BIB21","doi-asserted-by":"crossref","DOI":"10.1109\/69.50912","article-title":"The implementation of Postgres","volume":"Vol 2","author":"Stonebraker","year":"1990","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/0950-5849(92)90026-L_BIB22","year":"1989","journal-title":"Vax Rdb\/VMS SQL reference manual"},{"key":"10.1016\/0950-5849(92)90026-L_BIB23","series-title":"Proc. ACM SIGMOD Int. Conf. Management of Data","article-title":"Implementation of integrity constraints and views by query modification","author":"Stonebraker","year":"1975"},{"key":"10.1016\/0950-5849(92)90026-L_BIB24","volume":"Vol 1","author":"Ullman","year":"1988"},{"key":"10.1016\/0950-5849(92)90026-L_BIB25","series-title":"Artificial intelligence","author":"Rich","year":"1983"},{"key":"10.1016\/0950-5849(92)90026-L_BIB26","series-title":"Logic and databases","first-page":"293","article-title":"Negation as failure","author":"Clark","year":"1978"},{"key":"10.1016\/0950-5849(92)90026-L_BIB27","volume":"Vol 1","author":"Date","year":"1986"},{"key":"10.1016\/0950-5849(92)90026-L_BIB28","series-title":"Proc. ACM SIGMOD Int. Conf. Management of Data","first-page":"16","article-title":"An amateur's introduction to recursive query processing","author":"Bancilhon","year":"1986"},{"key":"10.1016\/0950-5849(92)90026-L_BIB29","first-page":"227","article-title":"Logic for improving integrity checking in relational data bases","volume":"Vol 18","author":"Nicholas","year":"1982","journal-title":"Acta Inf."},{"issue":"No 1","key":"10.1016\/0950-5849(92)90026-L_BIB30","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/22890.22945","article-title":"Data model issues for object-oriented applications","volume":"Vol 5","author":"Banerjee","year":"1987","journal-title":"ACM Trans. Office Inf. Syst."},{"issue":"No 1","key":"10.1016\/0950-5849(92)90026-L_BIB31","first-page":"48","article-title":"Iris: an object oriented database management system","volume":"Vol 5","author":"Fishman","year":"1987","journal-title":"ACM Trans. Office Inf. Syst."},{"issue":"No 1","key":"10.1016\/0950-5849(92)90026-L_BIB32","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1109\/69.50908","article-title":"The story of O2","volume":"Vol 2","author":"Deux","year":"1990","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10.1016\/0950-5849(92)90026-L_BIB33","article-title":"A mechanism for managing rules in an object-oriented database","author":"Medeiros","year":"1990","journal-title":"Research report"},{"key":"10.1016\/0950-5849(92)90026-L_BIB34","series-title":"Database security II: status and prospects","article-title":"Discretionary access control in structurally object-oriented database systems","author":"Dittrich","year":"1989"},{"key":"10.1016\/0950-5849(92)90026-L_BIB35","series-title":"Proc. IEEE Computer Society Symp. Security and Privacy","article-title":"A security model for object-oriented databases","author":"Fernandez","year":"1989"},{"key":"10.1016\/0950-5849(92)90026-L_BIB36","series-title":"Readings in object-oriented database systems","first-page":"1","article-title":"Fundamentals of object-oriented databases","author":"Zdonik","year":"1990"},{"key":"10.1016\/0950-5849(92)90026-L_BIB37","series-title":"Proc. Int. Conf. Very Large Data Bases","article-title":"LDL: a logic based data language","author":"Tsur","year":"1986"},{"issue":"No 4","key":"10.1016\/0950-5849(92)90026-L_BIB38","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/122058.122067","article-title":"Deductive databases: achievements and future directions","volume":"Vol 19","author":"Ullman","year":"1990","journal-title":"ACM SIGMOD Record"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:095058499290026L?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:095058499290026L?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T04:26:35Z","timestamp":1552623995000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/095058499290026L"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,3]]},"references-count":38,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1992,3]]}},"alternative-id":["095058499290026L"],"URL":"https:\/\/doi.org\/10.1016\/0950-5849(92)90026-l","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[1992,3]]}}}